SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Oct 2016 ver 2.1 MalwareArchaeology.com Page 1 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
ENABLE::
1. LOCAL LOG SIZE: Increase the size of your local logs. Don’t
worry you have plenty of disk space, CPU is not an issue
a. Application, System logs - 256k or larger
b. PowerShell logs - 256k or larger
c. Security Log - 512,000k (yes this big) (1,024,000)
2. LOCAL SECURITY POLICY: Change Security Options –
“Audit: Force audit policy subcategory settings” to
ENABLE. This sets the system to force use of the
“Advanced Audit Policies”
3. GROUP POLICY: All settings mentioned should be set with
Active Directory Group Policy in order to enforce these
settings enterprise wide. There are cases where the Local
Security Policy would be used.
ENABLE::
1. DNS LOGS: Enable DNS Logging. Capture what DNS
queries are happening.
“systemrootSystem32DnsDns.log”
a. Log Packets for debugging
b. Outgoing and incoming
c. UDP and TCP
d. Packet type Request and Response
e. Queries/Transfers and updates
2. DHCP LOGS: Add your DHCP Logs –
“%windir%System32Dhcp.” This will allow you to
detect rogue systems on your network that fall
outside your naming convention.
a. EventID = 10 – New IP address was leased
DEFINITIONS::
ENABLE: Things you must do to enable logging to start collecting and keeping events.
CONFIGURE: Configuration that is needed to refine what events you will collect.
GATHER: Tools/Utilities that you can use locally on the system to set or gather log related information – AuditPol, WEvtUtil, Find, etc.
HARVEST: Events that you would want to harvest into some centralized Event log management solution like syslog, SIEM, Splunk, etc.
RESOURCES: Places to get more information
 MalwareArchaeology.com/cheat-sheets for more Windows cheat sheets
 Log-MD.com – The Log Malicious Discovery tool reads security related log events and settings. Use Log-MD to audit your log
settings compared to the “Windows Logging Cheat Sheet” and Center for Internet Security (CIS) Benchmarks. It is a
standalone tool to help those with and without a log management solution find malicious activity.
 www.ultimatewindowssecurity.com/securitylog/encyclopedia/Default.aspx - Better descriptions of Event OD’s
 www.EventID.Net – Most of the Event ID’s
 IIS Error Codes - http://support.microsoft.com/kb/318380 - IIS Error Codes
 http://cryptome.org/2014/01/nsa-windows-event.pdf - Good Article
 http://technet.microsoft.com/en-us/library/dd772712(v=ws.10).aspx – MS Adv Security Audit Policy Descriptions
 https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511 (new)
 Google! – But of course
This “Windows Logging Cheat Sheet” is intended to help you get started setting up
basic and necessary Windows Audit Policy and Logging. By no means is this list
extensive; but it does include some very common items that should be enabled,
configured, gathered and harvested for any Log Management Program. Start with
these settings and add to it as you understand better what is in your logs and what
you need.
Oct 2016 ver 2.1 MalwareArchaeology.com Page 2 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
Windows Audit Policy settings may be set by the Local Security Policy, Group Policy (preferred) or by command line using
‘AuditPol.exe’. Be sure to select “Configure the following audit events” box on items that say “No Audit” or the policy will not
apply. Any that are left blank will break the GPO and auditing will not be applied. (N) = Will generate large number of events or
noise and filtering of events may be needed. (C) Indicates a setting changed.
CONFIGURE::
1. SYSTEM AUDIT POLICIES: In order to capture what you
want and need the following Advanced Audit Policies must
be set. You may expand these to your specific needs, but
here is a place to start.
List out the System audit policy
 Command: AuditPol /get /category:*
Category/Subcategory Setting
------------------------------- ------------------------
Account Logon
 Credential Validation Success and Failure
 Kerberos Authentication Service No Auditing
 Kerberos Service Ticket Oper No Auditing
 Other Account Logon Events Success and Failure
Account Management
 Application Group Management Success and Failure
 Computer Account Management Success and Failure
 Distribution Group Management Success and Failure
 Other Acct Management Events Success and Failure
 Security Group Management Success and Failure
 User Account Management Success and Failure
Detailed Tracking
 DPAPI Activity No Auditing
 Plug and Play (10/2016) Success
 Process Creation Success and Failure (N)
 Process Termination Success and Failure (N)
 RPC Events Success and Failure
 Audit Audit Token Right Adj (10/2016) Success (N)
DS Access
 Detailed Directory Service Repl No Auditing
 Directory Service Access No Auditing
 Directory Service Changes Success and Failure
 Directory Service Replication No Auditing
Logon/Logoff
 Account Lockout Success
 Group Membership (10/2016) Success
 IPsec Extended Mode No Auditing
 IPsec Main Mode No Auditing
 IPsec Quick Mode No Auditing
 Logoff Success
 Logon Success and Failure
 Network Policy Server Success and Failure
 Other Logon/Logoff Events Success and Failure
 Special Logon Success and Failure
 User / Device Claims (8/2012) No Auditing
CONFIGURE::
SYSTEM AUDIT POLICIES: Continued
To set an item:
 Auditpol /set /category:"Account Management"
/success:enable /failure:enable
Category/Subcategory Setting
------------------------------- ------------------------
Object Access
 Application Generated Success and Failure
 Certification Services Success and Failure
 Central Policy Staging (8/2012) No Auditing
 Detailed File Share Success
 File Share Success and Failure
 File System Success
 Filtering Platform Connection Success (Win FW) (N)
