Códigos - Eventos Do Windows
Códigos - Eventos Do Windows
4660,4661,4662,4663,4664,4665,4666,4667,4668,4726,4743,4896,5138,5141,5144,
5888,5889
CÓDIGO EVENTOS DE MODIFICAÇÃO
4657,4716,4867,4908,4930,4931,4947,5041,5044,5047,5065,5067,5136,5143,5169,
5170,5880
CÓDIGO EVENTOS LOGON
4611 A trusted logon process has been registered with the Local Security Authority
4648 A logon was attempted using explicit credentials
4672 Special privileges assigned to new logon
4774 An account was mapped for logon
4775 An account could not be mapped for logon
4908 Special Groups Logon table modified
4964 Special groups have been assigned to a new logon
4611,4648,4672,4774,4775,4908,4964
CÓDIGO EVENTOS DE ACESSO
4671,4691,4717,4718,4782,4818,4819,4820,4821,4823,4825,4913,5071,5140,5145,
6272,6273,6277,6278
4660
4661
4662
4663
4664
4665
4666
4667
4668
nt Central Access Policy
ect only if they are members of the Remote Desktop Users group or Administrators group
4660
4661
4662
4663
4664
4665
4666
4667
4668
ading to the loss of some audits.
nt Central Access Policy
ndex (SPI).
ons on the network.
pting incoming connections on the network
file.FirewallEnabled(FALSE
e; packets associated with this attack will be discarded.
ngine started
ne started
Engine started
Filtering Engine started
Engine started
eying Modules (IKEEXT) service is not started
he computer
cy on the computer
nterfaces
of content.
essage to offer it data.
to a process. This could be due to the use of shared sections or other issues
Serviço Código TODOS OS CÓDIGOS
ipboardChange
indows NT is starting up
indows is shutting down
n authentication package has been loaded by the Local Security Authority
trusted logon process has registered with the Local Security Authority
ternal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits
he audit log was cleared
notification package has been loaded by the Security Account Manager
process is using an invalid local procedure call (LPC) port
he system time was changed
nable to log events to security log
uccessful Logon
gon Failure - Unknown user name or bad password
gon Failure - Account logon time restriction violation
gon Failure - Account currently disabled
gon Failure - The specified user account has expired
gon Failure - User not allowed to logon at this computer
gon Failure - The user has not been granted the requested logon type at this machine
gon Failure - The specified account's password has expired
gon Failure - The NetLogon component is not active
gon failure - The logon attempt failed for other reasons.
ser Logoff
gon Failure - Account locked out
uccessful Network Logon
ser initiated logoff
gon attempt using explicit credentials
bject Open
andle Allocated
andle Closed
bject Open for Delete
bject Deleted
bject Open (Active Directory)
bject Operation (W3 Active Directory)
bject Access Attempt
pecial privileges assigned to new logon
ivileged Service Called
ivileged object operation
new process has been created
process has exited
handle to an object has been duplicated
direct access to an object has been obtained
ackup of data protection master key
process was assigned a primary token
ttempt to install service
heduled Task created
ser Right Assigned
ser Right Removed
ew Trusted Domain
emoving Trusted Domain
udit Policy Change
Sec policy agent started
Sec policy agent disabled
SEC PolicyAgent Service
Sec policy agent encountered a potentially serious failure.
erberos Policy Changed
ncrypted Data Recovery Policy Changed
uality of Service Policy Changed
usted Domain Information Modified
stem Security Access Granted
stem Security Access Removed
er User Audit Policy was refreshed
ser Account Created
ser Account Type Changed
ser Account Enabled
hange Password Attempt
ser Account password set
ser Account Disabled
ser Account Deleted
ecurity Enabled Global Group Created
ecurity Enabled Global Group Member Added
ecurity Enabled Global Group Member Removed
ecurity Enabled Global Group Deleted
ecurity Enabled Local Group Created
ecurity Enabled Local Group Member Added
ecurity Enabled Local Group Member Removed
ecurity Enabled Local Group Deleted
ecurity Enabled Local Group Changed
eneral Account Database Change
ecurity Enabled Global Group Changed
ser Account Changed
omain Policy Changed
ser Account Locked Out
omputer Account Created
omputer Account Changed
omputer Account Deleted
ecurity Disabled Local Group Created
ecurity Disabled Local Group Changed
ecurity Disabled Local Group Member Added
ecurity Disabled Local Group Member Removed
ecurity Disabled Local Group Deleted
ecurity Disabled Global Group Created
ecurity Disabled Global Group Changed
ecurity Disabled Global Group Member Added
ecurity Disabled Global Group Member Removed
ecurity Disabled Global Group Deleted
ecurity Enabled Universal Group Created
ecurity Enabled Universal Group Changed
ecurity Enabled Universal Group Member Added
ecurity Enabled Universal Group Member Removed
ecurity Enabled Universal Group Deleted
ecurity Disabled Universal Group Created
ecurity Disabled Universal Group Changed
ecurity Disabled Universal Group Member Added
ecurity Disabled Universal Group Member Removed
ecurity Disabled Universal Group Deleted
roup Type Changed
dd SID History
dd SID History
ser Account Unlocked
uthentication Ticket Granted
ervice Ticket Granted
cket Granted Renewed
e-authentication failed
uthentication Ticket Request Failed
ervice Ticket Request Failed
ccount Mapped for Logon by
he name: %2 could not be mapped for logon by: %1
ccount Used for Logon by
he logon to account: %2 by: %1 from workstation: %3 failed.
