EventSentry
  • System32
  • Events
  • Compliance
  • Validator
  • TLS/SSL
  • Codes
  • GeoIP
  • Tools







Audit Category
  • Logon/Logoff (6)
  • Detailed Tracking (2)
  • Policy Change (1)
  • System (1)
Audit Subcategory
  • Other Logon/Logoff Events (2)
  • Process Creation (2)
  • Authorization Policy Change (1)
  • Group Membership (1)
  • Logoff (1)
  • Logon (1)
  • System Integrity (1)
  • User / Device Claims (1)
Operating Systems
  • Windows 10 (9)
  • Windows 2016 (9)
  • Windows 2019 (9)
  • Windows 2008 (7)
  • Windows 2012 (7)
  • Windows 2012 R2 (7)
  • Windows 8 (7)
  • Windows 8.1 (7)
  • Windows Vista (7)
  • Windows 2008 R2 (6)
  • Windows 7 (6)
Tags
  • Audit Success (10)
  • ISO 27001:2013 (4)
  • NIST 800-171 (4)
  • NIST SP 800-53 (4)
  • CMMC L3 (3)
  • CJIS (1)
  • CMMC L1 (1)
  • HIPAA (1)
Auditing
  • Always (5)
  • Conditional (2)
Volume
  • Low (6)
  • High (4)
  • Medium (4)
  • Very high (1)
EventSentry
  • All events
ID Event Description
4618 A monitored security event pattern has occurred.
Audit Success
4624 An account was successfully logged on
CJIS, Audit Success, ISO 27001:2013, HIPAA, NIST SP 800-53, CMMC L1, NIST 800-171
4626 User / Device claims information
Audit Success
4627 Group membership information
Audit Success
4647 User initiated logoff
Audit Success
4688 A new process has been created
NIST 800-171, NIST SP 800-53, Audit Success, ISO 27001:2013, CMMC L3
4696 A primary token was assigned to process
Audit Success
4703 A token right was adjusted
Audit Success
4800 The workstation was locked
Audit Success, ISO 27001:2013, NIST 800-171, NIST SP 800-53, CMMC L3
4801 The workstation was unlocked
ISO 27001:2013, Audit Success, NIST 800-171, NIST SP 800-53, CMMC L3



© netikus.net ltd 2002-2022 | EventSentry | Event Log Messages | Privacy Policy