 Filtering Platform Packet Drop No Auditing
 Handle Manipulation No Auditing (N)
 Kernel Object No Auditing (C)
 Other Object Access Events No Auditing
 Removable Storage (8/2012) Success and Failure
 Registry Success
 SAM Success (C)
Policy Change
 Audit Policy Change Success and Failure
 Authentication Policy Change Success and Failure
 Authorization Policy Change Success and Failure
 Filtering Platform Policy Change Success (Win FW)
 MPSSVC Rule-Level Policy Change No Auditing
 Other Policy Change Events No Auditing
Privilege Use
 Non Sensitive Privilege Use No Auditing
 Other Privilege Use Events No Auditing
 Sensitive Privilege Use Success and Failure
System
 IPsec Driver Success
 Other System Events Failure
 Security State Change Success and Failure
 Security System Extension Success and Failure
 System Integrity Success and Failure
Global Object Access Auditing – ignore for now
Oct 2016 ver 2.1 MalwareArchaeology.com Page 3 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
CONFIGURE::
1. WEvtUtil: Use this utility to configure your log settings
a. WevtUtil gl Security – List settings of the Security Log
b. WevtUtil sl Security /ms:524288000 or /ms: 1048576000 if File & Registry auditing, Windows Firewall and
Process Create are all enabled – Set the Security log size to the number of bytes
c. WevtUtil sl Security /rt:false – Overwrite as needed
2. FILE AUDITING: Configuring auditing of folders and specific files will allow you to catch new file drops in key locations
where commodity and advanced malware often use. To understand what, where and why to audit files and folders,
refer to the “Windows File Auditing Cheat Sheet” for more detailed information.
3. REGISTRY AUDITING: Configuring auditing of registry keys will allow you to catch new keys, values and data in
autorun and other locations where commodity and advanced malware often use. To understand what, where and
why to audit registry keys, refer to the “Windows Registry Auditing Cheat Sheet” for more detailed information.
4. REG.EXE: Use this utility to query what is in a Key or the data within a key or value
a. Query a Key and all values - Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun"
b. Query a Key and all values - Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnce"
c. Query a Key and all values - Reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRun"
d. Query a Key and all values - Reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce"
e. Query a known value of a Key:
Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun" /v malware
CONFIGURE:
5. Command Line Logging: One of the most important logging items that you can collect is what was executed on the
command line when something executes. Microsoft added this capability into the release of Windows 8.1 and
Windows Server 2012 R2 and later versions. In Feb 2015 a patch was made available to add this feature to all
Windows 7 and Windows 2008 Server with the following patch:
 https://support.microsoft.com/en-us/kb/3004375 - KB3004375 Patch to add Command Line Logging
A registry key or GPO change is required to add the “Process Command Line” entry to every event ID 4688 event. The
following is the key, value and data that must be set to collect this crucial information:
 "hklmsoftwaremicrosoftwindowscurrentversionpoliciessystemaudit" – Value =
ProcessCreationIncludeCmdLine_Enabled - REG_DWORD = 1
You can configure it to start collecting with the following command:
 reg add "hklmsoftwaremicrosoftwindowscurrentversionpoliciessystemaudit" /v
ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1
Oct 2016 ver 2.1 MalwareArchaeology.com Page 4 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
GATHER::
1. AUDITPOL: Use this utility to view your current log settings
a. List all Policies categories: AuditPol /List /Subcategory:*
b. List what is SET: AuditPol /get /category:*
c. List what is SET for a subcategory:
 AuditPol /get /category:"Object Access”
2. Reg.exe: Use this utility to query the registry
a. Changes to AppInit_Dlls - reg query "HKLMSoftwareMicrosoftWindows NTCurrentVersionWindows" /v
AppInit_Dlls
b. Changes to Services Keys - reg query "HKLMSystemCurrentControlSetServices"
c. Changes to Machine Run Key - reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun”
d. Changes to Machine RunOnce Key - reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnce”
e. Changes to User Run Key - reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRun”
f. Changes to User RunOnce Key - reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce”
g.
3. SC.exe: Use this utility to query the services (sc /? For help)
a. List all services in any state – sc.exe query state= all (Note: ‘space’ after the = sign)
b. Look for a specific service – sc.exe query state= all | find /I “telnet”
c. After finding the ‘Display_Name’ then look for the ‘Service_Name’ to get the short name
GATHER::
1. WEvtUtil: Use this utility to query your logs
a. WevtUtil qe Security – query the Security Log for events
i. Lots of flags here so read help “WevtUtil -?”
ii. /c:5 = Read 5 events
iii. /rd:true = newest events first
iv. /f:text = format text, also can do XML
b. Success & Failed Logons - WevtUtil qe Security /q:"*[System[(EventID=4624 or EventID=4625)]]" /c:5 /rd:true
/f:text >Parsed%computername%_Logon_Events_Win7.log
c. User Account Change - WevtUtil qe Security /q:"*[System[(EventID=4738)]]" /c:5 /rd:true /f:text
>ParsedR_%computername%_User_Account_Change_Win7.log
d. New Service Installed - WevtUtil qe Security /q:"*[System[(EventID=7045)]]" /c:5 /rd:true /f:text
>ParsedR_%computername%_New_Service_Installed_Win7.log
e. User Account Changes - wevtutil qe Security /q:"*[System[(EventID=4725 or EventID=4722 or EventID=4723 or
