Link

image

NeQter Labs FAQ


Winlog Event IDs

Below is a list of Event IDs grabbed by the default configurations of NeQter as of the latest version. The list(s) are broken down into subcategories and covers the Event ID, a description of said event (if applicable) and Inclusion settings for GPO auditing.

Table of Content

Other Events
Audit Security State Change
Audit Security System Extension
Audit System Integrity
Audit Logon
Audit Logon and Audit Account Lockout
Audit Logoff
Audit Other Logon/Logoff Events
Audit IPsec Main Mode
Audit Other Object Access Events
Audit File System, Audit Handle Manipulation, Audit Kernel Object, Audit Registry & Audit Removable Storage
Audit: Audit the access of global system objects
Audit Directory Service Access and Audit SAM
Audit Application Generated
Audit Special Logon
Audit Sensitive Privilege Use and Audit Non Sensitive Privilege Use
Audit Process Creation & Termination
Audit DPAPI Activity
Audit Authorization Policy Change
Audit Authentication Policy Change
Audit Policy Change
Audit User Account Management
Audit Security Group Management
Audit Computer Account Management
Audit Distribution Group Management
Audit Kerberos Authentication Service
Audit Kerberos Service Ticket Operations
Audit Credential Validation
Audit Application Group Management
Audit Other Account Management Events
Account Management
Misc
Audit Other System Events
Audit Other Policy Change Events
Audit Certification Services
Audit Detailed Directory Service Replication
Audit Directory Service Replication
Audit MPSSVC Rule-Level Policy Change
Audit IPsec Driver
Audit IPsec Quick Mode
Audit IPsec Extended Mode
Audit Filtering Platform Connection
Audit Filtering Platform Policy Change
IIS Application Pool Configuration
Cluster Shared Volume Functionality
Audit Directory Service Changes
Audit File Share & Detailed File Share
Audit Filtering Platform Packet Drop
Audit RPC Events
System
Audit Network Policy Server
Audit PNP Activity

Other Events

Event ID Description Inclusion Settings
1 DNS Intrusion Detection Filter N/A
1100 The event logging service has shut down. Success
1102 The audit log was cleared. Success
1108 The event logging service encountered an error while processing an incoming event published from %1. Success

Audit Security State Change

Event ID Description Inclusion Settings
4608 Windows is starting up. Success
4616 The system time was changed. N/A
4621 Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded. Success

Audit Security System Extension

Event ID Description Inclusion Settings
4610 An authentication package has been loaded by the Local Security Authority. Success
4611 A trusted logon process has been registered with the Local Security Authority. Success
4614 A notification package has been loaded by the Security Account Manager. Success
4622 A security package has been loaded by the Local Security Authority. Success
4697 A service was installed in the Success

Audit System Integrity

Event ID Description Inclusion Settings
4612 Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. N/A
4615 Invalid use of LPC port. N/A
4618 A monitored security event pattern has occurred. Success
5056 A cryptographic self test was performed. Success
5057 A cryptographic primitive operation failed. Failure
5060 Verification operation failed. Failure
5061 Cryptographic operation. Success & Failure
5062 A kernel-mode cryptographic self test was performed. Success

Audit Logon

Event ID Description Inclusion Settings
4624 An account was successfully logged on. Success
4675 SIDs were filtered. Success

Audit Logon and Audit Account Lockout

Event ID Description Inclusion Settings
4625 An account failed to log on. Failure

Audit Logoff

Event ID Description Inclusion Settings
4634 An account was logged off. Success
4647 User initiated logoff. Success
4648 A logon was attempted using explicit credentials. Success

Audit Other Logon/Logoff Events

Event ID Description Inclusion Settings
4649 A replay attack was detected. Success
4778 A session was reconnected to a Window Station. Success
4779 A session was disconnected from a Window Station. Success
4800 The workstation was locked. Success
4801 The workstation was unlocked. Success
4802 The screen saver was invoked. Success
4803 The screen saver was dismissed. Success
5378 The requested credentials delegation was disallowed by policy. Failure
5632 A request was made to authenticate to a wireless network. Success & Failure
5633 A request was made to authenticate to a wired network. Success & Failure