ession reconnected to winstation
ession disconnected from winstation
et ACLs of members in administrators groups
ccount Name Changed
assword of the following user accessed
asic Application Group Created
asic Application Group Changed
asic Application Group Member Added
asic Application Group Member Removed
asic Application Group Non-Member Added
asic Application Group Non-Member Removed
asic Application Group Deleted
DAP Query Group Created
DAP Query Group Changed
DAP Query Group Deleted
assword Policy Checking API is called
er User Audit Policy was refreshed
er user auditing policy set for user
security event source has attempted to register
security event source has attempted to unregister
he following policy was active when the Windows Firewall started
n application was listed as an exception when the Windows Firewall started
port was listed as an exception when the Windows Firewall started
change has been made to the Windows Firewall application exception list
change has been made to the Windows Firewall port exception list
he Windows Firewall operational mode has changed
he Windows Firewall logging settings have changed
Windows Firewall ICMP setting has changed
he Windows Firewall setting to allow unicast responses to multicast/broadcast traffic has changed
he Windows Firewall setting to allow remote administration, allowing port TCP 135 and DCOM/RPC, has changed
indows Firewall group policy settings have been applied
he Windows Firewall group policy settings have been removed
he Windows Firewall has switched the active policy profile
he Windows Firewall has detected an application listening for incoming traffic
he event logging service has shut down
udit events have been dropped by the transport.
he audit log was cleared
he security Log is now full
ent log automatic backup
he event logging service encountered an error
indows is starting up
indows is shutting down
n authentication package has been loaded by the Local Security Authority
trusted logon process has been registered with the Local Security Authority
ternal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.
notification package has been loaded by the Security Account Manager.
valid use of LPC port
he system time was changed.
monitored security event pattern has occurred
dministrator recovered system from CrashOnAuditFail
security package has been loaded by the Local Security Authority.
n account was successfully logged on
n account failed to log on
ser/Device claims information
roup membership information.
n account was logged off
E DoS-prevention mode started
ser initiated logoff
logon was attempted using explicit credentials
replay attack was detected
n IPsec Main Mode security association was established
n IPsec Main Mode security association was established
n IPsec Main Mode negotiation failed
n IPsec Main Mode negotiation failed
n IPsec Quick Mode negotiation failed
n IPsec Main Mode security association ended
handle to an object was requested
registry value was modified
he handle to an object was closed
handle to an object was requested with intent to delete
n object was deleted
handle to an object was requested
n operation was performed on an object
n attempt was made to access an object
n attempt was made to create a hard link
n attempt was made to create an application client context.
