Collect Microsoft Windows Event logs
This document describes the deployment architecture, installation steps, and required configuration that produce logs supported by the Google Security Operations parser for Windows events. This document also includes information about how the parser maps fields in the original log to Google Security Operations Unified Data Model fields. For an overview of Google Security Operations data ingestion, see Data ingestion to Google Security Operations .
To ingest Windows event logs to Google Security Operations, use the Bindplane Agent or Google Cloud built-in ingestion. For more information about built-in ingestion, see Ingest Google Cloud data to Google Security Operations .
Information in this document applies to the parser with the WINEVTLOG ingestion label.
The ingestion label identifies which parser normalizes raw log data to structured UDM format.
Before you begin
Review the recommended deployment architecture
We recommend using Google Cloud built-in ingestion if your deployment includes a Windows server on Google Cloud. Otherwise, you can use the Bindplane Agent.
Google Cloud built-in ingestion architecture
If the Windows events have the Provider value Microsoft-Windows-Security-Auditing, then the WINEVTLOG parser supports Google Cloud built-in ingestion.
Deploy a Windows server in Google Cloud .
Configure an Ops Agent on Windows Server .
Install the Cloud Logging agent on Windows Server .
Enable the following export filter in the Google Security Operations instance: (log_id("winevt.raw") OR log_id("windows_event_log")). For more information, see Ingest Google Cloud data to Google Security Operations .
Collect the Windows Event logs by using the Bindplane Agent. After installation, the Bindplane Agent service appears as the observerIQ service in the list of Windows services.
Install and configure the Windows servers. For more information about configuring the Windows servers, see Configure Windows server overview .
Install Bindplane Agent on a Windows server running the collector. For more information about installing the Bindplane Agent,
see the Bindplane Agent installation instructions .
Create a configuration file for the Bindplane agent with the following contents:
receivers:
windowseventlog/dfsn_serv:
channel: Microsoft-Windows-DFSN-Server/Admin
raw: true
windowseventlog/operational:
channel: Microsoft-Windows-Forwarding/Operational
raw: true
windowseventlog/source0__application:
channel: application
raw: true
windowseventlog/source0__security:
channel: security
raw: true
windowseventlog/source0__system:
channel: system
raw: true
processors:
batch:
exporters:
chronicle/winevtlog:
endpoint: https://malachiteingestion-pa.googleapis.com
creds: '{
"type": "service_account",
"project_id": "malachite-projectname",
"private_key_id": `PRIVATE_KEY_ID `,
"private_key": `PRIVATE_KEY `,
"client_email":"`SERVICE_ACCOUNT_NAME `@malachite-`PROJECT_ID `.iam.gserviceaccount.com",
"client_id": `CLIENT_ID `,
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url":"https://www.googleapis.com/oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/`SERVICSERVICE_ACCOUNT_NAME `%40malachite-`PROJECT_ID `.iam.gserviceaccount.com",
"universe_domain": "googleapis.com"
}'
log_type: 'WINEVTLOG'
override_log_type: false
raw_log_field: body
customer_id: `CUSTOMER_ID `
service:
pipelines:
logs/winevtlog:
receivers:
- windowseventlog/source0__application
- windowseventlog/source0__security
- windowseventlog/source0__system
- windowseventlog/dfsn_serv
- windowseventlog/operational
processors: [batch]
exporters: [chronicle/winevtlog]
Replace the PRIVATE_KEY_ID , PRIVATE_KEY SERVICSERVICE_ACCOUNT_NAME ,PROJECT_ID , CLIENT_ID and CUSTOMER_ID with the respective values from the service account JSON file which you can download from Google Cloud Platform. For more information about service account keys, see Create and delete service account keys documentation .
To start the observerIQ agent service, select Services > Extended > observerIQ Service >
start .
NXLog forwarder ingestion deployment architecture
This diagram illustrates the recommended foundational components in a deployment
architecture to collect and send Microsoft Windows Event data to Google Security Operations.
Compare this information with your environment to be sure these components are
installed. Each customer deployment will differ from this representation and may be more complex.
The following is required:
Review the supported devices and versions
The Google Security Operations parser supports logs from the following Microsoft Windows server versions.
Microsoft Windows server is released with the following editions: Foundation, Essentials,
Standard, and Datacenter. The event schema of logs generated by each edition do
not differ.
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows Server 2012
Google Security Operations parser supports logs from Microsoft Windows 10 and higher client
systems.
Google Security Operations parser supports logs collected by NXLog Community or Enterprise
Edition.
Review the supported log types
The Google Security Operations parser supports the following log types generated by Microsoft Windows
systems. For more information about these log types, see the
Microsoft Windows Event Log documentation .
It supports logs generated with English language text and is not supported with
logs generated in non-English languages.
Log Type
Notes
Security
Security audit and event logs.
Application
Events logged by applications or programs. If the manifest isn't installed
locally, application logs will have missing / hex values.
System
Events logged by Microsoft Windows system components.
Configure the Microsoft Windows servers, endpoints, and domain controllers
Install and configure the servers, endpoints, and domain controllers.
Configure all systems with the UTC time zone.
Configure devices to forward logs to a collector Microsoft Windows server.
Configure a Source Initiated Subscription on Microsoft Windows server (Collector).
For information, see
Setting up a Source Initiated Subscription .
Enable WinRM on Microsoft Windows servers and clients. For information, see
Installation and configuration for Microsoft Windows Remote Management .
Set up a collector Microsoft Windows server to collect from systems.
Configure the system with the UTC time zone.
Install NXLog. Follow the
NXLog documentation .
Create a configuration file for NXLog. Use
im_msvistalog input module for Microsoft Windows server security channel logs.
Replace HOSTNAME and PORT values with information about the central
Microsoft Windows or Linux server. See the NXLog documentation for information about
the om_tcp module .
define ROOT C:\Program Files\nxlog
define WINEVTLOG_OUTPUT_DESTINATION_ADDRESS HOSTNAME
define WINEVTLOG_OUTPUT_DESTINATION_PORT PORT
define CERTDIR %ROOT%\cert
define CONFDIR %ROOT%\conf
define LOGDIR %ROOT%\data
define LOGFILE %LOGDIR%\nxlog.log
LogFile %LOGFILE%
Moduledir %ROOT%\modules
CacheDir %ROOT%\data
Pidfile %ROOT%\data\nxlog.pid
SpoolDir %ROOT%\data
<Extension _json>
Module xm_json
</Extension>
<Input windows_security_eventlog>
Module im_msvistalog
<QueryXML>
<QueryList>
<Query Id="0">
<Select Path="Application">*</Select>
<Select Path="System">*</Select>
<Select Path="Security">*</Select>
</Query>
</QueryList>
</QueryXML>
ReadFromLast False
SavePos False
</Input>
<Output out_chronicle_windevents>
Module om_tcp
Host %WINEVTLOG_OUTPUT_DESTINATION_ADDRESS%
Port %WINEVTLOG_OUTPUT_DESTINATION_PORT%
Exec $EventTime = integer($EventTime) / 1000;
Exec $EventReceivedTime = integer($EventReceivedTime) / 1000;
Exec to_json();
</Output>
<Route r2>
Path windows_security_eventlog => out_chronicle_windevents
</Route>
Start the NXLog service.
See the Installing and configuring the forwarder on Linux
or Installing and configuring the forwarder on Microsoft Windows
for information about installing and configuring the forwarder.
Configure the system with the UTC time zone.
Install the Google Security Operations forwarder on the central Microsoft Windows or Linux server.
Configure the Google Security Operations forwarder to send logs to Google Security Operations. Here is an
example forwarder configuration.
- syslog:
common:
enabled: true
data_type: WINEVTLOG
batch_n_seconds: 10
batch_n_bytes: 1048576
tcp_address: 0.0.0.0:10518
connection_timeout_sec: 60
The Windows Event parser supports logs in JSON, XML, SYSLOG + KV, SYSLOG + JSON and SYSLOG + XML formats.