Audit IPsec Main Mode

Event ID Description Inclusion Settings
4646 IKE DoS-prevention mode started. N/A
4650 An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used. Success
4651 An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication. Success
4652 An IPsec Main Mode negotiation failed. Success
4653 An IPsec Main Mode negotiation failed. Success
4654 An IPsec Quick Mode negotiation failed. Success
4655 An IPsec Main Mode security association ended. Success
4976 During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. Success
5049 IPsec Services has started successfully. N/A
5453 An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started. Success

Audit Other Object Access Events

Event ID Description Inclusion Settings
4656 A handle to an object was requested. Success & Failure
4671 An application attempted to access a blocked ordinal through the TBS. N/A
4691 An attempt was made to duplicate a handle to an object. Success
4698 A scheduled task was created. N/A
4699 A scheduled task was deleted. N/A
4700 A scheduled task was enabled. Success
4701 A scheduled task was disabled. N/A
4702 A scheduled task was updated. Success
5888 An object in the COM+ Catalog was modified. Success
5889 An object was deleted from the COM+ Catalog. Success
5890 An object was added to the COM+ Catalog. Success

Audit File System, Audit Handle Manipulation, Audit Kernel Object, Audit Registry & Audit Removable Storage

Event ID Description Inclusion Settings
4657 A registry value was modified. Success
5039 A registry key was virtualized. -
5051 A file was virtualized. -
4658 The handle to an object was closed. N/A
4663 An attempt was made to access an object. Success
4664 An attempt was made to create a hard link. N/A
4670 Permissions on an object were changed. Success
4690 A process has exited. Success

Audit: Audit the access of global system objects

Event ID Description Inclusion Settings
4659 A handle to an object was requested with intent to delete. N/A
4660 An object was deleted. N/A

Audit Directory Service Access and Audit SAM

Event ID Description Inclusion Settings
4661 A handle to an object was requested. Success & Failure
4662 An operation was performed on an object. Success & Failure

Audit Application Generated

Event ID Description Inclusion Settings
4665 An attempt was made to create an application client context. N/A
4666 An application attempted an operation. N/A
4667 An application client context was deleted. N/A
4668 An application was initialized. N/A

Audit Special Logon

Event ID Description Inclusion Settings
4672 Special privileges assigned to new logon. Success
4964 Special groups have been assigned to a new logon. Success

Audit Sensitive Privilege Use and Audit Non Sensitive Privilege Use

Event ID Description Inclusion Settings
4673 A privileged service was called. Success & Failure
4674 An operation was attempted on a privileged object. Success & Failure

Audit Process Creation & Termination

Event ID Description Inclusion Settings
4688 A new process has been created. N/A
4696 A primary token was assigned to process. N/A
4689 A process has exited. Success

Audit DPAPI Activity

Event ID Description Inclusion Settings
4692 Backup of data protection master key was attempted. Success & Failure
4693 Recovery of data protection master key was attempted. Success & Failure
4694 Protection of auditable protected data was attempted. N/A
4695 Unprotection of auditable protected data was attempted. N/A

Audit Authorization Policy Change

Event ID Description Inclusion Settings
4704 A user right was assigned. Success
4705 A user right was removed. Success

Audit Authentication Policy Change

Event ID Description Inclusion Settings
4706 A new trust was created to a domain. Success
4707 A trust to a domain was removed. N/A
4709 IPsec Services was started. N/A
4710 IPsec Services was disabled. N/A
4711   N/A
4712 IPsec Services encountered a potentially serious failure. N/A
4713 Kerberos policy was changed. Success
4714 Encrypted data recovery policy was changed. Success
4715 The audit policy (SACL) on an object was changed. Success
4716 Trusted domain information was modified. Success
4717 System security access was granted to an account. Success
4718 System security access was removed from an account. Success
4739 Domain Policy was changed. Success
4864 A namespace collision was detected. Success
4865 A trusted forest information entry was added. Success
4866 A trusted forest information entry was removed. Success
4867 A trusted forest information entry was modified. Success