EventID=4724 or EventID=4726 or EventID=4767)]]" /c:10 /f:text
2. Filtering Log Results: Use this method to filter lines within the logs
a. Registry Changed – Find entries with ‘Object Name’ - WevtUtil qe Security /q:"*[System[(EventID=4657)]]" /c:5
/rd:true /f:text |find /i"Object Name"
b. File or Registry Changed – Find entries with ‘Object Name’ - WevtUtil qe Security /q:"*[System[(EventID=4663)]]"
/c:50 /rd:true /f:text |find /i "Object Name"
c. Files – Find new files with ‘Wbem’ - WevtUtil qe Security /q:"*[System[(EventID=4663)]]" /c:50 /rd:true /f:text
|find /i "wbem"
Oct 2016 ver 2.1 MalwareArchaeology.com Page 5 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
HARVEST::
1. SERVICES: Found in the SYSTEM log
d. 7045 - Message=A service was installed in the system.
e. 7040 - Message=The start type of the XYZ service was changed from auto start to disabled.
f. 7000 - Message=The XYX service failed to start due to the following error: The service did not respond to the start
or control request in a timely fashion.
g. 7022 - Message=The XYZ service hung on starting.
h. 7024 - Message=The XYZ service terminated with service-specific error %%2414.
i. 7031 - Message=The XYZ service terminated unexpectedly. It has done this 1 time(s). The following corrective
action will be taken in 60000 milliseconds: Restart the service.
j. 7034 - Message=The XYZ service terminated unexpectedly. It has done this 1 time(s).
k. 7035 – Service sent a request to Stop or Start
l. 7036 – Service was Started or Stopped
HARVEST::
1. LOG CLEAR: Watch for log clear messages
a. 104 – SYSTEM Log – The Application or System log
was cleared
b. 1102 – SECURITY Log – The audit log was cleared
2. TASKS: Watch for a Process to start and call other
processes
a. 4698 – SECURITY Log – New Task Created
3. DRIVER: Watch for an issue with a driver
a. 40 – Issue with Driver
4. OS VERSION: What OS do machines have
a. 6009 – Lists OS version, Service Pack and processor
type
HARVEST::
1. PROCESSES: Watch for a Process to start and call other
processes
a. 4688 – SECURITY Log – New Process Name, look
for Creator Process ID to link what process
launched what
2. INSTALLER: Watch for the Windows Installer activity
a. 1022 – Windows Installer updated the product
b. 1033 – Windows Installer installed the product
c. 1034 – Windows Installer removed the product
3. WINDOWS UPDATE: Watch for the Windows Update
Agent activity.
a. 18 = Ready, 19 = Installed, 20= Failure
4. WINDOWS TIME: Watch for the Windows Service
synchronization. Make sure your sources are what they
are supposed to be.
a. 35 – Time Service sync status and source
5. APPLICATION ERROR: Watch for application crashes.
a. 1000 – (Application Log) Application Fault
6. TASKSCHEDULER LOG: Enable this log and watch for
Created Task and Deleted Task.
a. 129 – Created, 141 – Deleted (New)
HARVEST::
1. ACCOUNTS: Monitor for attempts to change an account
password
a. 4720 – A user account was created
b. 4724 – An attempt was made to reset an accounts PW
c. 4735 – Local Group changed
d. 4738 – User account password changed
HARVEST::
1. APPLOCKER: Watch for triggers to AppLocker events (8000-
8027)
a. 8004 – Filename not allowed to run
2. SRP: Watch for triggers to Software Restriction Policies
b. 866 – Access to <filename> has been restricted
HARVEST::
1. AUDIT POLICY: Watch for changes to the Audit Policy that
are NOT “SYSTEM”
a. 4719 – System audit policy was changed
Oct 2016 ver 2.1 MalwareArchaeology.com Page 6 of 6
WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012
HARVEST::
1. NEW FILE ADDED: Watch for the creation of new files.
Requires File auditing of the directory(s) that you want to
monitor
b. 4663 – Accesses: WriteData (or AddFile)
c. GREAT for CryptoWare & Malware drops
HARVEST::
1. REGISTRY: Watch for the creation or modification of new registry keys and values
a. 4657 – Accesses: WriteData (or AddFile)
i. HKLM, HKCU & HKU – SoftwareMicrosoftWindowsCurrentVersion
1. Run, RunOnce
ii. HKLMSoftwareMicrosoftWindows NTCurrentVersionWindows
1. Watch AppInit_Dlls
iii. HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionEMDMgmt
1. Watch Connection time of USB Devices
iv. HKLMSystemCurrentControlSetServices
1. Watch for NEW Services
v. HKLMSYSTEMCurrentControlSetEnumUSBSTOR
1. Watch for NEW USB devices
HARVEST::
2. FIREWALL: Windows Filtering Platform - Watch for
Inbound and Outbound connections – Requires
Windows Firewall to be enabled
a. This is the noisiest of all Events. Generating
easily 9,000 - 10,000 events per hour per system
b. Storage is required to utilize this event
c. 5156 – Message=The Windows Filtering
Platform has permitted a connection. Look for:
i. Direction:, Source Address:, Source
Port:, Destination Address: &
Destination Port:
HARVEST::
1. REGISTRY: Monitor certain Keys for Add, Changes and
Deletes. Setting auditing on the Specific keys is
required.
a. 4657 – A Registry value was modified
HARVEST::
1. EMAIL / VPN: Monitor for failed and successful logins
to your VPN and Webmail application. Consider
emailing user if login is from a new IP not in your
exclude list
a. sc_status=401 – Failed OWA login
b. "reason = Invalid password" – Failed VPN login
- Cisco
HARVEST::
1. LOGON TYPE: Monitor for what type of logons occur
a. 4624 - Message=An account was successfully
logged on.
i. Type 2 – Interactive – GUI
ii. Type 3 – Network – Net Use
iii. Type 4 – Batch
iv. Type 5 – Service
v. Type 7 – Unlock
vi. Type 8 – Network Clear Text
vii. Type 9 – New Credentials (RDP Tools)
viii. Type 10 – Remote Interactive (RDP)
ix. Type 11 – Cached Interactive (laptops)
b. 4625 - Message = An account failed to log on.
HARVEST::
1. SYSTEM INTEGRITY: Watch for files with page images with
bad hashes
a. 6281 – Failed – “page hashes of an image file are
not valid”