Supported Windows Event sample logs
JSON:
{
"EventTime": 1626244341057,
"Hostname": "dummy_hostname",
"Keywords": -9214364837600034816,
"EventType": "AUDIT_SUCCESS",
"SeverityValue": 2,
"Severity": "INFO",
"EventID": 4704,
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-A5BA-3E3B0328C30D}",
"Version": 0,
"Task": 13570,
"OpcodeValue": 0,
"RecordNumber": 155109,
"ActivityID": "{DB09FDBE-7A27-0000-F1FE-09DB277AD701}",
"ProcessID": 704,
"ThreadID": 1756,
"Channel": "Security",
"Message": "A user right was assigned.\\r\\n\\r\\nSubject:\\r\\n\\tSecurity ID:\\t\\tS-1-5-18\\r\\n\\tAccount Name:\\t\\tWIN-TEST$\\r\\n\\tAccount Domain:\\t\\tCHRONICLE2\\r\\n\\tLogon ID:\\t\\t0x3E7\\r\\n\\r\\nTarget Account:\\r\\n\\tAccount Name:\\t\\tS-1-5-21\\r\\n\\r\\nNew Right:\\r\\n\\tUser Right:\\t\\tSeTrustedCredManAccessPrivilege",
"Category": "Authorization Policy Change",
"Opcode": "Info",
"SubjectUserSid": "S-1-5-18",
"SubjectUserName": "WIN-TEST$",
"SubjectDomainName": "CBN",
"SubjectLogonId": "0x3e7",
"TargetSid": "S-1-5-21",
"PrivilegeList": "SeTrustedCredManAccessPrivilege",
"EventReceivedTime": 1626244341057,
"SourceModuleName": "windows_security_eventlog",
"SourceModuleType": "im_msvistalog"
}
XML:
<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'>
<System>
<Provider Name='AD FS Auditing'/>
<EventID Qualifiers='0'>1203</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>3</Task>
<Opcode>0</Opcode>
<Keywords>0x8090000000000000</Keywords>
<TimeCreated SystemTime='2025-02-20T13:35:25.0552620Z'/>
<EventRecordID>54955389</EventRecordID>
<Correlation ActivityID='{f0ae8663-79d1-0001-4787-aef0d179db01}'/>
<Execution ProcessID='832' ThreadID='8932'/>
<Channel>Security</Channel>
<Computer>DA6PADFS01.ocm.ORIXUSA.CORP</Computer>
<Security UserID='S-1-5-21-1740863675-3465329846-2508926007-133863'/>
</System>
<EventData>
<Data>0d23868f-2ad0-4ff2-a774-511ef7b36a04</Data>
<Data><?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n\\n<AuditBase
xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\"
xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"FreshCredentialAudit\">\r\n\\n <AuditType>FreshCredentials</AuditType>\r\n\\n <AuditResult>Failure</AuditResult>\r\n\\n <FailureType>CredentialValidationError</FailureType>\r\n\\n <ErrorCode>N/A</ErrorCode>\r\n\\n <ContextComponents>\r\n\\n <Component xsi:type=\"ResourceAuditComponent\">\r\n\\n <RelyingParty>http://sso.orix.com/adfs/services/trust</RelyingParty>\r\n\\n <ClaimsProvider>N/A</ClaimsProvider>\r\n\\n <UserId>kayla.cummings@orix.com</UserId>\r\n\\n </Component>\r\n\\n <Component xsi:type=\"AuthNAuditComponent\">\r\n\\n <PrimaryAuth>N/A</PrimaryAuth>\r\n\\n <DeviceAuth>false</DeviceAuth>\r\n\\n <DeviceId>N/A</DeviceId>\r\n\\n <MfaPerformed>false</MfaPerformed>\r\n\\n <MfaMethod>N/A</MfaMethod>\r\n\\n <TokenBindingProvidedId>false</TokenBindingProvidedId>\r\n\\n <TokenBindingReferredId>false</TokenBindingReferredId>\r\n\\n <SsoBindingValidationLevel>NotSet</SsoBindingValidationLevel>\r\n\\n </Component>\r\n\\n <Component zxsi:type=\"ProtocolAuditComponent\">\r\n\\n <OAuthClientId>N/A</OAuthClientId>\r\n\\n <OAuthGrant>N/A</OAuthGrant>\r\n\\n </Component>\r\n\\n <Component xsi:type=\"RequestAuditComponent\">\r\n\\n <Server>http://sso.orix.com/adfs/services/trust</Server>\r\n\\n <AuthProtocol>WSFederation</AuthProtocol>\r\n\\n <NetworkLocation>Extranet</NetworkLocation>\r\n\\n <IpAddress>102.129.235.248</IpAddress>\r\n\\n <ForwardedIpAddress>102.129.235.248</ForwardedIpAddress>\r\n\\n <ProxyIpAddress>N/A</ProxyIpAddress>\r\n\\n <NetworkIpAddress>N/A</NetworkIpAddress>\r\n\\n <ProxyServer>DA6PDMZWAP02</ProxyServer>\r\n\\n <UserAgentString>Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:135.0) Gecko/20100101 Firefox/135.0</UserAgentString>\r\n\\n <Endpoint>/adfs/ls/</Endpoint>\r\n\\n </Component>\r\n\\n </ContextComponents>\r\n\\n</AuditBase>
</Data>
</EventData>
<RenderingInfo Culture='en-US'>
<Message>The Federation Service failed to validate a new credential. See XML for failure details. \r\n\\n\r\n\\nActivity ID: 0d23868f-2ad0-4ff2-a774-511ef7b36a04 \r\n\\n\r\n\\nAdditional Data \r\n\\nXML: <?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n\\n<AuditBase
xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\"
xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"FreshCredentialAudit\">\r\n\\n <AuditType>FreshCredentials</AuditType>\r\n\\n <AuditResult>Failure</AuditResult>\r\n\\n <FailureType>CredentialValidationError</FailureType>\r\n\\n <ErrorCode>N/A</ErrorCode>\r\n\\n <ContextComponents>\r\n\\n <Component xsi:type=\"ResourceAuditComponent\">\r\n\\n <RelyingParty>http://sso.orix.com/adfs/services/trust</RelyingParty>\r\n\\n <ClaimsProvider>N/A</ClaimsProvider>\r\n\\n <UserId>kayla.cummings@orix.com</UserId>\r\n\\n </Component>\r\n\\n <Component xsi:type=\"AuthNAuditComponent\">\r\n\\n <PrimaryAuth>N/A</PrimaryAuth>\r\n\\n <DeviceAuth>false</DeviceAuth>\r\n\\n <DeviceId>N/A</DeviceId>\r\n\\n <MfaPerformed>false</MfaPerformed>\r\n\\n <MfaMethod>N/A</MfaMethod>\r\n\\n <TokenBindingProvidedId>false</TokenBindingProvidedId>\r\n\\n <TokenBindingReferredId>false</TokenBindingReferredId>\r\n\\n <SsoBindingValidationLevel>NotSet</SsoBindingValidationLevel>\r\n\\n </Component>\r\n\\n <Component xsi:type=\"ProtocolAuditComponent\">\r\n\\n <OAuthClientId>N/A</OAuthClientId>\r\n\\n <OAuthGrant>N/A</OAuthGrant>\r\n\\n </Component>\r\n\\n <Component xsi:type=\"RequestAuditComponent\">\r\n\\n <Server>http://sso.orix.com/adfs/services/trust</Server>\r\n\\n <AuthProtocol>WSFederation</AuthProtocol>\r\n\\n <NetworkLocation>Extranet</NetworkLocation>\r\n\\n <IpAddress>102.129.235.248</IpAddress>\r\n\\n <ForwardedIpAddress>102.129.235.248</ForwardedIpAddress>\r\n\\n <ProxyIpAddress>N/A</ProxyIpAddress>\r\n\\n <NetworkIpAddress>N/A</NetworkIpAddress>\r\n\\n <ProxyServer>DA6PDMZWAP02</ProxyServer>\r\n\\n <UserAgentString>Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:135.0) Gecko/20100101 Firefox/135.0</UserAgentString>\r\n\\n <Endpoint>/adfs/ls/</Endpoint>\r\n\\n </Component>\r\n\\n </ContextComponents>\r\n\\n</AuditBase>
</Message>
<Level>Information</Level>
<Task></Task>
<Opcode>Info</Opcode>
<Channel></Channel>
<Provider></Provider>
<Keywords>
<Keyword>Audit Failure</Keyword>
<Keyword>Classic</Keyword>
</Keywords>
</RenderingInfo>
</Event>
SYSLOG + KV:
2021-12-20 02:58:35 domain.com INFO Keywords="9232379236109516800" EventType="AUDIT_SUCCESS" SeverityValue="2" EventID="4634" SourceName="Microsoft-Windows-Security-Auditing" ProviderGuid="{54849625-5478-4994-A5BA-3E3B0328C30D}" Version="0" TaskValue="12545" OpcodeValue="0" RecordNumber="626878773" ExecutionProcessID="972" ExecutionThreadID="3372" Channel="Security" Message="An account was logged off.\\r\\n\\r\\nSubject:\\r\\n\\tSecurity ID:\\t\\tS-1-5-8\\r\\n\\tAccount Name:\\t\\tSYSTEM\\r\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\r\\n\\tLogon ID:\\t\\t0x16864C4700\\r\\n\\r\\nLogon Type:\\t\\t\\t9\\r\\n\\r\\nThis event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer." Category="Logoff" Opcode="Info" TargetUserSid="S-1-5-8" TargetUserName="SYSTEM" TargetDomainName="NT AUTHORITY" TargetLogonId="0x16864c4796" LogonType="9"
