Significant Events to Collect in AD DS

Monitoring and collecting events from Active Directory can help organizations identify potential security threats, troubleshoot issues, and ensure the smooth operation of their network infrastructure.
What are the most significant events that should be collected for effective monitoring and management?

Audit Users and Groups Management

Tracking user and group management events is essential for maintaining the security and integrity of an Active Directory environment. Some of the key events to collect include:

  • Account creations and deletions
  • Account modifications (password changes, privileged accounts & group membership changes, failed DSRM account password change, failed SID History add attempts)
  • Account lockouts and unlockings
  • Group creation, modification, and deletion

By monitoring these events, administrators can quickly identify any unauthorized changes or suspicious activities related to user and group management.

Audit Computers Management

Account creations and deletions

Authentication and Authorization

AD DS is responsible for authenticating users and authorizing their access to network resources. Monitoring authentication and authorization events can help detect potential security breaches and ensure that only authorized users are accessing the network. Some of the significant events to audit in this category include:

Failed Logon attempts and Account lockouts
– Monitor Events 4625 & Events 4740 to detect potential passwords attacks on user accounts

Changes to security policies and access controls

Special Logons
– Monitor Events 4672 where “Subject\Security ID” is not an admin, Local System, Network Service or Local Service :

By collecting and analyzing these events, administrators can identify patterns of suspicious logon activities, detect potential brute-force attacks, and ensure that security policies are properly enforced.

Directory Service Replication

Active Directory DS uses replication to ensure that changes made on one domain controller are propagated to other domain controllers in the network. Monitoring replication events is crucial for maintaining the consistency and integrity of the directory service. Some of the significant replication events to collect include:

Audit Replication successes and failures
– Look for Event ID 4932 where “Source DRA” does not match authorized hosts (e.g. Domain Controllers)

Changes to replication topology

Changes to replication schedules

By monitoring these events, administrators can proactively identify and resolve replication issues, ensure that changes are properly propagated across the network, and prevent data inconsistencies.

Security-related Events

Collecting security-related events in Active Directory DS is essential for maintaining a secure network environment. Some of the significant security-related events to monitor and collect include:

  • Changes to security policies
  • Account lockouts and unlockings
  • Failed logon attempts
  • Changes to group memberships and permissions
  • Password hash of an account was accessed

By monitoring these events, administrators can quickly identify and respond to potential security breaches, enforce security policies, and ensure that only authorized users have the necessary permissions to access network resources.

Conclusion

Monitoring and collecting significant events in Active Directory DS is crucial for maintaining the security, integrity, and smooth operation of a network environment. By effectively monitoring user and group management, credential valdation, authorization, directory service replication, and security-related events, administrators can proactively identify and resolve issues, detect potential security threats, and ensure that the Active Directory environment is properly managed.

Implementing a robust event collection and monitoring system, along with regular analysis of collected events, will enable organizations to maintain a secure and well-managed Active Directory DS infrastructure.

The following table show all events that matter in AD DS environment.

