System32
Events
Scripts
Codes
GeoIP
Tools
Audit Category
Policy Change
(89)
Object Access
(76)
Account Management
(63)
Logon/Logoff
(49)
System
(46)
DS Access
(17)
Account Logon
(8)
Detailed Tracking
(8)
Privilege Use
(2)
Audit Subcategory
Certification Services
(41)
Filtering Platform Policy Change
(40)
Other System Events
(16)
Security Group Management
(16)
Distribution Group Management
(15)
User Account Management
(15)
MPSSVC Rule-Level Policy Change
(14)
Other Policy Change Events
(13)
Authentication Policy Change
(12)
Other Logon/Logoff Events
(12)
IPsec Driver
(11)
Application Group Management
(10)
Other Object Access Events
(10)
System Integrity
(10)
Audit Policy Change
(9)
File System
(9)
IPsec Main Mode
(9)
Network Policy Server
(9)
Detailed Directory Service Replication
(8)
IPsec Extended Mode
(7)
Registry
(7)
Filtering Platform Connection
(6)
Directory Service Changes
(5)
Security System Extension
(5)
Application Generated
(4)
DPAPI Activity
(4)
IPsec Quick Mode
(4)
Kernel Object
(4)
Logon
(4)
Security State Change
(4)
Authorization Policy Change
(3)
Computer Account Management
(3)
Credential Validation
(3)
Kerberos Authentication Service
(3)
Kerberos Service Ticket Operations
(3)
Removable Storage
(3)
Directory Service Access
(2)
Directory Service Replication
(2)
Filtering Platform Packet Drop
(2)
Handle Manipulation
(2)
Logoff
(2)
Other Account Management Events
(2)
Process Creation
(2)
Sensitive Privilege Use
(2)
Special Logon
(2)
Account Lockout
(1)
File Share
(1)
Non Sensitive Privilege Use
(1)
Process Termination
(1)
RPC Events
(1)
SAM
(1)
User account Management
(1)
Operating Systems
Windows 2008
(359)
Windows 2008 R2
(358)
Windows 2012 R2
(358)
Windows 2016
(358)
Windows 2012
(357)
Windows 2019
(351)
Windows 10
(334)
Windows 7
(333)
Windows 8
(333)
Windows 8.1
(333)
Windows Vista
(333)
Tags
Domain Controller
(63)
Audit Success
(37)
Audit Failure
(20)
ID
Event Description
1100
The event logging service has shut down
1102
The audit log was cleared
4608
Windows is starting up
4609
Windows is shutting down
4610
An authentication package has been loaded by the Local Security Authority
4611
A trusted logon process has been registered with the Local Security Authority
4612
Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits
4614
A notification package has been loaded by the Security Account Manager
4615
Invalid use of LPC port
4616
The system time was changed
4618
A monitored security event pattern has occurred.
4621
Administrator recovered system from CrashOnAuditFail.
4622
A security package has been loaded by the Local Security Authority.
4624
An account was successfully logged on
4625
An account failed to log on
4634
An account was logged off
4646
n/a
4647
User initiated logoff
4648
A logon was attempted using explicit credentials
4649
A replay attack was detected
4650
An IPsec main mode security association was established
4651
An IPsec main mode security association was established
4652
An IPsec main mode negotiation failed
4653
An IPsec main mode negotiation failed
4654
An IPsec quick mode negotiation failed
4655
An IPsec main mode security association ended
4656
A handle to an object was requested
4657
A registry value was modified
4658
The handle to an object was closed
4659
A handle to an object was requested with intent to delete
4660
An object was deleted
4661
A handle to an object was requested
4662
An operation was performed on an object
4663
An attempt was made to access an object
4664
An attempt was made to create a hard link
4665
An attempt was made to create an application client context
4666
An application attempted an operation
4667
An application client context was deleted
4668
An application was initialized
4670
Permissions on an object were changed
4671
An application attempted to access a blocked ordinal through the TBS
4672
Special privileges assigned to new logon
4673
A privileged service was called
4674
An operation was attempted on a privileged object
4675
SIDs were filtered
4688
A new process has been created
4689
A process has exited
4690
An attempt was made to duplicate a handle to an object
4691
Indirect access to an object was requested
4692
Backup of data protection master key was attempted
4693
Recovery of data protection master key was attempted
4694
Protection of auditable protected data was attempted
4695
Unprotection of auditable protected data was attempted
4696
A primary token was assigned to process
4697
A service was installed in the system
4698
A scheduled task was created
4699
This event generates every time a scheduled task was deleted.