SYSLOG + JSON
<13>Jun 14 19: 39: 47 198.51.100.0 {
"System": {
"EventId": "4732",
"Version": "0",
"Channel": "Security",
"ProviderName": "Microsoft-Windows-Security-Auditing",
"Computer": "test2.dummy.rootdom.net",
"EventRecordID": "166582496306",
"Keywords": "AuditSuccess",
"Level": "Information",
"Opcode": "Info",
"Task": "Security Group Management",
"ProcessID": "1376",
"ThreadID": "17824",
"TimeCreated": "1718393972191",
"UserId": ""
},
"EventData": {
"MemberName": "CN=dummyuser,OU=Users,OU=WWC,OU=OEs,DC=dummy,DC=rootdom,DC=net",
"MemberSid": "dummy\\\\\\\\dummyuser",
"TargetUserName": "test-R",
"TargetDomainName": "dummy",
"TargetSid": "dummy\\\\\\\\test-R",
"SubjectUserSid": "dummy\\\\\\\\giamprod_dummy",
"SubjectUserName": "giamprod_dummy",
"SubjectDomainName": "dummy",
"SubjectLogonId": "0x16c425c7d",
"PrivilegeList": "-"
}
}
SYSLOG + XML
Dec 17 12: 59: 03 ip-10-128-38-42.ec2.internal dummyhostname <Event xmlns='http: //schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-a5ba-3e3b0328c30d}'/><EventID>4725</EventID><Version>0</Version><Level>0</Level><Task>13824</Task><Opcode>0</Opcode><Keywords>0x8020000000000000</Keywords><TimeCreated SystemTime='2024-12-17T17:59:03.129507500Z'/><EventRecordID>205924930</EventRecordID><Correlation/><Execution ProcessID='832' ThreadID='3212'/><Channel>Security</Channel><Computer>CSP53A248TFDC.tracfone.wireless.ad</Computer><Security/></System><EventData><Data Name='TargetUserName'>dummyusername$</Data><Data Name='TargetDomainName'>dummydomain</Data><Data Name='TargetSid'>S-1-5-21-2887399753-3339080456-141373822-30323</Data><Data Name='SubjectUserSid'>S-1-5-21-117005476-2051826104-1982612992-47671</Data><Data Name='SubjectUserName'>dummy-user</Data><Data Name='SubjectDomainName'>TOPP_TELECOM</Data><Data Name='SubjectLogonId'>0x11eacfdc</Data></EventData></Event>
Field mapping reference: Common device event fields to UDM fields
Deprecated: The following labels fields for UDM nouns are deprecated: about.labels, intermediary.labels, observer.labels, principal.labels, src.labels, security_result.about.labels, and target.labels. For existing parsers, in addition to these UDM fields, the logs fields are also mapped to key/value additional.fields UDM fields. For new parsers, the key/value settings in additional.fields UDM fields are used instead of the deprecated labels UDM fields. We recommend that you update the existing rules to use the key/value settings in the additional.fields UDM fields instead of the deprecated labels UDM fields.
The following fields are common across multiple Event IDs and are mapped the
same way.
Note: The % values (e.g. %1, %2, %3, %{Category}) are variable placeholders.
NXLog field
UDM field
EventTime
metadata.event_timestamp
Hostname
principal.hostname
principal.asset.hostname
EventID
product_event_type is set to "%{EventID}"
security_result.rule_name is set to "EventID: %{EventID}"
SourceName
metadata.product_name is set to "%25%7BSourceName}"
metadata.vendor_name is set to "Microsoft"
Category
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Channel
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Severity
Values mapped to security_result.severity field as follows:
Original value 0 (None) , is set to UNKNOWN_SEVERITY
Original value 1 (Critical) is set to INFORMATIONAL
Original value 2 (Error) is set to ERROR
Original value 3 (Warning) is set to ERROR
Original value 4 (Informational) is set to INFORMATIONAL
Original value 5 (Verbose) is set to INFORMATIONAL
UserID
principal.user.windows_sid
ExecutionProcessID
principal.process.pid
ProcessID
principal.process.pid
ProviderGuid
metadata.product_deployment_id
RecordNumber
metadata.product_log_id
SourceModuleName
observer.labels.key/value
additional.fields.key
additional.fields.value.string_value
SourceModuleType
observer.application
Opcode
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Keywords
additional.fields.key
additional.fields.value.string_value
ActivityID
security_result.detection_fields.key/value
Message
additional.fields.key
additional.fields.value.string_value
Field mapping reference: device event field to UDM field by EventID
The following section describes how NXlog/EventViewer fields are mapped
to UDM fields. Data may be mapped differently for different Microsoft Windows Event IDs.
The section heading identifies the Event Id, plus version (e.g. version 0) and
operatiing system (e.g. Microsoft Windows 10 client) if applicable. There may be more
than one section for an Event ID when the map for a specific version or
operating system is different.
Note: The % values (e.g. %1, %2, %3, %{Category}) are variable placeholders.
Event ID 0
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Provider: gupdate
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: hcmon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target_resource_name set to target.resource.name
Provider: edgeupdate
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Event ID 1
Provider: Microsoft-Windows-FilterManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
FinalStatus
Data/FinalStatus
security_result.summary
Format:
FinalStatus- %{FinalStatus}
DeviceVersionMajor
Data/DeviceVersionMajor
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceVersionMinor
Data/DeviceVersionMinor
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceNameLength
Data/DeviceNameLength
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceName
Data/DeviceNameLength
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceTime
Data/DeviceTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
version 0 / Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
version 1 / Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Reason
Data/Reason
security_result.description
ProcessName
Data/ProcessName
principal.process.command_line
ProcessID
Data/ProcessID
principal.process.pid
NewTime
Data/NewTime
additional.fields.key
additional.fields.value_string
OldTime
Data/OldTime
additional.fields.key
additional.fields.value_string
version 3 / Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
NewTime
Data/NewTime
additional.fields.key
additional.fields.value_string
OldTime
Data/OldTime
additional.fields.key
additional.fields.value_string
CmosTime
Data/CmosTime
additional.fields.key
additional.fields.value_string
TimeZoneBias
Data/TimeZoneBias
additional.fields.key
additional.fields.value_string
RealTimeIsUniversal
Data/RealTimeIsUniversal
additional.fields.key
additional.fields.value_string
SystemInCmosMode
Data/SystemInCmosMode
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Sysmon
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_LAUNCH
If EventLevelName contains "Information" then security_result.severity = INFORMATIONAL
EventData.Hashes
Based on Hash algorithm.