Weitere ähnliche Inhalte

Was ist angesagt?

OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
gbud7
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
Octogence
 

Was ist angesagt? (20)

NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50
 
OWASP Top Ten
OWASP Top TenOWASP Top Ten
OWASP Top Ten
 
CNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NETCNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NET
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
MindMap - Forensics Windows Registry Cheat Sheet
MindMap - Forensics Windows Registry Cheat SheetMindMap - Forensics Windows Registry Cheat Sheet
MindMap - Forensics Windows Registry Cheat Sheet
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
CHFI v10
CHFI v10CHFI v10
CHFI v10
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
ايزو27001أسس ومبادئ
ايزو27001أسس ومبادئايزو27001أسس ومبادئ
ايزو27001أسس ومبادئ
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Finding attacks with these 6 events
Finding attacks with these 6 eventsFinding attacks with these 6 events
Finding attacks with these 6 events
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 

Andere mochten auch

SPLUNK Power User Certification
SPLUNK Power User CertificationSPLUNK Power User Certification
SPLUNK Power User Certification
Cesar Cobena
 
splunk power user certification
splunk power user certificationsplunk power user certification
splunk power user certification
Anand Sunder
 
SplunkLive! Beginner Session
SplunkLive! Beginner SessionSplunkLive! Beginner Session
SplunkLive! Beginner Session
Splunk
 