Audit Policy Change

Event ID Description Inclusion Settings
4719 System audit policy was changed. Success
4902 The Per-user audit policy table was created. Success
4904 An attempt was made to register a security event source. Success
4905 An attempt was made to unregister a security event source. Success
4906 The CrashOnAuditFail value has changed. Success
4907 Auditing settings on object were changed. Success
4908 Special Groups Logon table modified. Success
4912 Per User Audit Policy was changed. Success

Audit User Account Management

Event ID Description Inclusion Settings
4720 A user account was created. Success
4722 enabling user account. Success
4723 attempt made to change accounts password. Success & Failure
4724 attempt to reset account password. Success & Failure
4725 A user account was disabled. N/A
4726 A user account was deleted. N/A
4738 A member was added to a security-enabled global group. Success
4740 A user account was locked out. Success
4765 This event generates when SID History was added to an account. Success
4766 This event generates when an attempt to add SID History to an account failed. Failure
4767 A user account was unlocked. Success
4780 The ACL was set on accounts which are members of administrators groups. Success
4781 The name of an account was changed. Success
4794 An attempt was made to set the Directory Services Restore Mode administrator password. Success & Failure
5376 Credential Manager credentials were backed up. Success
5377 Credential Manager credentials were restored from a backup. Success

Audit Security Group Management

Event ID Description Inclusion Settings
4727 Creation of Security-enabled global group. Success
4728 A member was added to a security-enabled global group. Success
4729 Member Removed from Global Security Group. Success
4730 A security-enabled global group was deleted. N/A
4731 A security-enabled local group was created. N/A
4732 A member was added to a security-enabled local group. Success
4733 A member was removed from a security-enabled local group. Success
4735 A security-enabled local group was changed. Success
4737 A security-enabled global group was changed. Success
4754 A security-enabled universal group was created. Success
4755 A security-enabled universal group was changed. Success
4756 A member was added to a security-enabled universal group. Success
4757 A member was removed from a security-enabled universal group. Success
4758 A security-enabled universal group was deleted. N/A
4759 A security-disabled universal group was created. N/A
4764 A group’s type was changed. Success
4798 A user’s local group membership was enumerated. Success
4799 A security-enabled local group membership was enumerated. Success

Audit Computer Account Management

Event ID Description Inclusion Settings
4741 A computer account was changed. N/A
4742 A computer account was deleted. Success
4743 A computer account was deleted. N/A

Audit Distribution Group Management

Event ID Description Inclusion Settings
4744 A security-disabled local group was created. Success
4745 A security-disabled local group was changed. Success
4746 A member was added to a security-disabled local group. Success
4747 A member was removed from a security-disabled local group. N/A
4748 A security-disabled local group was deleted. N/A
4749 A security-disabled global group was created. N/A
4750 A security-disabled global group was changed. Success
4751 A member was added to a security-disabled global group. Success
4752 A member was removed from a security-disabled global group. Success
4760 A security-disabled universal group was changed. Success
4761 A member was added to a security-disabled universal group. Success
4762 A member was removed from a security-disabled universal group. Success

Audit Kerberos Authentication Service

Event ID Description Inclusion Settings
4771 Kerberos pre-authentication failed. Failure
4772 A Kerberos authentication ticket request failed. Failure

Audit Kerberos Service Ticket Operations

Event ID Description Inclusion Settings
4769 A Kerberos service ticket was requested. Success & Failure
4770 A Kerberos service ticket was renewed. Success

Audit Credential Validation

Event ID Description Inclusion Settings
4774 An account was mapped for logon. Success & Failure
4775 An account could not be mapped for logon. Failure
4776 The domain controller attempted to validate the credentials for an account. Success & Failure
4777 The domain controller failed to validate the credentials for an account. Failure

Audit Application Group Management

Event ID Description Inclusion Settings
4782 The password hash an account was accessed. Success
4783 A basic application group was created. Success
4784 A basic application group was changed. Success
4785 A member was added to a basic application group. Success
4786 A member was removed from a basic application group. Success
4787 A nonmember was added to a basic application group. Success
4788 A nonmember was removed from a basic application group. Success
4789 A basic application group was deleted. Success
4790 An LDAP query group was created. Success