MD5 set to target.process.file.md5
SHA256 set to target.process.file.sha256
SHA1 set to target.process.file.sha1
EventData.User
Domain set to principal.administrative_domain
Username set to principal.user.userid
Description
metadata.description
CommandLine
target.process.command_line
Image
target.process.file.full_path
ParentCommandLine
target.process.parent_process.command_line
ParentImage
target.process.parent_process.file.full_path
ParentProcessId
target.process.parent_process.pid
ProcessId
target.process.pid
EventOriginId
target.process.product_specific_process_id set to "sysmon:%{EventOriginId}"
Provider: SecurityCenter
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
SourceName
Not available
target.application
Provider: telegraf
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data
security_result.description
ERROR_EVT_UNRESOLVED
security_result.detection_fields.key
security_result.detection_fields.value
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Context
Data/Context
security_result.description
hr
Data/hr
additional.fields.key
additional.fields.value_string
ErrorParam1
Data/ErrorParam1
additional.fields.key
additional.fields.value_string
ErrorParam2
Data/ErrorParam2
additional.fields.key
additional.fields.value_string
ErrorParam3
Data/ErrorParam3
additional.fields.key
additional.fields.value_string
ErrorParam4
Data/ErrorParam4
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
JobGuid
additional.fields.key
additional.fields.value_string
Title
target.resource.name
Event ID 2
Provider: MEIx64
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Provider: SecurityCenter
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
Not available
target.application
Provider: vmci
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Provider: Microsoft-Windows-WHEA-Logger
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
RawData
Data/RawData
additional.fields.key
additional.fields.value_string
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
JobGuid
additional.fields.key
additional.fields.value_string
Title
target.resource.name
Event ID 3
version 3 / Provider: Microsoft-Windows-Power-Troubleshooter
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_STARTUP
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
SleepTime
Data/SleepTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeTime
Data/WakeTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeSourceType
Data/WakeSourceType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeSourceText
Data/WakeSourceText
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SleepDuration
Data/SleepDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeDuration
Data/WakeDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DriverInitDuration
Data/DriverInitDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
BiosInitDuration
Data/BiosInitDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HiberWriteDuration
Data/HiberWriteDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HiberReadDuration
Data/HiberReadDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HiberPagesWritten
Data/HiberPagesWritten
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Attributes
Data/Attributes
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TargetState
Data/TargetState
target.resource.attribute.labels.key
target.resource.attribute.labels.value
EffectiveState
Data/EffectiveState
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeSourceTextLength
Data/WakeSourceTextLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeTimerOwnerLength
Data/WakeTimerOwnerLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeTimerContextLength
Data/WakeTimerContextLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NoMultiStageResumeReason
Data/NoMultiStageResumeReason
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeTimerOwner
Data/WakeTimerOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
WakeTimerContext
Data/WakeTimerContext
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CheckpointDuration
Data/CheckpointDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Provider: Microsoft-Windows-Security-Kerberos
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = FAIL
File
target.file.full_path
ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
ErrorMessage
security_result.description
ServerRealm
target.administrative_domain
ServerName
target.hostname
TargetName
target.domain.name
Line
security_result.detection_fields.key
security_result.detection_fields.value
Provider: Virtual Disk Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Provider: vmci
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobTitle
target.resource.name
processPath
target.process.file.full_path
jobId
target.resource.product_object_id
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
processId
target.process.pid
ClientProcessStartKey
additional.fields.key
additional.fields.value_string
Event ID 4
Provider: Microsoft-Windows-Security-Kerberos
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = FAIL
Server
target.hostname
TargetRealm
target.domain.name
Targetname
target.application
ClientRealm
principal.domain.name
Provider: Virtual Disk Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
name
target.resource.name
Id
target.resource.product_object_id
url
target.url
fileLength
target.file.size
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
processId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClientProcessStartKey
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5
Provider: iScsiPrt
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Provider: McAfee Service Controller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Microsoft-Windows-Search-ProfileNotify
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
SourceName
target.application
User
Data/User
target.user.userid
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
User
principal.user.userid
Title
target.resource.name
Id
target.resource.product_object_id
Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fileCount
additional.fields.key
additional.fields.value_string
processId
target.process.pid
ClientProcessStartKey
additional.fields.key
additional.fields.value_string
Event ID 6
Provider: Microsoft-Windows-CertificateServicesClient-AutoEnrollment
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
%{ErrorCode}-%{ErrorMsg}
ErrorMsg
security_result.summary
Format:
%{ErrorCode}-%{ErrorMsg}
Context
target.application
Provider: Microsoft-Windows-FilterManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
FinalStatus
Data/FinalStatus
security_result.summary
Format:
FinalStatus- %{FinalStatus}
DeviceVersionMajor
Data/DeviceVersionMajor
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceVersionMinor
Data/DeviceVersionMinor
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceNameLength
Data/DeviceNameLength
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceName
Data/DeviceNameLength
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DeviceTime
Data/DeviceTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Name
additional.fields.key
additional.fields.value_string
Value
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobId
target.resource.product_object_id
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
program
target.resource.attribute.labels.key
target.resource.attribute.labels.value
parameters
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 7
Provider: AdmPwd
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Format:
"Error: %{Data}"
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Name
additional.fields.key
additional.fields.value_string
Value
additional.fields.key
additional.fields.value_string
Event ID 8
Provider: CylanceSvc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Provider: WSH
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data_1
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
Data_2
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
Data_3
principal.process.command_line
Message
metadata.description
Event ID 9
Provider: volsnap
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
VolumeName
target.file.full_path
NTSTATUS
additional.fields.key
additional.fields.value_string
SourceTag
additional.fields.key
additional.fields.value_string
SourceFileID
additional.fields.key
additional.fields.value_string
SourceLine
additional.fields.key
additional.fields.value_string
Event ID 10
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Index
Data/Index
additional.fields.key
additional.fields.value_string
CLS
Data/CLS
additional.fields.key
additional.fields.value_string
INS
Data/INS
additional.fields.key
additional.fields.value_string
P1
Data/P1
additional.fields.key
additional.fields.value_string
P2
Data/P2
additional.fields.key
additional.fields.value_string
Lc
Data/Lc
additional.fields.key
additional.fields.value_string
Le
Data/Le
additional.fields.key
additional.fields.value_string
.NETServiceMethod
Data/.NETServiceMethod
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 11
Provider: Microsoft-Windows-Hyper-V-Netvsc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
MiniportName
target.resource.name
AccountType
principal.user.attribute.roles.name
MiniportNameLen
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ExtraStringLength
Data/ExtraStringLength
additional.fields.key
additional.fields.value_string
ExtraString
Data/ExtraString
additional.fields.key
additional.fields.value_string
TmId
Data/TmId
additional.fields.key
additional.fields.value_string
RmId
Data/RmId
additional.fields.key
additional.fields.value_string
Status
Data/Status
additional.fields.key
additional.fields.value_string
InternalCode
Data/InternalCode
additional.fields.key
additional.fields.value_string
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Error
Data/Error
security_result.summary is set to "ErrorCode: %{Error}"
MessageType
Data/MessageType
additional.fields.key
additional.fields.value_string
ICCStatus
Data/ICCStatus
additional.fields.key
additional.fields.value_string
CmdStatus
Data/CmdStatus
additional.fields.key
additional.fields.value_string
SW1
Data/SW1
additional.fields.key
additional.fields.value_string
SW2
Data/SW2
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Wininit
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
StringCount
EventData.StringCount
additional.fields.key
additional.fields.value_string
String
EventData.String
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 12
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_STARTUP
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
MajorVersion
Data/MajorVersion
target.asset.attribute.labels.key
target.asset.attribute.labels.value
MinorVersion
Data/MinorVersion
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BuildVersion
Data/BuildVersion
target.asset.attribute.labels.key
target.asset.attribute.labels.value
QfeVersion
Data/QfeVersion
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ServiceVersion