IDEvent TitleCategoryCriticity
1102The audit log was clearedEventLogsMedium to High
4608Windows is starting upSystemLow
4609Windows is shutting downSystemLow
4610An authentication package has been loaded by the Local Security AuthoritySystemLow
4611A trusted logon process has been registered with the Local Security AuthoritySystemLow
4612Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some auditsSystemLow
4614A notification package has been loaded by the Security Account ManagerSystemLow
4615Invalid use of LPC portSystemLow
4616System time was changedSystemLow
4618A monitored security event pattern has occurredSystemHigh
4621Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recordedSystemMedium
4622A security package has been loaded by the Local Security AuthoritySystemLow
4624An account was successfully logged onLogon/LogoffLow
4625An account failed to log onLogon/LogoffLow
4648A logon attempt was made with explicit credentialsLogon/LogoffLow
4649A replay attack was detectedLogon/LogoffHigh
4657A registry value was modified 1RegistryLow
4670Permissions on an object were changedPolicy Change
4672Special privileges assigned to new logonPrivilege Use
4673A privileged service was calledPrivilege Use
4674An operation was attempted on a privileged objectPrivilege Use
4675SIDs were filteredLogon/LogoffMedium
4692Backup of data protection master key was attemptedDPAPI ActivityMedium
4693Recovery of data protection master key was attemptedDPAPI ActivityMedium
4694Protection of auditable protected data was attemptedDPAPI Activity
4695Unprotection of auditable protected data was attemptedDPAPI Activity
4697A service was installed in the systemSystem
4698A scheduled task was createdSystemLow
4699A scheduled task was deletedSystemLow
4700LowA scheduled task was enabledSystemLow
4701A scheduled task was disabledSystemLow
4702A scheduled task was updatedSystemLow
4704A user right was assignedPolicy ChangeLow
4705A user right was removedPolicy ChangeLow
4706A new trust was created to a domainPolicy ChangeMedium
4713Kerberos policy was changedPolicy ChangeMedium
4714Encrypted data recovery policy was changedPolicy ChangeMedium
4715The audit policy (SACL) on an object was changedPolicy ChangeMedium
4716Trusted domain information was modifiedPolicy ChangeMedium
4719System audit policy was changedPolicy Change
4720A user account was createdAccount ManagementLow
4722A user account was enabledAccount ManagementLow
4723An attempt was made to change the password of an account
4724An attempt was made to reset an account’s passwordAccount ManagementMedium
4725A user account was disabledAccount ManagementLow
4726A user account was deletedAccount ManagementLow
4727A security-enabled global group was createdGroups ManagementMedium
4728A member was added to a security-enabled global groupGroups ManagementLow
4729A member was removed from a security-enabled global groupGroups ManagementLow
4730A security-enabled global group was deletedGroups ManagementLow
4731A security-enabled local group was createdGroups ManagementLow
4732A member was added to a security-enabled local groupGroups ManagementLow
4733A member was removed from a security-enabled local groupGroups ManagementLow
4734A security-enabled local group was deletedGroups ManagementLow
4735A security-enabled local group was changedGroups ManagementMedium
4737A security-enabled global group was changedGroups ManagementMedium
4738A user account was changedAccount Management
4739Domain Policy was changedPolicy ChangeMedium
4740A user account was locked outAccount Management
4741A computer account was createdAccount Management
4742A computer account was changedAccount Management
4754A security-enabled universal group was createdGroups ManagementMedium
4755A security-enabled universal group was changedGroups ManagementMedium
4756A member was added to a security-enabled universal groupGroups Management
4757A member was removed from a security-enabled universal groupGroups Management
4758A security-enabled universal group was deletedGroups ManagementMedium
4743A computer account was deletedAccount Management
4764A group’s type was changedGroups ManagementMedium
4765SID History was added to an accountAccount ManagementHigh
4766An attempt to add SID History to an account failedAccount ManagementHigh
4767A user account was unlockedAccount Management
4768A Kerberos authentication ticket (TGT) was requestedKerberos Service
4769A Kerberos service ticket was requestedKerberos Service
4770A Kerberos service ticket was renewedKerberos Service
4771Kerberos pre-authentication failedKerberos ServiceLow
4776The computer attempted to validate the credentials for an accountCredential ValidationLow
4780The ACL was set on accounts which are members of administrators groupsAccount ManagementMedium
4782The password hash of an account was accessedAccount ManagementLow
4794An attempt was made to set the Directory Services Restore ModeAccount ManagementHigh
4799A security-enabled local group membership was enumeratedGroups Management
4816RPC detected an integrity violation while decrypting an incoming messageSystemMedium
4817Auditing settings on object were changedPolicy Change
4865A trusted forest information entry was addedPolicy ChangeMedium