4700
A scheduled task was enabled
4701
A scheduled task was disabled
4702
A scheduled task was updated
4704
A user right was assigned
4706
A new trust was created to a domain
4707
A trust to a domain was removed
4709
The IPsec Policy Agent service was started
4710
The IPsec Policy Agent service was disabled
4711
PAStore Engine
4712
IPsec Policy Agent encountered a potentially serious failure
4713
Kerberos policy was changed
4714
Data Recovery Agent group policy for Encrypting File System (EFS) has changed
4715
The audit policy (SACL) on an object was changed
4716
Trusted domain information was modified
4717
System security access was granted to an account
4718
System security access was removed from an account
4719
System audit policy was changed
4720
A user account was created
4722
A user account was enabled
4723
An attempt was made to change an account's password
4724
An attempt was made to reset an account's password
4725
A user account was disabled
4726
A user account was deleted
4727
A security-enabled global group was created
4728
A member was added to a security-enabled global group
4729
A member was removed from a security-enabled global group
4730
A security-enabled global group was deleted
4731
A security-enabled local group was created
4732
A member was added to a security-enabled local group
4733
A member was removed from a security-enabled local group
4734
A security-enabled local group was deleted
4735
A security-enabled local group was changed
4737
A security-enabled global group was changed
4738
A user account was changed
4739
Domain Policy was changed
4740
A user account was locked out
4741
A computer account was created
4742
A computer account was changed
4743
A computer account was deleted
4744
A security-disabled local group was created
4745
A security-disabled local group was changed
4746
A member was added to a security-disabled local group
4747
A member was removed from a security-disabled local group
4748
A security-disabled local group was deleted
4749
A security-disabled global group was created
4750
A security-disabled global group was changed
4751
A member was added to a security-disabled global group
4752
A member was removed from a security-disabled global group
4753
A security-disabled global group was deleted
4754
A security-enabled universal group was created
4755
A security-enabled universal group was changed
4756
A member was added to a security-enabled universal group
4757
A member was removed from a security-enabled universal group
4758
A security-enabled universal group was deleted
4759
A security-disabled universal group was created
4760
A security-disabled universal group was changed
4761
A member was added to a security-disabled universal group
4762
A member was removed from a security-disabled universal group
4763
A security-disabled universal group was deleted
4764
A group’s type was changed
4765
SID History was added to an account
4766
An attempt to add SID History to an account failed
4767
A user account was unlocked
4768
This event generates every time Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT).
4769
A Kerberos service ticket was requested
4770
A Kerberos service ticket was renewed
4771
Kerberos pre-authentication failed
4772
A Kerberos authentication ticket request failed
4773
A Kerberos service ticket request failed
4774
An account was mapped for logon
4775
An account could not be mapped for logon
4776
The computer attempted to validate the credentials for an account
4778
A session was reconnected to a Window Station
4779
A session was disconnected from a Window Station
4780
The ACL was set on accounts which are members of administrators groups
4781
The name of an account was changed
4782
The password hash an account was accessed
4783
A basic application group was created
4784
A basic application group was changed
4785
A member was added to a basic application group
4786
A member was removed from a basic application group
4787
A non-member was added to a basic application group
4788
A non-member was removed from a basic application group
4789
A basic application group was deleted
4790
An LDAP query group was created
4791
A basic application group was changed
4792
An LDAP query group was deleted
4793
The Password Policy Checking API was called
4794
An attempt was made to set the Directory Services Restore Mode administrator password
4797
An attempt was made to query the existence of a blank password for an account
4800
The workstation was locked
4801
The workstation was unlocked
4802
The screen saver was invoked
4803
The screen saver was dismissed
4816
RPC detected an integrity violation while decrypting an incoming message. Peer Name: %1 Protocol Sequence: %2 Security Error: %3
4825
A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group
4864
A namespace collision was detected
4865
A trusted forest information entry was added
4866
A trusted forest information entry was removed
4867
A trusted forest information entry was modified
4868
The certificate manager denied a pending certificate request
4869
Certificate Services received a resubmitted certificate request
4870
Certificate Services revoked a certificate
4871
Certificate Services received a request to publish the certificate revocation list (CRL)
4872
Certificate Services published the certificate revocation list (CRL)
4873
A certificate request extension changed
4874
One or more certificate request attributes changed
4875
Certificate Services received a request to shut down
4876
Certificate Services backup started
4877
Certificate Services backup completed
4878
Certificate Services restore started
4879
Certificate Services restore completed
4880
Certificate Services started
4881
Certificate Services stopped
4882
The security permissions for Certificate Services changed
4883
Certificate Services retrieved an archived key
4884
Certificate Services imported a certificate into its database
4885
The audit filter for Certificate Services changed
4886
Certificate Services received a certificate request
4887
Certificate Services approved a certificate request and issued a certificate
4888