Data/ServiceVersion
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BootMode
Data/BootMode
target.asset.attribute.labels.key
target.asset.attribute.labels.value
StartTime
Data/StartTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Provider: Microsoft-Windows-Sysmon
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_CREATION
If EventLevelName =~ "Information" then security_result.severity = INFORMATIONAL
EventOriginId
target.process.product_specific_process_id set to "sysmon: %{EventOriginId}"
EventData/EventType
target.registry.registry_key
EventData/TargetObject
target.registry.registry_value_name
ProcessId
principal.process.pid
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: Microsoft-Windows-UserModePowerService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ProcessPath
target.process.file.full_path
NewSchemeGuid
target.resource.product_object_id
OldSchemeGuid
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessPid
target.process.pid
Provider: Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Capabilities
EventData.Capabilities
additional.fields.key
additional.fields.value_string
KeyProtectionMechanism
EventData.KeyProtectionMechanism
additional.fields.key
additional.fields.value_string
MaxBandCount
EventData.MaxBandCount
additional.fields.key
additional.fields.value_string
BandMetadataSize
EventData.BandMetadataSize
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 13
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
StopTime
Data/StopTime
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Sysmon
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_MODIFICATION
If EventLevelName =~ "Information" then security_result.severity = INFORMATIONAL
ProcessId
principal.process.pid
EventOriginId
target.process.product_specific_process_id set to "sysmon: %{EventOriginId}"
EventData/EventType
target.registry.registry_key
EventData/Details
target.registry.registry_value_data
Provider: Microsoft-Windows-CertificateServicesClient-CertEnroll
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
principal.administrative_domain
AccountName
principal.user.userid
AccountType
principal.user.attribute.roles.name
Message
metadata.description
UserID
principal.user.windows_sid
CA
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
ErrorCode
security_result.summary
Format:
security_result.summary is set to %{error_code} - %{error_message}
Context
principal.user.attribute.labels.key
principal.user.attribute.labels.value
TemplateName
additional.fields.key
additional.fields.value_string
RequestId
principal.user.attribute.labels.key
principal.user.attribute.labels.value
Provider: NPS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
target.ip
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 14
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
security_result.action = FAIL
ClientName
principal.asset.attribute.labels.key/value
Target
target.application
Account
target.hostname
ID
additional.fields.key
additional.fields.value_string
RequestedEtypes
additional.fields.key
additional.fields.value_string
AvailableEtypes
additional.fields.key
additional.fields.value_string
AccountToReset
principal.user.userid
Provider: Microsoft-Windows-Wininit
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Config
Data/Config
additional.fields.key
additional.fields.value_string
IsTestConfig
Data/IsTestConfig
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Error
Data/Error
security_result.description
Format:
Error - %{value}
Provider:TPM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
UserID
Security/UseID
principal.user.windows_sid
locationCode
Data/locationCode
additional.fields.key
additional.fields.value_string
Data
Data/Data
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 15
Provider: Disk
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_hostname set to target.hostname
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
NewSize
Data/NewSize
target.file.size
HiveName
Data/HiveName
target.registry.registry_key
AccountType
principal.user.attribute.roles.name
HiveNameLength
Data/HiveNameLength
additional.fields.key
additional.fields.value_string
OriginalSize
Data/OriginalSize
additional.fields.key
additional.fields.value_string
Provider: SecurityCenter
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Provider:TPM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
UserID
Security/UseID
principal.user.windows_sid
locationCode
Data/locationCode
additional.fields.key
additional.fields.value_string
Data
Data/Data
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 16
Provider: Microsoft-Windows-HAL
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
security_result.action = FAIL
ClientName
principal.asset.attribute.labels.key/value
Target
target.application
Account
target.hostname
ID
additional.fields.key
additional.fields.value_string
RequestedEtypes
additional.fields.key
additional.fields.value_string
AvailableEtypes
additional.fields.key
additional.fields.value_string
AccountToReset
principal.user.userid
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_MODIFICATION
Domain
System/Domain
principal.administrative_domain
ProcessID
System/ProcessID
principal.process.pid
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
HiveName
Data/HiveName
target.registry.registry_key
AccountType
principal.user.attribute.roles.name
HiveNameLength
Data/HiveNameLength
additional.fields.key
additional.fields.value_string
KeysUpdated
Data/KeysUpdated
additional.fields.key
additional.fields.value_string
DirtyPages
Data/DirtyPages
additional.fields.key
additional.fields.value_string
HiveNameLength
Data/HiveNameLength
additional.fields.key
additional.fields.value_string
KeysUpdated
Data/KeysUpdated
additional.fields.key
additional.fields.value_string
DirtyPages
DirtyPages
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to metadata.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
version 0 / Provider: Microsoft-Windows-HAL
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 17
Provider: Microsoft-Windows-WHEA-Logger
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorSource
Data/ErrorSource
security_result.detection_fields.key
security_result.detection_fields.value
FRUId
Data/FRUId
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
FRUText
Data/FRUText
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
ValidBits
Data/ValidBits
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
PortType
Data/PortType
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Version
Data/Version
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Command
Data/Command
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Status
Data/Status
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Bus
Data/Bus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Device
Data/Device
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Function
Data/Function
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Segment
Data/Segment
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryBus
Data/SecondaryBus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryDevice
Data/SecondaryDevice
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryFunction
Data/SecondaryFunction
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
VendorID
Data/VendorID
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
DeviceID
Data/DeviceID
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
ClassCode
Data/ClassCode
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
DeviceSerialNumber
Data/DeviceSerialNumber
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
BridgeControl
Data/BridgeControl
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
BridgeStatus
Data/BridgeStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
UncorrectableErrorStatus
Data/UncorrectableErrorStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
CorrectableErrorStatus
Data/CorrectableErrorStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
HeaderLog
Data/HeaderLog
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
PrimaryDeviceName
Data/PrimaryDeviceName
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryDeviceName
Data/SecondaryDeviceName
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Category set to security_result.category_details
Message set to metadata.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
peerCacheEnabled
additional.fields.key
additional.fields.value_string
peerClientEnabled
additional.fields.key
additional.fields.value_string
peerServerEnabled
additional.fields.key
additional.fields.value_string
maxPeers
additional.fields.key
additional.fields.value_string
maxClients
additional.fields.key
additional.fields.value_string
maxContentAge
additional.fields.key
additional.fields.value_string
maxCacheSize
additional.fields.key
additional.fields.value_string
minCacheDiskSize
additional.fields.key
additional.fields.value_string
cacheDenyUrls
about.url
denyUrlCount
additional.fields.key
additional.fields.value_string
denyUrls
additional.fields.key
additional.fields.value_string
Event ID 18
Provider: BTHUSB
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
EntryCount
Data/EntryCount
additional.fields.key
additional.fields.value_string
Provider: TPM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
locationCode
Data/locationCode
additional.fields.key
additional.fields.value_string
Data
Data/Data
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
packet
additional.fields.key
additional.fields.value_string
hr
additional.fields.key
additional.fields.value_string
fqdn
about.administrative_domain
sourceAddress
additional.fields.key
additional.fields.value_string
addressCount
additional.fields.key
additional.fields.value_string
addresses
additional.fields.key
additional.fields.value_string
Event ID 19
version 0 / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Category
Data/Category
security_result.category_details
updateGuid
Data/updateGuid
additional.fields.key
additional.fields.value_string
updateRevisionNumber
Data/updateRevisionNumber
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
serviceGuid
Data/serviceGuid
additional.fields.key
additional.fields.value_string
Provider: Intel-SST-OED
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
Category
security_result.summary
status
security_result.detection_fields.key
security_result.detection_fields.value
Provider: Microsoft-Windows-WHEA-Logger
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
ErrorSource
Data/ErrorSource
security_result.detection_fields.key
security_result.detection_fields.value
ApicId
Data/ApicId
additional.fields.key
additional.fields.value_string
MCABank
Data/MCABank
additional.fields.key
additional.fields.value_string
MciStat
Data/MciStat
additional.fields.key
additional.fields.value_string
MciAddr
Data/MciAddr
additional.fields.key
additional.fields.value_string
MciMisc
Data/MciMisc
additional.fields.key