Andere mochten auch (11)

SPLUNK Power User Certification
SPLUNK Power User CertificationSPLUNK Power User Certification
SPLUNK Power User Certification
 
Splunk
SplunkSplunk
Splunk
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
 
Splunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout Session
 
splunk power user certification
splunk power user certificationsplunk power user certification
splunk power user certification
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
SplunkLive! Beginner Session
SplunkLive! Beginner SessionSplunkLive! Beginner Session
SplunkLive! Beginner Session
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thief
 
Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware Archaeologist
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | Edureka
 

Ähnlich wie Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com

Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1
chenley
 
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
Microsoft Private Cloud
 

Ähnlich wie Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com (20)

Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeologyWindows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
 
Merged document
Merged documentMerged document
Merged document
 
Identity finder presentation
Identity finder presentationIdentity finder presentation
Identity finder presentation
 
Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...
Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...
Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...
 
2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive
 
Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
What's New in Windows 7
What's New in Windows 7What's New in Windows 7
What's New in Windows 7
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
Handson1 6 federp
Handson1 6 federpHandson1 6 federp
Handson1 6 federp
 
Under New Management
Under New ManagementUnder New Management
Under New Management
 
Vistapresentation2
Vistapresentation2Vistapresentation2
Vistapresentation2
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
 
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
Microsoft Windows Server 2008 R2 - AD RMS Bulk Protection Tool and File Class...
 
Stay clear of the bugs: Troubleshooting Applications in Microsoft Azure
Stay clear of the bugs: Troubleshooting Applications in Microsoft AzureStay clear of the bugs: Troubleshooting Applications in Microsoft Azure
Stay clear of the bugs: Troubleshooting Applications in Microsoft Azure
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 

Mehr von Michael Gough

Mehr von Michael Gough (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
When Security Tools Fail You
When Security Tools Fail YouWhen Security Tools Fail You
When Security Tools Fail You
 
You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to be
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
 
You can detect PowerShell attacks
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacks
 
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
 
Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0
 
InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
 
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malwareEmail keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malware
 
Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1
 
Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0
 
DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1
 
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0
 
Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com

  • 1. Oct 2016 ver 2.1 MalwareArchaeology.com Page 1 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 ENABLE:: 1. LOCAL LOG SIZE: Increase the size of your local logs. Don’t worry you have plenty of disk space, CPU is not an issue a. Application, System logs - 256k or larger b. PowerShell logs - 256k or larger c. Security Log - 512,000k (yes this big) (1,024,000) 2. LOCAL SECURITY POLICY: Change Security Options – “Audit: Force audit policy subcategory settings” to ENABLE. This sets the system to force use of the “Advanced Audit Policies” 3. GROUP POLICY: All settings mentioned should be set with Active Directory Group Policy in order to enforce these settings enterprise wide. There are cases where the Local Security Policy would be used. ENABLE:: 1. DNS LOGS: Enable DNS Logging. Capture what DNS queries are happening. “systemrootSystem32DnsDns.log” a. Log Packets for debugging b. Outgoing and incoming c. UDP and TCP d. Packet type Request and Response e. Queries/Transfers and updates 2. DHCP LOGS: Add your DHCP Logs – “%windir%System32Dhcp.” This will allow you to detect rogue systems on your network that fall outside your naming convention. a. EventID = 10 – New IP address was leased DEFINITIONS:: ENABLE: Things you must do to enable logging to start collecting and keeping events. CONFIGURE: Configuration that is needed to refine what events you will collect. GATHER: Tools/Utilities that you can use locally on the system to set or gather log related information – AuditPol, WEvtUtil, Find, etc. HARVEST: Events that you would want to harvest into some centralized Event log management solution like syslog, SIEM, Splunk, etc. RESOURCES: Places to get more information  MalwareArchaeology.com/cheat-sheets for more Windows cheat sheets  Log-MD.com – The Log Malicious Discovery tool reads security related log events and settings. Use Log-MD to audit your log settings compared to the “Windows Logging Cheat Sheet” and Center for Internet Security (CIS) Benchmarks. It is a standalone tool to help those with and without a log management solution find malicious activity.  www.ultimatewindowssecurity.com/securitylog/encyclopedia/Default.aspx - Better descriptions of Event OD’s  www.EventID.Net – Most of the Event ID’s  IIS Error Codes - http://support.microsoft.com/kb/318380 - IIS Error Codes  http://cryptome.org/2014/01/nsa-windows-event.pdf - Good Article  http://technet.microsoft.com/en-us/library/dd772712(v=ws.10).aspx – MS Adv Security Audit Policy Descriptions  https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511 (new)  Google! – But of course This “Windows Logging Cheat Sheet” is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common items that should be enabled, configured, gathered and harvested for any Log Management Program. Start with these settings and add to it as you understand better what is in your logs and what you need.
  • 2. Oct 2016 ver 2.1 MalwareArchaeology.com Page 2 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 Windows Audit Policy settings may be set by the Local Security Policy, Group Policy (preferred) or by command line using ‘AuditPol.exe’. Be sure to select “Configure the following audit events” box on items that say “No Audit” or the policy will not apply. Any that are left blank will break the GPO and auditing will not be applied. (N) = Will generate large number of events or noise and filtering of events may be needed. (C) Indicates a setting changed. CONFIGURE:: 1. SYSTEM AUDIT POLICIES: In order to capture what you want and need the following Advanced Audit Policies must be set. You may expand these to your specific needs, but here is a place to start. List out the System audit policy  Command: AuditPol /get /category:* Category/Subcategory Setting ------------------------------- ------------------------ Account Logon  Credential Validation Success and Failure  Kerberos Authentication Service No Auditing  Kerberos Service Ticket Oper No Auditing  Other Account Logon Events Success and Failure Account Management  Application Group Management Success and Failure  Computer Account Management Success and Failure  Distribution Group Management Success and Failure  Other Acct Management Events Success and Failure  Security Group Management Success and Failure  User Account Management Success and Failure Detailed Tracking  DPAPI Activity No Auditing  Plug and Play (10/2016) Success  Process Creation Success and Failure (N)  Process Termination Success and Failure (N)  RPC Events Success and Failure  Audit Audit Token Right Adj (10/2016) Success (N) DS Access  Detailed Directory Service Repl No Auditing  Directory Service Access No Auditing  Directory Service Changes Success and Failure  Directory Service Replication No Auditing Logon/Logoff  Account Lockout Success  Group Membership (10/2016) Success  IPsec Extended Mode No Auditing  IPsec Main Mode No Auditing  IPsec Quick Mode No Auditing  Logoff Success  Logon Success and Failure  Network Policy Server Success and Failure  Other Logon/Logoff Events Success and Failure  Special Logon Success and Failure  User / Device Claims (8/2012) No Auditing CONFIGURE:: SYSTEM AUDIT POLICIES: Continued To set an item:  Auditpol /set /category:"Account Management" /success:enable /failure:enable Category/Subcategory Setting ------------------------------- ------------------------ Object Access  Application Generated Success and Failure  Certification Services Success and Failure  Central Policy Staging (8/2012) No Auditing  Detailed File Share Success  File Share Success and Failure  File System Success  Filtering Platform Connection Success (Win FW) (N)  Filtering Platform Packet Drop No Auditing  Handle Manipulation No Auditing (N)  Kernel Object No Auditing (C)  Other Object Access Events No Auditing  Removable Storage (8/2012) Success and Failure  Registry Success  SAM Success (C) Policy Change  Audit Policy Change Success and Failure  Authentication Policy Change Success and Failure  Authorization Policy Change Success and Failure  Filtering Platform Policy Change Success (Win FW)  MPSSVC Rule-Level Policy Change No Auditing  Other Policy Change Events No Auditing Privilege Use  Non Sensitive Privilege Use No Auditing  Other Privilege Use Events No Auditing  Sensitive Privilege Use Success and Failure System  IPsec Driver Success  Other System Events Failure  Security State Change Success and Failure  Security System Extension Success and Failure  System Integrity Success and Failure Global Object Access Auditing – ignore for now
  • 3. Oct 2016 ver 2.1 MalwareArchaeology.com Page 3 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 CONFIGURE:: 1. WEvtUtil: Use this utility to configure your log settings a. WevtUtil gl Security – List settings of the Security Log b. WevtUtil sl Security /ms:524288000 or /ms: 1048576000 if File & Registry auditing, Windows Firewall and Process Create are all enabled – Set the Security log size to the number of bytes c. WevtUtil sl Security /rt:false – Overwrite as needed 2. FILE AUDITING: Configuring auditing of folders and specific files will allow you to catch new file drops in key locations where commodity and advanced malware often use. To understand what, where and why to audit files and folders, refer to the “Windows File Auditing Cheat Sheet” for more detailed information. 3. REGISTRY AUDITING: Configuring auditing of registry keys will allow you to catch new keys, values and data in autorun and other locations where commodity and advanced malware often use. To understand what, where and why to audit registry keys, refer to the “Windows Registry Auditing Cheat Sheet” for more detailed information. 4. REG.EXE: Use this utility to query what is in a Key or the data within a key or value a. Query a Key and all values - Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun" b. Query a Key and all values - Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnce" c. Query a Key and all values - Reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRun" d. Query a Key and all values - Reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce" e. Query a known value of a Key: Reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun" /v malware CONFIGURE: 5. Command Line Logging: One of the most important logging items that you can collect is what was executed on the command line when something executes. Microsoft added this capability into the release of Windows 8.1 and Windows Server 2012 R2 and later versions. In Feb 2015 a patch was made available to add this feature to all Windows 7 and Windows 2008 Server with the following patch:  https://support.microsoft.com/en-us/kb/3004375 - KB3004375 Patch to add Command Line Logging A registry key or GPO change is required to add the “Process Command Line” entry to every event ID 4688 event. The following is the key, value and data that must be set to collect this crucial information:  "hklmsoftwaremicrosoftwindowscurrentversionpoliciessystemaudit" – Value = ProcessCreationIncludeCmdLine_Enabled - REG_DWORD = 1 You can configure it to start collecting with the following command:  reg add "hklmsoftwaremicrosoftwindowscurrentversionpoliciessystemaudit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1
  • 4. Oct 2016 ver 2.1 MalwareArchaeology.com Page 4 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 GATHER:: 1. AUDITPOL: Use this utility to view your current log settings a. List all Policies categories: AuditPol /List /Subcategory:* b. List what is SET: AuditPol /get /category:* c. List what is SET for a subcategory:  AuditPol /get /category:"Object Access” 2. Reg.exe: Use this utility to query the registry a. Changes to AppInit_Dlls - reg query "HKLMSoftwareMicrosoftWindows NTCurrentVersionWindows" /v AppInit_Dlls b. Changes to Services Keys - reg query "HKLMSystemCurrentControlSetServices" c. Changes to Machine Run Key - reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRun” d. Changes to Machine RunOnce Key - reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnce” e. Changes to User Run Key - reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRun” f. Changes to User RunOnce Key - reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce” g. 3. SC.exe: Use this utility to query the services (sc /? For help) a. List all services in any state – sc.exe query state= all (Note: ‘space’ after the = sign) b. Look for a specific service – sc.exe query state= all | find /I “telnet” c. After finding the ‘Display_Name’ then look for the ‘Service_Name’ to get the short name GATHER:: 1. WEvtUtil: Use this utility to query your logs a. WevtUtil qe Security – query the Security Log for events i. Lots of flags here so read help “WevtUtil -?” ii. /c:5 = Read 5 events iii. /rd:true = newest events first iv. /f:text = format text, also can do XML b. Success & Failed Logons - WevtUtil qe Security /q:"*[System[(EventID=4624 or EventID=4625)]]" /c:5 /rd:true /f:text >Parsed%computername%_Logon_Events_Win7.log c. User Account Change - WevtUtil qe Security /q:"*[System[(EventID=4738)]]" /c:5 /rd:true /f:text >ParsedR_%computername%_User_Account_Change_Win7.log d. New Service Installed - WevtUtil qe Security /q:"*[System[(EventID=7045)]]" /c:5 /rd:true /f:text >ParsedR_%computername%_New_Service_Installed_Win7.log e. User Account Changes - wevtutil qe Security /q:"*[System[(EventID=4725 or EventID=4722 or EventID=4723 or EventID=4724 or EventID=4726 or EventID=4767)]]" /c:10 /f:text 2. Filtering Log Results: Use this method to filter lines within the logs a. Registry Changed – Find entries with ‘Object Name’ - WevtUtil qe Security /q:"*[System[(EventID=4657)]]" /c:5 /rd:true /f:text |find /i"Object Name" b. File or Registry Changed – Find entries with ‘Object Name’ - WevtUtil qe Security /q:"*[System[(EventID=4663)]]" /c:50 /rd:true /f:text |find /i "Object Name" c. Files – Find new files with ‘Wbem’ - WevtUtil qe Security /q:"*[System[(EventID=4663)]]" /c:50 /rd:true /f:text |find /i "wbem"
