SOC Operations

Windows Event Log Analysis

9 min read

Windows Event Logs are goldmine for security investigations. Knowing which Event IDs to monitor is essential for threat detection.

Critical Event IDs

Event IDLogDescription
4624SecuritySuccessful logon
4625SecurityFailed logon
4648SecurityLogon with explicit credentials
4672SecurityAdmin privileges assigned
4688SecurityNew process created
4698SecurityScheduled task created
4720SecurityUser account created
4732SecurityUser added to local group
7045SystemService installed

Logon Types

Type 2Interactive (local)
Type 3Network (SMB, file share)
Type 4Batch (scheduled task)
Type 5Service
Type 7Unlock
Type 10RemoteInteractive (RDP)

Sysmon Critical Events

Investigation Tips

December 2024