additional.fields.value_string
ErrorType
Data/ErrorType
security_result.detection_fields.key
security_result.detection_fields.value
TransactionType
Data/TransactionType
security_result.detection_fields.key
security_result.detection_fields.value
Participation
Data/Participation
additional.fields.key
additional.fields.value_string
RequestType
Data/RequestType
security_result.detection_fields.key
security_result.detection_fields.value
MemorIO
Data/MemorIO
additional.fields.key
additional.fields.value_string
MemHierarchyLvl
Data/MemHierarchyLvl
additional.fields.key
additional.fields.value_string
Timeout
Data/Timeout
security_result.detection_fields.key
security_result.detection_fields.value
OperationType
Data/OperationType
additional.fields.key
additional.fields.value_string
Channel
Data/Channel
additional.fields.key
additional.fields.value_string
Length
Data/Length
additional.fields.key
additional.fields.value_string
RawData
Data/RawData
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fqdn
about.administrative_domain
authenticated
additional.fields.key
additional.fields.value_string
online
additional.fields.key
additional.fields.value_string
addressCount
additional.fields.key
additional.fields.value_string
addressLength
additional.fields.key
additional.fields.value_string
Event ID 20
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
Path
Data/Path
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
LastShutdownGood
Data/LastShutdownGood
additional.fields.key
additional.fields.value_string
LastBootGood
Data/LastBootGood
additional.fields.key
additional.fields.value_string
LastBootId
Data/LastBootId
additional.fields.key
additional.fields.value_string
BootStatusPolicy
Data/BootStatusPolicy
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
updateRevisionNumber
target.resource.attribute.labels.key
target.resource.attribute.labels.value
updateTitle
target.resource.name
updateGuid
target.resource.product_object_id
errorCode
security_result.detection_fields.key
security_result.detection_fields.value
serviceGuid
additional.fields.key
additional.fields.value_string
Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
UpdateReason
Data/UpdateReason
security_result.detection_fields.key
security_result.detection_fields.value
EnabledNew
Data/EnabledNew
additional.fields.key
additional.fields.value_string
CountNew
Data/CountNew
additional.fields.key
additional.fields.value_string
CountOld
Data/CountOld
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fqdn
about.administrative_domain
authenticated
additional.fields.key
additional.fields.value_string
online
additional.fields.key
additional.fields.value_string
addressCount
additional.fields.key
additional.fields.value_string
addressLength
additional.fields.key
additional.fields.value_string
Event ID 21
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
ConfigProperty
Data/ConfigProperty
security_result.detection_fields.key
security_result.detection_fields.value
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fqdn
about.administrative_domain
authenticated
additional.fields.key
additional.fields.value_string
online
additional.fields.key
additional.fields.value_string
addressCount
additional.fields.key
additional.fields.value_string
addressLength
additional.fields.key
additional.fields.value_string
Event ID 22
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
Path
Data/Path
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Category set to security_result.category_details
Message set to metadata.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
updatelist
security_result.description
restarttime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Provider: Microsoft-Windows-UserModePowerService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Turn
Data/Turn
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fqdn
about.administrative_domain
authenticated
additional.fields.key
additional.fields.value_string
online
additional.fields.key
additional.fields.value_string
addressCount
additional.fields.key
additional.fields.value_string
addressLength
additional.fields.key
additional.fields.value_string
Event ID 23
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
Path
Data/Path
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
security_result.action = FAIL
Type
security_result.detection_fields.key
security_result.detection_fields.value
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
user
about.user.windows_sid
Event ID 24
Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
ExitReason
Data/ExitReason
security_result.detection_fields.key
security_result.detection_fields.value
CurrentBias
Data/CurrentBias
additional.fields.key
additional.fields.value_string
CurrentTimeZoneID
Data/CurrentTimeZoneID
additional.fields.key
additional.fields.value_string
TimeZoneInfoCacheUpdated
Data/TimeZoneInfoCacheUpdated
additional.fields.key
additional.fields.value_string
FirstRefresh
Data/FirstRefresh
additional.fields.key
additional.fields.value_string
version 0 / Provider: Microsoft-Windows-Kernel-General
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ExitReason
Data/ExitReason
security_result.detection_fields.key
security_result.detection_fields.value
CurrentBias
Data/CurrentBias
additional.fields.key
additional.fields.value_string
CurrentTimeZoneID
Data/CurrentTimeZoneID
additional.fields.key
additional.fields.value_string
TimeZoneInfoCacheUpdated
Data/TimeZoneInfoCacheUpdated
additional.fields.key
additional.fields.value_string
FirstRefresh
Data/FirstRefresh
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorMessage
Data/ErrorMessage
security_result.description
DomainPeer
Data/DomainPeer
target.administrative_domain
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Provider:TPM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
UserID
Security/UseID
principal.user.windows_sid
locationCode
Data/locationCode
additional.fields.key
additional.fields.value_string
Data
Data/Data
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
sourceAddress
additional.fields.key
additional.fields.value_string
Event ID 25
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
BootMenuPolicy
Data/BootMenuPolicy
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
sourceAddress
additional.fields.key
additional.fields.value_string
packet
additional.fields.key
additional.fields.value_string
hr
additional.fields.key
additional.fields.value_string
Event ID 26
Provider: Application Popup
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Caption
security_result.summary
Provider: Microsoft-Windows-CertificationAuthority
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = "Active Directory Certificate Services"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DCName
Data/DCName
target.administrative_domain
CACommonName
Data/CACommonName
target.user.userid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
DCSpecifier
Data/DCSpecifier
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = FAIL
Target
target.hostname
Name
target.user.userid
ID
additional.fields.key
additional.fields.value_string
RequestedEtypes
additional.fields.key
additional.fields.value_string
AvailableETypes
additional.fields.key
additional.fields.value_string
Event ID 27
version 0 / Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
NewLogFilePath
Data/NewLogFilePath
target.file.full_path
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
FailedLogFilePath
Data/FailedLogFilePath
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
BootType
Data/BootType
additional.fields.key
additional.fields.value_string
LoadOptions
Data/LoadOptions
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to metadata.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
searchId
security_result.detection_fields
jobId
target.resource.product_object_id
url
target.url
timestamp
additional.fields.key
additional.fields.value_string
Event ID 28
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to metadata.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
searchId
security_result.detection_fields
jobId
target.resource.product_object_id
Event ID 29
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
requestId
additional.fields.key
additional.fields.value_string
searchId
security_result.detection_fields
peer
additional.fields.key
additional.fields.value_string
Event ID 30
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ResetEndStart
Data/ResetEndStart
additional.fields.key
additional.fields.value_string
LoadOSImageStart
Data/LoadOSImageStart
additional.fields.key
additional.fields.value_string
StartOSImageStart
Data/StartOSImageStart
additional.fields.key
additional.fields.value_string
ExitBootServicesEntry
Data/ExitBootServicesEntry
additional.fields.key
additional.fields.value_string
ExitBootServicesExit
Data/ExitBootServicesExit
additional.fields.key
additional.fields.value_string
Provider: TPM
NXLog field
Event Viewer field
UDM field
locationCode
Data/locationCode
additional.fields.key
additional.fields.value_string
resetCountBefore
Data/resetCountBefore
additional.fields.key
additional.fields.value_string
restartCountBefore
Data/restartCountBefore
additional.fields.key
additional.fields.value_string
resetCountAfter
Data/resetCountAfter
additional.fields.key
additional.fields.value_string
restartCountAfter
Data/restartCountAfter
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
requestId
additional.fields.key
additional.fields.value_string
SearchId
security_result.detection_fields
hr
additional.fields.key
additional.fields.value_string
Event ID 31
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
requestId
additional.fields.key
additional.fields.value_string
SearchId
security_result.detection_fields
hr
additional.fields.key
additional.fields.value_string
Event ID 32
Provider: e1iexpress
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
BitlockerUserInputTime
Data/BitlockerUserInputTime
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
requestId
additional.fields.key
additional.fields.value_string
id
target.resource.product_object_id
url
target.url
rangecount
additional.fields.key
additional.fields.value_string
Range.offset
additional.fields.key
additional.fields.value_string
Range.length
additional.fields.key
additional.fields.value_string
Event ID 33
Provider: volsnap
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
VolumeName
target.file.full_path
DeviceName
target.resource.name
NTSTATUS
additional.fields.key
additional.fields.value_string
SourceTag
additional.fields.key
additional.fields.value_string
SourceFileID
additional.fields.key
additional.fields.value_string
SourceLine
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
count
additional.fields.key
additional.fields.value_string
addresses
target.ip
Event ID 34
Provider: Oracle.xstore
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_READ
DBID
additional.fields.key/value
ProcessId
principal.process.pid
SourceName
principal.application