  • 5. Oct 2016 ver 2.1 MalwareArchaeology.com Page 5 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 HARVEST:: 1. SERVICES: Found in the SYSTEM log d. 7045 - Message=A service was installed in the system. e. 7040 - Message=The start type of the XYZ service was changed from auto start to disabled. f. 7000 - Message=The XYX service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion. g. 7022 - Message=The XYZ service hung on starting. h. 7024 - Message=The XYZ service terminated with service-specific error %%2414. i. 7031 - Message=The XYZ service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service. j. 7034 - Message=The XYZ service terminated unexpectedly. It has done this 1 time(s). k. 7035 – Service sent a request to Stop or Start l. 7036 – Service was Started or Stopped HARVEST:: 1. LOG CLEAR: Watch for log clear messages a. 104 – SYSTEM Log – The Application or System log was cleared b. 1102 – SECURITY Log – The audit log was cleared 2. TASKS: Watch for a Process to start and call other processes a. 4698 – SECURITY Log – New Task Created 3. DRIVER: Watch for an issue with a driver a. 40 – Issue with Driver 4. OS VERSION: What OS do machines have a. 6009 – Lists OS version, Service Pack and processor type HARVEST:: 1. PROCESSES: Watch for a Process to start and call other processes a. 4688 – SECURITY Log – New Process Name, look for Creator Process ID to link what process launched what 2. INSTALLER: Watch for the Windows Installer activity a. 1022 – Windows Installer updated the product b. 1033 – Windows Installer installed the product c. 1034 – Windows Installer removed the product 3. WINDOWS UPDATE: Watch for the Windows Update Agent activity. a. 18 = Ready, 19 = Installed, 20= Failure 4. WINDOWS TIME: Watch for the Windows Service synchronization. Make sure your sources are what they are supposed to be. a. 35 – Time Service sync status and source 5. APPLICATION ERROR: Watch for application crashes. a. 1000 – (Application Log) Application Fault 6. TASKSCHEDULER LOG: Enable this log and watch for Created Task and Deleted Task. a. 129 – Created, 141 – Deleted (New) HARVEST:: 1. ACCOUNTS: Monitor for attempts to change an account password a. 4720 – A user account was created b. 4724 – An attempt was made to reset an accounts PW c. 4735 – Local Group changed d. 4738 – User account password changed HARVEST:: 1. APPLOCKER: Watch for triggers to AppLocker events (8000- 8027) a. 8004 – Filename not allowed to run 2. SRP: Watch for triggers to Software Restriction Policies b. 866 – Access to <filename> has been restricted HARVEST:: 1. AUDIT POLICY: Watch for changes to the Audit Policy that are NOT “SYSTEM” a. 4719 – System audit policy was changed
  • 6. Oct 2016 ver 2.1 MalwareArchaeology.com Page 6 of 6 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 HARVEST:: 1. NEW FILE ADDED: Watch for the creation of new files. Requires File auditing of the directory(s) that you want to monitor b. 4663 – Accesses: WriteData (or AddFile) c. GREAT for CryptoWare & Malware drops HARVEST:: 1. REGISTRY: Watch for the creation or modification of new registry keys and values a. 4657 – Accesses: WriteData (or AddFile) i. HKLM, HKCU & HKU – SoftwareMicrosoftWindowsCurrentVersion 1. Run, RunOnce ii. HKLMSoftwareMicrosoftWindows NTCurrentVersionWindows 1. Watch AppInit_Dlls iii. HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionEMDMgmt 1. Watch Connection time of USB Devices iv. HKLMSystemCurrentControlSetServices 1. Watch for NEW Services v. HKLMSYSTEMCurrentControlSetEnumUSBSTOR 1. Watch for NEW USB devices HARVEST:: 2. FIREWALL: Windows Filtering Platform - Watch for Inbound and Outbound connections – Requires Windows Firewall to be enabled a. This is the noisiest of all Events. Generating easily 9,000 - 10,000 events per hour per system b. Storage is required to utilize this event c. 5156 – Message=The Windows Filtering Platform has permitted a connection. Look for: i. Direction:, Source Address:, Source Port:, Destination Address: & Destination Port: HARVEST:: 1. REGISTRY: Monitor certain Keys for Add, Changes and Deletes. Setting auditing on the Specific keys is required. a. 4657 – A Registry value was modified HARVEST:: 1. EMAIL / VPN: Monitor for failed and successful logins to your VPN and Webmail application. Consider emailing user if login is from a new IP not in your exclude list a. sc_status=401 – Failed OWA login b. "reason = Invalid password" – Failed VPN login - Cisco HARVEST:: 1. LOGON TYPE: Monitor for what type of logons occur a. 4624 - Message=An account was successfully logged on. i. Type 2 – Interactive – GUI ii. Type 3 – Network – Net Use iii. Type 4 – Batch iv. Type 5 – Service v. Type 7 – Unlock vi. Type 8 – Network Clear Text vii. Type 9 – New Credentials (RDP Tools) viii. Type 10 – Remote Interactive (RDP) ix. Type 11 – Cached Interactive (laptops) b. 4625 - Message = An account failed to log on. HARVEST:: 1. SYSTEM INTEGRITY: Watch for files with page images with bad hashes a. 6281 – Failed – “page hashes of an image file are not valid”