Audit Other Account Management Events

Event ID Description Inclusion Settings
4793 The Password Policy Checking API was called. Success

Account Management

Event ID Description Inclusion Settings
4797 An attempt was made to query the existence of a blank password for an account. Success

Misc

Event ID Description Inclusion Settings
4816 RPC detected an integrity violation while decrypting an incoming message. Success

Audit Other System Events

Event ID Description Inclusion Settings
4825 user was denied the access to Remote Desktop. users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group. Success
4985 The state of a transaction has changed. Success
5024 The Windows Firewall Service has started successfully. Success
5027 The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. Failure
5028 The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. Failure
5029 The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. F  
5030 The Windows Firewall Service failed to start. Failure
5032 Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. Failure
5033 The Windows Firewall Driver has started successfully. Success
5034 The Windows Firewall Driver has been stopped. Success
5035 The Windows Firewall Driver failed to start. Failure
5037 The Windows Firewall Driver detected critical runtime error. Terminating. Failure
5038 Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error. Success & Failure
5058 Key file operation. Success & Failure
5059 Key migration operation. Success & Failure

Audit Other Policy Change Events

Event ID Description Inclusion Settings
4826 Boot Configuration Data loaded. Success
4909 The local policy settings for the TBS were changed. -
4910 The Group Policy settings for the TBS were changed. -
5063 A cryptographic provider operation was attempted. Success & Failure
5064 A cryptographic context operation was attempted. Success & Failure
5065 A cryptographic context modification was attempted. Success & Failure
5066 A cryptographic function operation was attempted. Success & Failure
5067 A cryptographic function modification was attempted. Success & Failure
5068 A cryptographic function provider operation was attempted. Success & Failure
5069 A cryptographic function property operation was attempted. Success & Failure
5070 A cryptographic function property modification was attempted. Success & Failure
6144 Security policy in the group policy objects has been applied successfully. Success
6145 One or more errors occurred while processing security policy in the group policy objects. Failure

Audit Certification Services

Event ID Description Inclusion Settings
4868 The certificate manager denied a pending certificate request. N/A
4869 Certificate Services received a resubmitted certificate request. N/A
4870 Certificate Services revoked a certificate. N/A
4871 Certificate Services received a request to publish the certificate revocation list (CRL). N/A
4872 Certificate Services published the certificate revocation list (CRL). N/A
4873 A certificate request extension changed. N/A
4874 One or more certificate request attributes changed. N/A
4875 Certificate Services received a request to shut down. N/A
4876 Certificate Services backup started. N/A
4877 Certificate Services backup completed. N/A
4878 Certificate Services restore started. N/A
4879 Certificate Services restore completed. N/A
4880 Certificate Services started. N/A
4881 Certificate Services stopped. N/A
4882 The security permissions for Certificate Services changed. N/A
4883 A certificate request extension changed. N/A
4884 One or more certificate request attributes changed. N/A
4885 The audit filter for Certificate Services changed. N/A
4886 Certificate Services received a certificate request. N/A
4887 Certificate Services approved a certificate request and issued a certificate. N/A
4888 Certificate Services denied a certificate request. N/A
4889 Certificate Services set the status of a certificate request to pending. N/A
4890 The certificate manager settings for Certificate Services changed. N/A
4891 A configuration entry changed in Certificate Services. N/A
4892 A property of Certificate Services changed. N/A
4893 Certificate Services archived a key. N/A
4894 Certificate Services imported and archived a key. N/A
4895 Certificate Services published the CA certificate to Active Directory Domain Services. N/A
4896 One or more rows have been deleted from the certificate database. N/A
4897 Role separation enabled. N/A
4898 Certificate Services loaded a template. N/A
5121 OCSP Responder Service Stopped. N/A
5122 A configuration entry changed in OCSP Responder Service. N/A
5123 A configuration entry changed in OCSP Responder Service. N/A
5124 A security setting was updated on the OCSP Responder Service. N/A
5125 A request was submitted to the OCSP Responder Service. N/A
5126 Signing Certificate was automatically updated by the OCSP Responder Service. N/A
5127 The OCSP Revocation Provider successfully updated the revocation information. N/A

