Back to Resources

Windows Event IDs Reference

Cheat Sheet

Comprehensive reference for Windows Event IDs used in SOC log analysis. Includes authentication events, process events, network events, and common queries.

Windows Event IDs Cheat Sheet

Quick reference for common Windows Event IDs used in SOC log analysis.

Authentication Events

Successful Logons

Event IDDescriptionLogUse Case
4624Successful logonSecurityTrack successful authentication
4648Logon with explicit credentialsSecurityService account logons
4672Special privileges assignedSecurityPrivilege escalation

Failed Logons

Event IDDescriptionLogUse Case
4625Failed logon attemptSecurityBrute force detection
4648Explicit credentials used (failed)SecurityFailed service logon

Logoff Events

Event IDDescriptionLogUse Case
4634Account logged offSecurityTrack session duration
4647User initiated logoffSecurityNormal logoff

Account Management

Event IDDescriptionLogUse Case
4720User account createdSecurityUnauthorized account creation
4722User account enabledSecurityAccount activation
4724Password reset attemptSecurityPassword reset monitoring
4726User account deletedSecurityAccount deletion tracking
4732Member added to security groupSecurityPrivilege escalation
4733Member removed from security groupSecurityPrivilege reduction

Process & Service Events

Event IDDescriptionLogUse Case
4688New process createdSecurityProcess monitoring, malware detection
4697Service installedSecurityUnauthorized service installation
4698Scheduled task createdSecurityPersistence mechanism detection
4702Scheduled task updatedSecurityTask modification tracking

Network Events

Event IDDescriptionLogUse Case
5156Windows Firewall allowed connectionSecurityFirewall rule tracking
5157Windows Firewall blocked connectionSecurityBlocked connection analysis
5158Windows Firewall rule modifiedSecurityFirewall rule changes

File & Object Access

Event IDDescriptionLogUse Case
4656Handle to object requestedSecurityFile access tracking (requires auditing)
4658Handle to object closedSecurityFile access completion
4663Attempt to access objectSecurityFailed access attempts

System Events

Event IDDescriptionLogUse Case
1074System shutdown initiatedSystemUnauthorized shutdowns
6005Event log service startedSystemSystem startup tracking
6006Event log service stoppedSystemSystem shutdown tracking
6008Previous shutdown was unexpectedSystemSystem crash detection

PowerShell & Scripting

Event IDDescriptionLogUse Case
4103PowerShell script block loggedPowerShellScript execution monitoring
4104PowerShell script executionPowerShellMalicious script detection
4105PowerShell command executionPowerShellCommand monitoring

Common SOC Queries

Failed Logon Attempts (Brute Force)

EventCode=4625
| stats count by src_ip, user, _time
| where count > 10

Successful Admin Logons

EventCode=4624 LogonType=10 AccountType=Admin
| stats count by user, src_ip

Process Creation (Suspicious)

EventCode=4688
| search ProcessName IN (*cmd.exe*, *powershell.exe*, *wscript.exe*)
| stats count by ProcessName, user

Account Creation

EventCode=4720
| stats count by TargetUserName, _time

Scheduled Task Creation

EventCode=4698
| stats count by TaskName, user

Logon Types Reference

Logon TypeDescriptionCommon Use
2InteractiveLocal logon
3NetworkNetwork share access
4BatchScheduled task
5ServiceService account
7UnlockScreen unlock
8NetworkCleartextNetwork logon (unencrypted)
9NewCredentialsRunAs with new credentials
10RemoteInteractiveRDP logon
11CachedInteractiveCached credentials

Security Event Log Locations

  • Security Log: C:\Windows\System32\winevt\Logs\Security.evtx
  • System Log: C:\Windows\System32\winevt\Logs\System.evtx
  • Application Log: C:\Windows\System32\winevt\Logs\Application.evtx
  • PowerShell Log: C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx

Tools for Analysis

  • Event Viewer: Built-in Windows tool
  • PowerShell: Get-WinEvent cmdlet
  • Splunk: Windows Event Log add-on
  • ELK Stack: Winlogbeat for log collection
  • Sysmon: Enhanced logging (requires installation)

Last Updated: [Date]
Version: 1.0