n application attempted an operation
n application client context was deleted
n application was initialized
ermissions on an object were changed
n application attempted to access a blocked ordinal through the TBS
pecial privileges assigned to new logon
privileged service was called
n operation was attempted on a privileged object
Ds were filtered
new process has been created
process has exited
n attempt was made to duplicate a handle to an object
direct access to an object was requested
ackup of data protection master key was attempted
ecovery of data protection master key was attempted
otection of auditable protected data was attempted
nprotection of auditable protected data was attempted
primary token was assigned to process
service was installed in the system
scheduled task was created
scheduled task was deleted
scheduled task was enabled
scheduled task was disabled
scheduled task was updated
token right was adjusted
user right was assigned
user right was removed
new trust was created to a domain
trust to a domain was removed
sec Services was started
sec Services was disabled
AStore Engine (1%)
sec Services encountered a potentially serious failure
erberos policy was changed
ncrypted data recovery policy was changed
he audit policy (SACL) on an object was changed
usted domain information was modified
stem security access was granted to an account
stem security access was removed from an account
stem audit policy was changed
user account was created
user account was enabled
n attempt was made to change an account's password
n attempt was made to reset an accounts password
user account was disabled
user account was deleted
security-enabled global group was created
member was added to a security-enabled global group
member was removed from a security-enabled global group
security-enabled global group was deleted
security-enabled local group was created
member was added to a security-enabled local group
member was removed from a security-enabled local group
security-enabled local group was deleted
security-enabled local group was changed
security-enabled global group was changed
user account was changed
omain Policy was changed
user account was locked out
computer account was created
computer account was changed
computer account was deleted
security-disabled local group was created
security-disabled local group was changed
member was added to a security-disabled local group
member was removed from a security-disabled local group
security-disabled local group was deleted
security-disabled global group was created
security-disabled global group was changed
member was added to a security-disabled global group
member was removed from a security-disabled global group
security-disabled global group was deleted
security-enabled universal group was created
security-enabled universal group was changed
member was added to a security-enabled universal group
member was removed from a security-enabled universal group
security-enabled universal group was deleted
security-disabled universal group was created
security-disabled universal group was changed
member was added to a security-disabled universal group
member was removed from a security-disabled universal group
security-disabled universal group was deleted
groups type was changed
D History was added to an account
n attempt to add SID History to an account failed
user account was unlocked
Kerberos authentication ticket (TGT) was requested
Kerberos service ticket was requested
Kerberos service ticket was renewed
erberos pre-authentication failed
Kerberos authentication ticket request failed
Kerberos service ticket request failed
n account was mapped for logon
n account could not be mapped for logon
he domain controller attempted to validate the credentials for an account
he domain controller failed to validate the credentials for an account
session was reconnected to a Window Station
session was disconnected from a Window Station
he ACL was set on accounts which are members of administrators groups
he name of an account was changed
he password hash an account was accessed
basic application group was created
basic application group was changed
member was added to a basic application group
member was removed from a basic application group
non-member was added to a basic application group
non-member was removed from a basic application group..
basic application group was deleted
n LDAP query group was created
basic application group was changed
n LDAP query group was deleted
he Password Policy Checking API was called
n attempt was made to set the Directory Services Restore Mode administrator password
n attempt was made to query the existence of a blank password for an account
user's local group membership was enumerated.
security-enabled local group membership was enumerated
he workstation was locked
he workstation was unlocked
he screen saver was invoked
he screen saver was dismissed
PC detected an integrity violation while decrypting an incoming message
uditing settings on object were changed.
oposed Central Access Policy does not grant the same access permissions as the current Central Access Policy
entral Access Policies on the machine have been changed
Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions
Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions
TLM authentication failed because the account was a member of the Protected User group
TLM authentication failed because access control restrictions are required
erberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group
user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desk
oot Configuration Data loaded
D History was removed from an account
namespace collision was detected
trusted forest information entry was added
trusted forest information entry was removed
trusted forest information entry was modified
he certificate manager denied a pending certificate request
ertificate Services received a resubmitted certificate request
ertificate Services revoked a certificate
ertificate Services received a request to publish the certificate revocation list (CRL)
ertificate Services published the certificate revocation list (CRL)
certificate request extension changed
ne or more certificate request attributes changed.
ertificate Services received a request to shut down
ertificate Services backup started
ertificate Services backup completed
ertificate Services restore started
ertificate Services restore completed
ertificate Services started
ertificate Services stopped
he security permissions for Certificate Services changed
ertificate Services retrieved an archived key
ertificate Services imported a certificate into its database
he audit filter for Certificate Services changed
ertificate Services received a certificate request
ertificate Services approved a certificate request and issued a certificate
ertificate Services denied a certificate request
ertificate Services set the status of a certificate request to pending
he certificate manager settings for Certificate Services changed.