Audit Detailed Directory Service Replication

Event ID Description Inclusion Settings
4928 An Active Directory replica source naming context was established. Success & Failure
4929 An Active Directory replica source naming context was removed. Success & Failure
4930 An Active Directory replica source naming context was modified. Success & Failure
4934 Attributes of an Active Directory object were replicated. Success
4935 Replication failure begins. Failure
4936 Replication failure ends. Success
4937 A lingering object was removed from a replica. Success

Audit Directory Service Replication

Event ID Description Inclusion Settings
4931 An Active Directory replica destination naming context was modified. Success & Failure
4932 Synchronization of a replica of an Active Directory naming context has begun. Success
4933 Synchronization of a replica of an Active Directory naming context has ended. Success & Failure

Audit MPSSVC Rule-Level Policy Change

Event ID Description Inclusion Settings
4944 The following policy was active when the Windows Firewall started. Success
4945 A rule was listed when the Windows Firewall started. Success
4946 A change has been made to Windows Firewall exception list. A rule was added. Success
4947 A change has been made to Windows Firewall exception list. A rule was modified. Success
4948 A change has been made to Windows Firewall exception list. A rule was deleted. Success
4949 Windows Firewall settings were restored to the default values. Success
4950 A Windows Firewall setting has changed. Success
4951 A rule has been ignored because its major version number was not recognized by Windows Firewall. Failure
4952 Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. Failure
4953 A rule has been ignored by Windows Firewall because it could not parse the rule. F  
4954 Windows Firewall Group Policy settings have changed. The new settings have been applied. Success
4956 Windows Firewall has changed the active profile. Success
4957 Windows Firewall has changed the active profile. Failure
4958 Windows Firewall did not apply the following rule. Failure

Audit IPsec Driver

Event ID Description Inclusion Settings
4960 IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations. Success
4961 IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer. Success
4962 IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay. Success
4963 IPsec dropped an inbound clear text packet that should have been secured. This is usually due to the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt. Success
4965 IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error may also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored. Success
5479 IPsec Services has been shut down successfully. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. Success
5480 IPsec Services failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. Failure
5483 IPsec Services failed to initialize RPC server. IPsec Services could not be started. Failure
5484 IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. Failure
5485 IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. Failure
5478 An IPsec Security Association was deleted. N/A

Audit IPsec Quick Mode

Event ID Description Inclusion Settings
4977 During Quick Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. Success
5451 An IPsec Quick Mode security association was established. Success
5452 An IPsec Quick Mode security association ended. Success

Audit IPsec Extended Mode

Event ID Description Inclusion Settings
4978 During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. Success
4979 IPsec Main Mode and Extended Mode security associations were established. N/A
4980 IPsec Main Mode and Extended Mode security associations were established. N/A
4981 IPsec Main Mode and Extended Mode security associations were established. N/A
4982 IPsec Main Mode and Extended Mode security associations were established. N/A
4983 An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. Success
4984 An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. Success

Audit Filtering Platform Connection

Event ID Description Inclusion Settings
5031 The Windows Firewall Service blocked an application from accepting incoming connections on the network. Failure
5154 The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. Success
5155 The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. Failure
5156 The Windows Filtering Platform has allowed a connection. Success
5157 The Windows Filtering Platform has blocked a connection. Failure
5158 The Windows Filtering Platform has permitted a bind to a local port. Success
5159 The Windows Filtering Platform has blocked a bind to a local port. Failure