DATABASE_USER
principal.user.uerid
ACTION
target.process.command_line
USERHOST
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
jobId
target.resource.product_object_id
FileCount
additional.fields.key
additional.fields.value_string
jobTransferPolicy
security_result.rule_labels.key
security_result.rule_labels.value
globalTransferPolicy
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 35
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
security_result.action = FAIL
IssuingKDC
Data/IssuingKDC
observer.asset.asset_id
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
TimeSource
Data/TimeSource
security_result.detection_fields.key
security_result.detection_fields.value
TimeSourceRefId
Data/TimeSourceRefId
security_result.detection_fields.key
security_result.detection_fields.value
CurrentStratumNumber
Data/CurrentStratumNumber
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 36
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
UnsynchronizedTimeSeconds
Data/UnsynchronizedTimeSeconds
security_result.detection_fields.key
security_result.detection_fields.value
TimeRemainingToSetLocalClockFreeRunningSeconds
Data/TimeRemainingToSetLocalClockFreeRunningSeconds
security_result.detection_fields.key
security_result.detection_fields.value
Provider: NPS
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Message
Ip set to target.ip
Event ID 37
Provider: Microsoft-Windows-Kerberos-Key-Distribution-Center
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
security_result.action = FAIL
ClientName
principal.asset.attribute.labels.key/value
ServerName
target.hostname
IssuingKDC
additional.fields.key
additional.fields.value_string
ClientRealm
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Provider: Microsoft-Windows-Kernel-Processor-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Number
Data/Number
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CapDurationInSeconds
Data/CapDurationInSeconds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Group
Data/Group
target.group.attribute.labels.key
target.group.attribute.labels.value
PpcChanges
Data/PpcChanges
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TpcChanges
Data/TpcChanges
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PccChanges
Data/PccChanges
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
TimeSource
Data/TimeSource
security_result.detection_fields.key
security_result.detection_fields.value
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
nlmCost
additional.fields.key
additional.fields.value_string
usage
additional.fields.key
additional.fields.value_string
cap
additional.fields.key
additional.fields.value_string
isThrottled
additional.fields.key
additional.fields.value_string
isOvercap
additional.fields.key
additional.fields.value_string
isRoaming
additional.fields.key
additional.fields.value_string
globalTransferPolicy
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 38
Provider: Microsoft-Windows-CertificationAuthority
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "Active Directory Certificate Services"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
CACommonName
Data/CACommonName
target.user.userid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 40
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ChannelPath
Data/ChannelPath
additional.fields.key
additional.fields.value_string
Event ID 41
version 8 / Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
BugcheckCode
Data/BugcheckCode
additional.fields.key
additional.fields.value_string
BugcheckParameter1
Data/BugcheckParameter1
additional.fields.key
additional.fields.value_string
BugcheckParameter2
Data/BugcheckParameter2
additional.fields.key
additional.fields.value_string
BugcheckParameter3
Data/BugcheckParameter3
additional.fields.key
additional.fields.value_string
BugcheckParameter4
Data/BugcheckParameter4
additional.fields.key
additional.fields.value_string
SleepInProgress
Data/SleepInProgress
additional.fields.key
additional.fields.value_string
PowerButtonTimestamp
Data/PowerButtonTimestamp
additional.fields.key
additional.fields.value_string
BootAppStatus
Data/BootAppStatus
additional.fields.key
additional.fields.value_string
Checkpoint
Data/Checkpoint
additional.fields.key
additional.fields.value_string
ConnectedStandbyInProgress
Data/ConnectedStandbyInProgress
additional.fields.key
additional.fields.value_string
SystemSleepTransitionsToOn
Data/SystemSleepTransitionsToOn
additional.fields.key
additional.fields.value_string
CsEntryScenarioInstanceId
Data/CsEntryScenarioInstanceId
additional.fields.key
additional.fields.value_string
BugcheckInfoFromEFI
Data/BugcheckInfoFromEFI
additional.fields.key
additional.fields.value_string
CheckpointStatus
Data/CheckpointStatus
additional.fields.key
additional.fields.value_string
CsEntryScenarioInstanceIdV2
Data/CsEntryScenarioInstanceIdV2
additional.fields.key
additional.fields.value_string
LongPowerButtonPressDetected
Data/LongPowerButtonPressDetected
additional.fields.key
additional.fields.value_string
Event ID 42
version 0 Windows 10 client / Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
TargetState
Data/TargetState
additional.fields.key
additional.fields.value_string
EffectiveState
Data/EffectiveState
additional.fields.key
additional.fields.value_string
version 2 Windows 10 client /
NXLog field
Event Viewer field
UDM field
Reason
Data/Reason
security_result.description
Flags
Data/Flags
additional.fields.key
additional.fields.value_string
version 3 Windows 10 client /
NXLog field
Event Viewer field
UDM field
TransitionsToOn
Data/TransitionsToOn
additional.fields.key
additional.fields.value_string
Event ID 43
Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
updateRevisionNumber
Data/updateRevisionNumber
target.resource.attribute.labels.key
target.resource.attribute.labels.value
updateTitle
Data/updateTitle
target.resource.name
updateGuid
Data/updateGuid
target.resource.product_object_id
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 44
version 0 Windows 10 client / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
AccountType
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
Category
Data/Category
security_result.category_details
updateGuid
Data/updateGuid
additional.fields.key
additional.fields.value_string
updateRevisionNumber
Data/updateRevisionNumber
additional.fields.key
additional.fields.value_string
version 1 Windows 10 client / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
updateTitle
Data/updateTitle
additional.fields.key
additional.fields.value_string
Event ID 45
Provider: Symantec AntiVirus
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
Data
security_result.summary
Event ID 47
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorMessage
security_result.description
ManualPeer
target.ip
Provider: Microsoft-Windows-WHEA-Logger
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorSource
Data/ErrorSource
security_result.detection_fields.key
security_result.detection_fields.value
FRUId
Data/FRUId
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
FRUText
Data/FRUText
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
ValidBits
Data/ValidBits
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
PortType
Data/PortType
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Version
Data/Version
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Command
Data/Command
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Status
Data/Status
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Bus
Data/Bus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Device
Data/Device
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Function
Data/Function
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Segment
Data/Segment
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryBus
Data/SecondaryBus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryDevice
Data/SecondaryDevice
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryFunction
Data/SecondaryFunction
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
VendorID
Data/VendorID
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
DeviceID
Data/DeviceID
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
ClassCode
Data/ClassCode
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
DeviceSerialNumber
Data/DeviceSerialNumber
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
BridgeControl
Data/BridgeControl
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
BridgeStatus
Data/BridgeStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
UncorrectableErrorStatus
Data/UncorrectableErrorStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
CorrectableErrorStatus
Data/CorrectableErrorStatus
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
HeaderLog
Data/HeaderLog
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
PrimaryDeviceName
Data/PrimaryDeviceName
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
SecondaryDeviceName
Data/SecondaryDeviceName
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Event ID 49
Provider: Microsoft-Windows-Hyper-V-Netvsc
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Status
Data/Status
security_result.summary
Event ID 50
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
TimeDifferenceMilliseconds
Data/TimeDifferenceMilliseconds
security_result.detection_fields.key
security_result.detection_fields.value
TimeSampleSeconds
Data/TimeSampleSeconds
security_result.detection_fields.key
security_result.detection_fields.value
Provider: Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 51
Provider: Disk
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_hostname set to target.hostname
Event ID 55
version 0 Windows 10 client / Provider: Microsoft-Windows-Kernel-Processor-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Group
Data/Group
additional.fields.key
additional.fields.value_string
Number
Data/Number
additional.fields.key
additional.fields.value_string
IdleStateCount
Data/IdleStateCount
additional.fields.key
additional.fields.value_string
IdleImplementation
Data/IdleImplementation
additional.fields.key
additional.fields.value_string
NominalFrequency
Data/NominalFrequency
additional.fields.key
additional.fields.value_string
MaximumPerformancePercent
Data/MaximumPerformancePercent
additional.fields.key
additional.fields.value_string
MinimumPerformancePercent
Data/MinimumPerformancePercent
additional.fields.key
additional.fields.value_string
MinimumThrottlePercent
Data/MinimumThrottlePercent
additional.fields.key
additional.fields.value_string
PerformanceImplementation
Data/PerformanceImplementation
additional.fields.key
additional.fields.value_string
version 1 Windows 10 client / Provider: Microsoft-Windows-Kernel-Processor-Power
NXLog field
Event Viewer field
UDM field
ProgrammedWakeTimeAc
Data/ProgrammedWakeTimeAc
additional.fields.key
additional.fields.value_string
Provider: Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Outcome