Certificate Services denied a certificate request
4889
Certificate Services set the status of a certificate request to pending
4890
The certificate manager settings for Certificate Services changed
4891
A configuration entry changed in Certificate Services
4892
A property of Certificate Services changed
4893
Certificate Services archived a key
4894
Certificate Services imported and archived a key
4895
Certificate Services published the CA certificate to Active Directory Domain Services
4896
One or more rows have been deleted from the certificate database
4897
Role separation enabled
4898
Certificate Services loaded a template
4899
A Certificate Services template was updated
4900
Certificate Services template security was updated
4902
The Per-user audit policy table was created
4904
An attempt was made to register a security event source
4905
An attempt was made to unregister a security event source
4906
The CrashOnAuditFail value has changed
4907
Auditing settings on object were changed
4908
Special Groups Logon table modified
4909
The local policy settings for the TBS were changed
4910
The group policy settings for the TBS were changed
4912
Per User Audit Policy was changed
4928
An Active Directory replica source naming context was established
4929
An Active Directory replica source naming context was removed
4930
An Active Directory replica source naming context was modified
4931
An Active Directory replica destination naming context was modified
4932
Synchronization of a replica of an Active Directory naming context has begun
4933
Synchronization of a replica of an Active Directory naming context has ended
4934
Attributes of an Active Directory object were replicated
4935
Replication failure begins
4936
Replication failure ends
4937
A lingering object was removed from a replica
4944
The following policy was active when the Windows Firewall started
4945
A rule was listed when the Windows Firewall started
4946
A change was made to the Windows Firewall exception list. A rule was added
4947
A change was made to the Windows Firewall exception list. A rule was modified
4948
A change was made to the Windows Firewall exception list. A rule was deleted
4949
Windows Firewall settings were restored to the default values.
4950
A Windows Firewall setting was changed
4951
Windows Firewall ignored a rule because its major version number is not recognized
4952
Windows Firewall ignored parts of a rule because its minor version number is not recognized
4953
Windows Firewall ignored a rule because it could not be parsed
4954
Group Policy settings for Windows Firewall were changed, and the new settings were applied.
4956
Windows Firewall changed the active profile
4957
Windows Firewall did not apply the following rule
4958
Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer
4960
IPsec dropped an inbound packet that failed an integrity check
4961
IPsec dropped an inbound packet that failed a replay check
4962
IPsec dropped an inbound packet that failed a replay check
4963
IPsec dropped an inbound clear text packet that should have been secured
4964
Special groups have been assigned to a new logon
4965
IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI)
4976
During main mode negotiation, IPsec received an invalid negotiation packet
4977
During quick mode negotiation, IPsec received an invalid negotiation packet
4978
During extended mode negotiation, IPsec received an invalid negotiation packet
4979
IPsec main mode and extended mode security associations were established
4980
IPsec main mode and extended mode security associations were established
4981
IPsec main mode and extended mode security associations were established
4982
IPsec main mode and extended mode security associations were established
4983
An IPsec extended mode negotiation failed
4984
An IPsec extended mode negotiation failed
4985
The state of a transaction has changed
5024
The Windows Firewall service started successfully.
5025
The Windows Firewall service was stopped.
5027
The Windows Firewall service was unable to retrieve the security policy from the local storage.
5028
Windows Firewall was unable to parse the new security policy.
5029
The Windows Firewall service failed to initialize the driver.
5030
The Windows Firewall service failed to start.
5031
Windows Firewall blocked an application from accepting incoming connections on the network.
5032
Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
5033
The Windows Firewall Driver started successfully.
5034
The Windows Firewall Driver was stopped.
5035
The Windows Firewall Driver failed to start.
5037
The Windows Firewall Driver detected a critical runtime error.
5038
Code integrity determined that the image hash of a file is not valid.
5039
A registry key was virtualized.
5040
A change was made to IPsec settings. An authentication set was added.
5041
A change was made to IPsec settings. An authentication set was modified.
5042
A change was made to IPsec settings. An authentication set was deleted.
5043
A change was made to IPsec settings. A connection security rule was added.
5044
A change was made to IPsec settings. A connection security rule was modified.
5045
A change was made to IPsec settings. A connection security rule was deleted.
5046
A change was made to IPsec settings. A crypto set was added.
5047
A change was made to IPsec settings. A crypto set was modified.
5048
A change was made to IPsec settings. A crypto set was deleted.
5049
An IPsec security association was deleted.
5050
An attempt to programmatically disable Windows Firewall was rejected.
5051
A file was virtualized.
5056
A cryptographic self test was performed.
5057
A cryptographic primitive operation failed.
5058
Key file operation.
5059
Key migration operation.
5060
Verification operation failed.
5061
Cryptographic operation.
5062
A kernel-mode cryptographic self test was performed.
5063
A cryptographic provider operation was attempted.
5064
A cryptographic context operation was attempted.
5065
A cryptographic context modification was attempted.
5066
A cryptographic function operation was attempted.
5067
A cryptographic function modification was attempted.