Audit Filtering Platform Policy Change

Event ID Description Inclusion Settings
5040 A change has been made to IPsec settings. An Authentication Set was added. Success
5041 A change has been made to IPsec settings. An Authentication Set was modified. Success
5042 A change has been made to IPsec settings. An Authentication Set was deleted. Success
5043 A change has been made to IPsec settings. A Connection Security Rule was added. Success
5044 A change has been made to IPsec settings. A Connection Security Rule was modified. Success
5045 A change has been made to IPsec settings. A Connection Security Rule was deleted. Success
5046 A change has been made to IPsec settings. A Crypto Set was added. Success
5047 A change has been made to IPsec settings. A Crypto Set was modified. Success
5048 A change has been made to IPsec settings. A Crypto Set was deleted. Success
5440 The following callout was present when the Windows Filtering Platform Base Filtering Engine started. Success
5441 The following filter was present when the Windows Filtering Platform Base Filtering Engine started. Success
5442 The following provider was present when the Windows Filtering Platform Base Filtering Engine started. Success
5443 The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. Success
5444 The following sublayer was present when the Windows Filtering Platform Base Filtering Engine started. Success
5446 A Windows Filtering Platform callout has been changed. Success
5447 A Windows Filtering Platform filter has been changed. Success
5448 A Windows Filtering Platform provider has been changed. Success
5449 A Windows Filtering Platform provider context has been changed. Success
5450 A Windows Filtering Platform sublayer has been changed. Success
5456 PAStore Engine applied Active Directory storage IPsec policy on the computer. Success
5457 PAStore Engine failed to apply Active Directory storage IPsec policy on the computer. Failure
5458 PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. Success
5459 PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. Failure
5460 PAStore Engine applied local registry storage IPsec policy on the computer. Success
5461 PAStore Engine failed to apply local registry storage IPsec policy on the computer. Failure
5462 PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem. Failure
5463 PAStore Engine polled for changes to the active IPsec policy and detected no changes. Success
5464 PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services. Success
5465 PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully. Success
5466 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied. Failure
5467 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used. Failure
5468 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used. Success
5471 PAStore Engine loaded local storage IPsec policy on the computer. Success
5472 PAStore Engine failed to load local storage IPsec policy on the computer. Failure
5473 PAStore Engine loaded directory storage IPsec policy on the computer. Success
5474 PAStore Engine failed to load directory storage IPsec policy on the computer. Failure
5477 PAStore Engine failed to add quick mode filter. Failure

IIS Application Pool Configuration

Event ID Description Inclusion Settings
5050 IIS Application Pool Configuration. N/A

Cluster Shared Volume Functionality

Event ID Description Inclusion Settings
5120 Cluster Shared Volume Functionality. N/A

Audit Directory Service Changes

Event ID Description Inclusion Settings
5136 A directory service object was modified. Success
5137 A directory service object was created. Success
5138 A directory service object was undeleted. Success
5139 A directory service object was moved. Success
5141 A directory service object was deleted. Success

Audit File Share & Detailed File Share

Event ID Description Inclusion Settings
5140 A network share object was accessed. Success & Failure
5145 A network share object was checked to see whether client can be granted desired access. Success & Failure

Audit Filtering Platform Packet Drop

Event ID Description Inclusion Settings
5152 The Windows Filtering Platform blocked a packet. Failure
5153 A more restrictive Windows Filtering Platform filter has blocked a packet. Success

Audit RPC Events

Event ID Description Inclusion Settings
5712 A Remote Procedure Call (RPC) was attempted. Success

System

Event ID Description Inclusion Settings
5827 The Netlogon service denied a vulnerable Netlogon secure channel connection from a machine account. N/A
5828 The Netlogon service denied a vulnerable Netlogon secure channel connection using a trust account. N/A
6008 The previous system shutdown was unexpected. N/A

Audit Network Policy Server

Event ID Description Inclusion Settings
6272 Network Policy Server granted access to a user. Success
6273 Network Policy Server denied access to a user. Success
6274 Network Policy Server discarded the request for a user. N/A
6275 Network Policy Server discarded the accounting request for a user. N/A
6276 Network Policy Server quarantined a user. N/A
6277 Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy. N/A
6278 Network Policy Server granted full access to a user because the host met the defined health policy. N/A
6279 Network Policy Server granted full access to a user because the host met the defined health policy. N/A
6280 Network Policy Server locked the user account due to repeated failed authentication attempts. N/A

Audit PNP Activity

Event ID Description Inclusion Settings
6416 A new external device was recognized by the System. Success
6423 The installation of this device is forbidden by system policy. Success
6424 The installation of this device was allowed, after having previously been forbidden by policy. Success

Return to FAQ Index