configuration entry changed in Certificate Services
property of Certificate Services changed
ertificate Services archived a key
ertificate Services imported and archived a key
ertificate Services published the CA certificate to Active Directory Domain Services
ne or more rows have been deleted from the certificate database
ole separation enabled
ertificate Services loaded a template
Certificate Services template was updated
ertificate Services template security was updated
he Per-user audit policy table was created
n attempt was made to register a security event source
n attempt was made to unregister a security event source
he CrashOnAuditFail value has changed
uditing settings on object were changed
pecial Groups Logon table modified
he local policy settings for the TBS were changed
he group policy settings for the TBS were changed
esource attributes of the object were changed
er User Audit Policy was changed
entral Access Policy on the object was changed
n Active Directory replica source naming context was established
n Active Directory replica source naming context was removed
n Active Directory replica source naming context was modified
n Active Directory replica destination naming context was modified
nchronization of a replica of an Active Directory naming context has begun
nchronization of a replica of an Active Directory naming context has ended
ttributes of an Active Directory object were replicated
eplication failure begins
eplication failure ends
lingering object was removed from a replica
he following policy was active when the Windows Firewall started
rule was listed when the Windows Firewall started
change has been made to Windows Firewall exception list. A rule was added
change has been made to Windows Firewall exception list. A rule was modified
change has been made to Windows Firewall exception list. A rule was deleted
indows Firewall settings were restored to the default values
Windows Firewall setting has changed
rule has been ignored because its major version number was not recognized by Windows Firewall
arts of a rule have been ignored because its minor version number was not recognized by Windows Firewall
rule has been ignored by Windows Firewall because it could not parse the rule
indows Firewall Group Policy settings has changed. The new settings have been applied
indows Firewall has changed the active profile
indows Firewall did not apply the following rule
indows Firewall did not apply the following rule because the rule referred to items not configured on this computer
sec dropped an inbound packet that failed an integrity check
sec dropped an inbound packet that failed a replay check
sec dropped an inbound packet that failed a replay check
sec dropped an inbound clear text packet that should have been secured
pecial groups have been assigned to a new logon
sec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).
uring Main Mode negotiation, IPsec received an invalid negotiation packet.
uring Quick Mode negotiation, IPsec received an invalid negotiation packet.
uring Extended Mode negotiation, IPsec received an invalid negotiation packet.
sec Main Mode and Extended Mode security associations were established.
sec Main Mode and Extended Mode security associations were established
sec Main Mode and Extended Mode security associations were established
sec Main Mode and Extended Mode security associations were established
n IPsec Extended Mode negotiation failed
n IPsec Extended Mode negotiation failed
he state of a transaction has changed
he Windows Firewall Service has started successfully
he Windows Firewall Service has been stopped
he Windows Firewall Service was unable to retrieve the security policy from the local storage
he Windows Firewall Service was unable to parse the new security policy.
he Windows Firewall Service failed to initialize the driver
he Windows Firewall Service failed to start
he Windows Firewall Service blocked an application from accepting incoming connections on the network.
indows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network
he Windows Firewall Driver has started successfully
he Windows Firewall Driver has been stopped
he Windows Firewall Driver failed to start
he Windows Firewall Driver detected critical runtime error. Terminating
ode integrity determined that the image hash of a file is not valid
registry key was virtualized.
change has been made to IPsec settings. An Authentication Set was added.
change has been made to IPsec settings. An Authentication Set was modified
change has been made to IPsec settings. An Authentication Set was deleted
change has been made to IPsec settings. A Connection Security Rule was added
change has been made to IPsec settings. A Connection Security Rule was modified
change has been made to IPsec settings. A Connection Security Rule was deleted
change has been made to IPsec settings. A Crypto Set was added
change has been made to IPsec settings. A Crypto Set was modified
change has been made to IPsec settings. A Crypto Set was deleted
n IPsec Security Association was deleted
n attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE
file was virtualized
cryptographic self test was performed
cryptographic primitive operation failed
ey file operation
ey migration operation
erification operation failed
yptographic operation
kernel-mode cryptographic self test was performed
cryptographic provider operation was attempted
cryptographic context operation was attempted
cryptographic context modification was attempted
cryptographic function operation was attempted
cryptographic function modification was attempted
cryptographic function provider operation was attempted
cryptographic function property operation was attempted
cryptographic function property operation was attempted
ey access denied by Microsoft key distribution service
CSP Responder Service Started
CSP Responder Service Stopped
Configuration entry changed in the OCSP Responder Service
configuration entry changed in the OCSP Responder Service
security setting was updated on OCSP Responder Service
request was submitted to OCSP Responder Service
gning Certificate was automatically updated by the OCSP Responder Service
he OCSP Revocation Provider successfully updated the revocation information
directory service object was modified
directory service object was created
directory service object was undeleted
directory service object was moved
network share object was accessed
directory service object was deleted
network share object was added.
network share object was modified
network share object was deleted.