5068
A cryptographic function provider operation was attempted.
5069
A cryptographic function property operation was attempted.
5070
A cryptographic function property modification was attempted.
5071
Key access denied by Microsoft key distribution service.
5120
OCSP Responder Service Started.
5121
OCSP Responder Service Stopped.
5122
A Configuration entry changed in the OCSP Responder Service.
5123
A configuration entry changed in the OCSP Responder Service.
5124
A security setting was updated on OCSP Responder Service.
5125
A request was submitted to OCSP Responder Service.
5126
Signing Certificate was automatically updated by the OCSP Responder Service.
5127
The OCSP Revocation Provider successfully updated the revocation information.
5136
A directory service object was modified
5137
A directory service object was created
5138
A directory service object was undeleted.
5139
A directory service object was moved.
5140
A network share object was accessed
5141
A directory service object was deleted.
5152
The Windows Filtering Platform has blocked a packet.
5153
A more restrictive Windows Filtering Platform filter has blocked a packet.
5154
The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.
5155
The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.
5156
The Windows Filtering Platform has allowed a connection.
5157
The Windows Filtering Platform has blocked a connection.
5158
The Windows Filtering Platform has permitted a bind to a local port.
5376
Credential Manager credentials were backed up.
5377
Credential Manager credentials were restored from a backup.
5378
The requested credentials delegation was disallowed by policy.
5440
The following callout was present when the Windows Filtering Platform Base Filtering Engine started.
5441
The following filter was present when the Windows Filtering Platform Base Filtering Engine started.
5442
The following provider was present when the Windows Filtering Platform Base Filtering Engine started.
5443
The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.
5444
The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.
5446
A Windows Filtering Platform callout has been changed.
5447
A Windows Filtering Platform filter has been changed.
5448
A Windows Filtering Platform provider has been changed.
5449
A Windows Filtering Platform provider context has been changed.
5450
A Windows Filtering Platform sub-layer has been changed.
5451
An IPsec quick mode security association was established.
5452
An IPsec quick mode security association ended.
5453
An IPsec negotiation with a remote computer failed.
5456
IPsec Policy Agent applied Active Directory storage IPsec policy on the computer.
5457
IPsec Policy Agent failed to apply Active Directory storage IPsec policy on the computer.
5458
IPsec Policy Agent applied locally cached copy of Active Directory storage IPsec policy on the computer.
5459
IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.
5460
IPsec Policy Agent applied local registry storage IPsec policy on the computer.
5461
IPsec Policy Agent failed to apply local registry storage IPsec policy on the computer
5462
IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer.
5463
IPsec Policy Agent polled for changes to the active IPsec policy and detected no changes.
5464
IPsec Policy Agent polled for changes to the active IPsec policy, detected changes, and applied them.
5465
IPsec Policy Agent received a control for forced reloading of IPsec policy and processed the control successfully.
5466
IPsec Policy Agent polled for changes to the Active Directory IPsec policy.
5467
IPsec Policy Agent polled for changes to the Active Directory IPsec policy.
5468
IPsec Policy Agent polled for changes to the Active Directory IPsec policy.
5471
IPsec Policy Agent loaded local storage IPsec policy on the computer.
5472
IPsec Policy Agent failed to load local storage IPsec policy on the computer.
5473
IPsec Policy Agent loaded directory storage IPsec policy on the computer.
5474
IPsec Policy Agent failed to load directory storage IPsec policy on the computer.
5477
IPsec Policy Agent failed to add quick mode filter.
5478
The IPsec Policy Agent service was started.
5479
The IPsec Policy Agent service was stopped.
5480
IPsec Policy Agent failed to get the complete list of network interfaces on the computer.
5483
The IPsec Policy Agent service failed to initialize its RPC server.
5484
The IPsec Policy Agent service experienced a critical failure and has shut down.
5485
IPsec Policy Agent failed to process some IPsec filters on a plug-and-play event for network interfaces.
5632
A request was made to authenticate to a wireless network.
5633
A request was made to authenticate to a wired network.
5712
A Remote Procedure Call (RPC) was attempted.
5888
An object in the COM+ Catalog was modified.
5889
An object was deleted from the COM+ Catalog.
5890
An object was added to the COM+ Catalog.
6144
Security policy in the group policy objects has been applied successfully.
6145
One or more errors occurred while processing security policy in the group policy objects.
6272
Network Policy Server granted access to a user.
6273
Network Policy Server denied access to a user.
6274
Network Policy Server discarded the request for a user.
6275
Network Policy Server discarded the accounting request for a user.
6276
Network Policy Server quarantined a user.
6277
Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.
6278
Network Policy Server granted full access to a user because the host met the defined health policy.
6279
Network Policy Server locked the user account due to repeated failed authentication attempts.
6280
Network Policy Server unlocked the user account.