
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Windows generates rich security telemetry through its event logging system. Understanding this data source is essential for any SOC analyzing Windows environments.
Windows logs events to channels—logical categories of related events. Security, System, and Application are the classic channels. Modern Windows adds hundreds more for specific features and applications.
Each event has an Event ID identifying the event type, a timestamp, source system, and event-specific data fields. The Security log alone contains hundreds of distinct Event IDs covering authentication, authorization, policy changes, and more.
Events persist in .evtx files. Default retention depends on log size limits—when logs fill, old events are overwritten. For security, extend retention or forward to central collection before local logs rotate.
Authentication events track logon activity:
4624 - Successful logon. Includes logon type (console, network, service), source information, and authentication details.
4625 - Failed logon. Shows failed authentication attempts with failure reasons—bad password, unknown user, account locked.
4634/4647 - Logoff events. Track session endings.
4648 - Explicit credential logon. When users provide credentials explicitly, such as runas or mapping network drives with different credentials.
4672 - Special privileges assigned. Admin logins and other privileged sessions generate this event.
Account management events track changes:
4720 - User account created
4722 - User account enabled
4725 - User account disabled
4726 - User account deleted
4728/4732/4756 - Member added to groups
4738 - User account changed
Process tracking events show execution:
4688 - Process creation. With proper configuration, includes command line.
4689 - Process termination.
Windows does not log all events by default. Audit policies control what generates Security log entries.
Local Security Policy or Group Policy configure audit settings. Advanced Audit Policy Configuration provides granular control over subcategories.
For security monitoring, enable at minimum: Logon/Logoff auditing, Account Management, Process Creation (with command line), and relevant Object Access categories for sensitive resources.
What Windows log channels exist?
What is the Windows log viewer command?
How are events structured?
What format stores individual Windows events?