Channel: Security.
Events: 4624, 4625, 4672, 4634, 4647, 4649, 4778, 4779, 4800, 4801, 4802, 4803, 5378.

Channel: Microsoft-Windows-SMBServer/Security.
Event: 551.

Overview

Channel Conditions Events
Security Default configuration. Event 4624: An account was successfully logged on.

Legacy:
Events 528: Successful Logon and 540: Successful Network Logon.
Security Default configuration. Event 4625: An account failed to log on.

Legacy:
Events 529, 530, 531, 532, 533, 534, 535, 536, 537, and 539.
Security Default configuration.

Only logged on for logon with elevated privileges.
Event 4672: Special privileges assigned to new logon.

Legacy:
Events 576: Special privileges assigned to new logon.
Security Default configuration. Event 4634: An account was logged off.

Legacy:
Events 538: User Logoff.
Security Default configuration.

Only logged on for Interactive and RemoteInteractive logons.
Event 4647: User initiated logoff.

Legacy:
Events 551: User initiated logoff.
Security Requires Audit Other Logon/Logoff Events to be enabled. Event 4649: A replay attack was detected.

Event 4778: A session was reconnected to a Window Station.

Event 4779: A session was disconnected from a Window Station.

Event 4800: The workstation was locked.

Event 4801: The workstation was unlocked.

Event 4802: The screen saver was invoked.

Event 4803: The screen saver was dismissed.

Event 5378: The requested credentials delegation was disallowed by policy.

Event 5632: A request was made to authenticate to a wireless network.

Event 5633: A request was made to authenticate to a wired network.
Microsoft-Windows-SMBServer/Security Default configuration.

Introduced in Windows 10 version 1507 and Windows Server 2012R2 Update3.
Event 551: SMB Session Authentication Failure.

Generated upon failed login attempts over SMB. While invalid credentials are a common cause, other circumstances can also trigger events 551. For instance, if the “Microsoft network server: Server SPN target name validation level” policy is enabled (SmbServerNameHardeningLevel registry key), an authentication relay attempts (mismatch between server target) can also generate this event.

Includes information about the client’s IP address, username, and authentication error code.

Security Event ID 4624

Location: destination machine Security.evtx.
Event ID: 4624: An account was successfully logged on.

Privileged logon will generate an additional Security event: 4672: Special privileges assigned to new logon.

The 4624 event yields information such as:

  • The SID SubjectUserSid, account name SubjectUserName, and domain SubjectDomainName of the user logging in.
  • the source machine hostname WorkstationName, IP IpAddress and port IpPort if the event corresponds to remote login (otherwise the three aforementioned fields are set to -).
  • The authentication protocol in the AuthenticationPackageName field (NTLM, Kerberos or Negotiate ) used for the logging. If the logon is made through the NTLM protocol, the LmPackageName field precisely identify the NTLM version in use (LM, NTLM V1, NTLM V2).
  • The logon type in the LogonType field (detailed below).
  • The privileges level in the ElevatedToken field. If set to %%1842 (Yes), the session the event represents runs in an elevated context. The event can be correlated with the Security event EID: 4672 to precisely identify the privilege tokens of the session.
  • The impersonation level of the event in the ImpersonationLevel field (detailed below).
  • the LogonID field identifying the logon session, which can be correlated with various other Security events.

LogonType

The LogonType field provides information on how the logging was established:

Logon Type Description
2 Interactive logon.

Logon type generated for on screen login at the keyboard as well as some remote access with specific tools.
Note that access made using PsExec with a user specified using the -u option will result in an interactive logon.
3 Network logon (share access, etc.).

Logon type generated for access over the network (access to SMB share, PsExec, WMI/WinRM, etc.).
4 Batch logon (scheduled task)
5 Service logon (service startup)
7 Unlock (on screen unlocking)
8 NetworkCleartext authentication (usually HTTP basic authentication)
9 NewCredentials authentication (client-side for runas /NetOnly usage)
10 RemoteInteractive authentication (Terminal Services, Remote Desktop or Remote Assistance)
11 CachedInteractive authentication (logging using cached credentials when a domain controller cannot be reached)

Interactive logons (Logon type 2 and Logon type 10) will result in the storing of the given users secrets (NTLM hash or Kerberos tickets) in LSASS memory. Knowing which users logged on interactively on a system can help determine which accounts could be compromised following the takeover of a system by an attacker.

ImpersonationLevel

The ImpersonationLevel field may take the following values:

Flag Correspondence Description
- SecurityAnonymous The server process cannot obtain security information about the client.
%%1832 Identification The server process can obtain information about the client but cannot impersonate the client and thus the client has no privileges.
%%1833 Impersonation The server process can obtain information and impersonate the client’s security context on the local system.
%%1840 Delegation The server process can impersonate the client’s security context on remote systems.

Security Event ID 4672

Location: destination machine Security.evtx.
Event ID: 4672: Special privileges assigned to new logon.

This event occurs whenever an account is assigned one, or more, of the following privileges:

  • SeTcbPrivilege
  • SeBackupPrivilege
  • SeCreateTokenPrivilege
  • SeDebugPrivilege
  • SeEnableDelegationPrivilege
  • SeAuditPrivilege
  • SeImpersonatePrivilege
  • SeLoadDriverPrivilege
  • SeSecurityPrivilege
  • SeSystemEnvironmentPrivilege
  • SeAssignPrimaryTokenPrivilege
  • SeRestorePrivilege
  • SeTakeOwnershipPrivilege

The SubjectLogonId field can be correlated with the Security event EID: 4624 in order to retrieve more information on the logon session.

Tool(s)

The LogParser’s KAPE module LogParser_LogonLogoffEvents can be used to parse Security.evtx file(s) and extract the aforementioned authentication events into a CSV timeline.

References



View on GitHub