network share object was checked to see whether client can be granted desired access
he Windows Filtering Platform has blocked a packet
more restrictive Windows Filtering Platform filter has blocked a packet
he Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be disc
he DoS attack has subsided and normal processing is being resumed.
he Windows Filtering Platform has blocked a packet.
more restrictive Windows Filtering Platform filter has blocked a packet.
he Windows Filtering Platform blocked a packet
more restrictive Windows Filtering Platform filter has blocked a packet
he Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections
he Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections
he Windows Filtering Platform has allowed a connection
he Windows Filtering Platform has blocked a connection
he Windows Filtering Platform has permitted a bind to a local port
he Windows Filtering Platform has blocked a bind to a local port
pn check for SMB/SMB2 fails.
directory service object was modified
directory service object was modified during a background cleanup task
edential Manager credentials were backed up
edential Manager credentials were restored from a backup
he requested credentials delegation was disallowed by policy
edential Manager credentials were read
ault Find Credential
ault credentials were read
ault credentials were read
he following callout was present when the Windows Filtering Platform Base Filtering Engine started
he following filter was present when the Windows Filtering Platform Base Filtering Engine started
he following provider was present when the Windows Filtering Platform Base Filtering Engine started
he following provider context was present when the Windows Filtering Platform Base Filtering Engine started
he following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started
Windows Filtering Platform callout has been changed
Windows Filtering Platform filter has been changed
Windows Filtering Platform provider has been changed
Windows Filtering Platform provider context has been changed
Windows Filtering Platform sub-layer has been changed
n IPsec Quick Mode security association was established
n IPsec Quick Mode security association ended
n IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started
AStore Engine applied Active Directory storage IPsec policy on the computer
AStore Engine failed to apply Active Directory storage IPsec policy on the computer
AStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer
AStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer
AStore Engine applied local registry storage IPsec policy on the computer
AStore Engine failed to apply local registry storage IPsec policy on the computer
AStore Engine failed to apply some rules of the active IPsec policy on the computer
AStore Engine polled for changes to the active IPsec policy and detected no changes
AStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services
AStore Engine received a control for forced reloading of IPsec policy and processed the control successfully
AStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use
AStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no c
AStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes
AStore Engine loaded local storage IPsec policy on the computer
AStore Engine failed to load local storage IPsec policy on the computer
AStore Engine loaded directory storage IPsec policy on the computer
AStore Engine failed to load directory storage IPsec policy on the computer
AStore Engine failed to add quick mode filter
sec Services has started successfully
sec Services has been shut down successfully
sec Services failed to get the complete list of network interfaces on the computer
sec Services failed to initialize RPC server. IPsec Services could not be started
sec Services has experienced a critical failure and has been shut down
sec Services failed to process some IPsec filters on a plug-and-play event for network interfaces
request was made to authenticate to a wireless network
request was made to authenticate to a wired network
Remote Procedure Call (RPC) was attempted
n object in the COM+ Catalog was modified
n object was deleted from the COM+ Catalog
n object was added to the COM+ Catalog
ecurity policy in the group policy objects has been applied successfully
ne or more errors occured while processing security policy in the group policy objects
etwork Policy Server granted access to a user
etwork Policy Server denied access to a user
etwork Policy Server discarded the request for a user
etwork Policy Server discarded the accounting request for a user
etwork Policy Server quarantined a user
etwork Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy
etwork Policy Server granted full access to a user because the host met the defined health policy
etwork Policy Server locked the user account due to repeated failed authentication attempts
etwork Policy Server unlocked the user account
ode Integrity determined that the page hashes of an image file are not valid...
anchCache: Received an incorrectly formatted response while discovering availability of content.
anchCache: Received invalid data from a peer. Data discarded.
anchCache: The message to the hosted cache offering it data is incorrectly formatted.
anchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data.
anchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.
anchCache: %2 instance(s) of event id %1 occurred.
1 registered to Windows Firewall to control filtering for the following:
egistered product %1 failed and Windows Firewall is now controlling the filtering for %2.
anchCache: A service connection point object could not be parsed
ode integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of sha
new external device was recognized by the system.
he FIPS mode crypto selftests succeeded
he FIPS mode crypto selftests failed
request was made to disable a device
device was disabled
request was made to enable a device
device was enabled
he installation of this device is forbidden by system policy
he installation of this device was allowed, after having previously been forbidden by policy
ghest System-Defined Audit Message Value
me audits
me audits.
User group
embers of the Remote Desktop Users group or Administrators group
omputer
nnections