4866A trusted forest information entry was removedPolicy ChangeMedium
4867A trusted forest information entry was modifiedPolicy ChangeMedium
4868The certificate manager denied a pending certificate requestObject AccessMedium
4870Certificate Services revoked a certificateObject AccessMedium
4882The security permissions for Certificate Services changedObject AccessMedium
4885The audit filter for Certificate Services changedObject AccessMedium
4890The certificate manager settings for Certificate Services changedObject AccessMedium
4892A property of Certificate Services changedObject AccessMedium
4896One or more rows have been deleted from the certificate databaseObject AccessMedium
4897Role separation enabledObject AccessHigh
4902The Per-user audit policy table was createdPolicy Change
4904An attempt was made to register a security event sourcePolicy Change
4905An attempt was made to unregister a security event sourcePolicy Change
4906The CrashOnAuditFail value has changedPolicy ChangeMedium
4907Auditing settings on object were changedPolicy ChangeMedium
4908Special Groups Logon table modifiedPolicy ChangeMedium
4912Per User Audit Policy was changedPolicy ChangeMedium
4932Synchronization of a replica of an Active Directory naming context has begunAD Replication
4946A rule was added to the Windows Firewall exception listFirewall Change
4947A rule was modified in the Windows Firewall exception listFirewall Change
4950A setting was changed in Windows FirewallFirewall Change
4954Group Policy settings for Windows Firewall has changedFirewall Change
4960IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations.SystemMedium
4961IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer.SystemMedium
4962IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay.SystemMedium
4963IPsec dropped an inbound clear text packet that should have been secured. This is usually due to the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attemptSystemMedium
4964A special group has been assigned to a new log onLogon/LogoffHigh
4965IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error may also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignoredSystemMedium
4976During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiationLogon/LogoffMedium
4977During Quick Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiationLogon/LogoffMedium
4978During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiationLogon/LogoffMedium
4983An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deletedLogon/LogoffMedium
4984An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.Logon/LogoffMedium
4985The state of a transaction has changed.Object Access
5025The Windows Firewall service has been stopped.System
5027The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.SystemMedium
5028The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.SystemMedium
5029The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.SystemMedium
5030The Windows Firewall Service failed to startSystemMedium
5031Windows Firewall blocked an application from accepting incoming traffic.Object Access
5035The Windows Firewall Driver failed to startSystemMedium
5037The Windows Firewall Driver detected critical runtime error. TerminatingSystemMedium
5038Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device errorSystemMedium
5120OCSP Responder Service StartedObject AccessMedium
5121OCSP Responder Service StoppedObject AccessMedium
5122A configuration entry changed in OCSP Responder ServiceObject AccessMedium
5123A configuration entry changed in OCSP Responder ServiceObject AccessMedium
5124A security setting was updated on the OCSP Responder Service.Object AccessHigh
5152A network packet was blocked by Windows Filtering Platform.Firewall Change
5153Firewall Change
5155Windows Filtering Platform blocked an application or service from listening on a port.Firewall Change
5157Windows Filtering Platform blocked a connection.Firewall Change
5376Credential Manager credentials were backed up.Account ManagementMedium
5377Credential Manager credentials were restored from a backup.Account ManagementMedium
5447A Windows Filtering Platform filter was changed.Firewall Change
5453An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.Logon/LogoffMedium
5484IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks.SystemMedium
5485IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.SystemMedium
5827The Netlogon service denied a vulnerable Netlogon secure channel connection from a machine account.CVE-2020-1472Medium
5828The Netlogon service denied a vulnerable Netlogon secure channel connection using a trust account.CVE-2020-1472Medium
6038
6145One or more errors occurred while processing security policy in the Group Policy objects.Policy ChangeMedium
6273Network Policy Server denied access to a user.Medium
  1. This event generates only if “Set Value” auditing is set in registry key’s SACL↩︎
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor

Event Logs Levels from winmeta.h

  • WINEVENT_LEVEL_LOG_ALWAYS 0x0
  • WINEVENT_LEVEL_CRITICAL 0x1
  • WINEVENT_LEVEL_ERROR 0x2
  • WINEVENT_LEVEL_WARNING 0x3
  • WINEVENT_LEVEL_INFO 0x4
  • WINEVENT_LEVEL_VERBOSE 0x5