security_result.summary
DriveName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DeviceName
target.resource.name
CorruptionState
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HeaderFlags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Origin
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Verb
observer.labels.key
observer.labels.value
Description
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Signature
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SampleLength
additional.fields.key
additional.fields.value_string
SourceFile
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SourceLine
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SourceTag
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AdditionalInfo
additional.fields.key
additional.fields.value_string
CallStack
additional.fields.key
additional.fields.value_string
Event ID 57
Provider: hpqilo3
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 58
Provider: partmgr
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to metadata.description
Provider: volsnap
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to metadata.description
Event ID 59
Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
name
target.resource.name
Id
target.resource.product_object_id
url
target.url
fileLength
target.file.size
transferId
additional.fields.key
additional.fields.value_string
peer
additional.fields.key
additional.fields.value_string
hr
additional.fields.key
additional.fields.value_string
fileTime
additional.fields.key
additional.fields.value_string
bytesTotal
additional.fields.key
additional.fields.value_string
bytesTransferred
additional.fields.key
additional.fields.value_string
proxy
additional.fields.key
additional.fields.value_string
peerProtocolFlags
additional.fields.key
additional.fields.value_string
bytesTransferredFromPeer
additional.fields.key
additional.fields.value_string
AdditionalInfoHr
additional.fields.key
additional.fields.value_string
PeerContextInfo
additional.fields.key
additional.fields.value_string
bandwidthLimit
additional.fields.key
additional.fields.value_string
ignoreBandwidthLimitsOnLan
additional.fields.key
additional.fields.value_string
Event ID 60
Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
name
target.resource.name
url
target.url
fileLength
target.file.size
transferId
additional.fields.key
additional.fields.value_string
peer
additional.fields.key
additional.fields.value_string
hr
additional.fields.key
additional.fields.value_string
fileTime
additional.fields.key
additional.fields.value_string
bytesTotal
additional.fields.key
additional.fields.value_string
bytesTransferred
additional.fields.key
additional.fields.value_string
proxy
additional.fields.key
additional.fields.value_string
peerProtocolFlags
additional.fields.key
additional.fields.value_string
bytesTransferredFromPeer
additional.fields.key
additional.fields.value_string
AdditionalInfoHr
additional.fields.key
additional.fields.value_string
PeerContextInfo
additional.fields.key
additional.fields.value_string
bandwidthLimit
additional.fields.key
additional.fields.value_string
ignoreBandwidthLimitsOnLan
additional.fields.key
additional.fields.value_string
Event ID 61
Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
name
target.resource.name
Id
target.resource.product_object_id
url
target.url
fileLength
target.file.size
transferId
additional.fields.key
additional.fields.value_string
peer
additional.fields.key
additional.fields.value_string
hr
additional.fields.key
additional.fields.value_string
fileTime
additional.fields.key
additional.fields.value_string
bytesTotal
additional.fields.key
additional.fields.value_string
bytesTransferred
additional.fields.key
additional.fields.value_string
proxy
additional.fields.key
additional.fields.value_string
peerProtocolFlags
additional.fields.key
additional.fields.value_string
bytesTransferredFromPeer
additional.fields.key
additional.fields.value_string
AdditionalInfoHr
additional.fields.key
additional.fields.value_string
PeerContextInfo
additional.fields.key
additional.fields.value_string
bandwidthLimit
additional.fields.key
additional.fields.value_string
ignoreBandwidthLimitsOnLan
additional.fields.key
additional.fields.value_string
Event ID 64
Provider: Microsoft-Windows-CertificateServicesClient-AutoEnrollment
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Context
target.application
ObjId
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Job
target.resource.name
Url
target.url
Pgm
target.application
hr
security_result.summary
Format:
hr - %{hr}
Event ID 75
Provider: Microsoft-Windows-CertificationAuthority
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application set to "Active Directory Certificate Services"
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
ErrorMessageText
security_result.summary
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
CAKeyIdentifier
additional.fields.key
additional.fields.value_string
URL
additional.fields.key
additional.fields.value_string
AdditionalErrorMessage
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 77
Provider: Microsoft-Windows-CertificationAuthority
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application set to "Active Directory Certificate Services"
WarningMessage
security_result.description
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Opcode
additional.fields.key
additional.fields.value_string
PolicyModuleDescription
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 80
Provider: ocz10xx
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data
target.hostname
Data_1
additional.fields.key
additional.fields.value_string
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 81
Provider: hpqilo2
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-FailoverClustering-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
Parameter1
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 98
Provider: Microsoft-Windows-Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_HEARTBEAT
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
DeviceName
Data/DeviceName
principal.hostname
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DriveName
Data/DriveName
additional.fields.key
additional.fields.value_string
CorruptionActionState
Data/CorruptionActionState
security_result.summary
Format:
CorruptionActionState- %{CorruptionActionState}
Event ID 100
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
EventID
Data/EventID
additional.fields.key
additional.fields.value_string
PubID
Data/PubID
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_ENABLE
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
InstanceId
Data/InstanceId
target.resource.product_object_id
UserContext
target.user.user_display_name
Provider: Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Context
additional.fields.key
additional.fields.value_string
Param1
additional.fields.key
additional.fields.value_string
Param2
additional.fields.key
additional.fields.value_string
Param3
additional.fields.key
additional.fields.value_string
Param4
additional.fields.key
additional.fields.value_string
Event ID 101
Provider: Application Management Group Policy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.description" set to "ErrorCode - %{error_code}"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
requestId
additional.fields.key
additional.fields.value_string
responseXml
additional.fields.key
additional.fields.value_string
Event ID 102
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Message
Extract PID and map it to UDM field target.process.pid
Category
Data/Category
security_result.category_details
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ProcessID
Data/ProcessID
principal.process.pid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
EventID
Data/EventID
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.description
TaskName
Data/TaskName
target.resource.name
InstanceId
Data/InstanceId
target.resource.product_object_id
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
xferId
additional.fields.key
additional.fields.value_string
count
additional.fields.key
additional.fields.value_string
ranges.offset
additional.fields.key
additional.fields.value_string
ranges.length
additional.fields.key
additional.fields.value_string
Event ID 103
Provider: Application Management Group Policy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.description" set to "ErrorCode - %{error_code}"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Message
System/Message
Extract PID and map it to UDM field target.process.pid
Category
Data/Category
security_result.category_details
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Reason
Data/Reason
security_result.description
SessionName
Data/SessionName
additional.fields.key
additional.fields.value_string
Provider: ocz10xx
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data
target.hostname
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 104
Windows 10 client / Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_WIPE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
Message
metadata.description
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
LogFileCleared.SubjectUserName
LogFileCleared /SubjectUserName
about.user.userid
LogFileCleared.SubjectDomainName
LogFileCleared /SubjectDomainName
about.administrative_domain
LogFileCleared.Channel
LogFileCleared /Channel
additional.fields.key
additional.fields.value_string
LogFileCleared.BackupPath
LogFileCleared /BackupPath
about.file.full_path
Windows Server 2019 /
NXLog field
Event Viewer field
UDM field
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
LogFileCleared.SubjectUserName
Data/LogFileCleared /SubjectUserName
about.user.userid
LogFileCleared.SubjectDomainName
Data/LogFileCleared /SubjectDomainName
about.administrative_domain
LogFileCleared.Channel
Data/LogFileCleared /Channel
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Forwarding
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
UserID
System/UserID
principal.user.windows_sid
SubscriptionManagerAddress
Data/SubscriptionManagerAddress
target.url
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
ErrorMessage
Data/ErrorMessage
security_result.description
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
bcdCCID
target.asset.attribute.labels.key
target.asset.attribute.labels.value
bMaxSlotIndex
target.asset.attribute.labels.key
target.asset.attribute.labels.value
bVoltageSupport
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwProtocols
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwDefaultClock
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwMaximumClock
target.asset.attribute.labels.key
target.asset.attribute.labels.value
bNumClockSupported
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwDataRate
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwMaxDataRate
target.asset.attribute.labels.key
target.asset.attribute.labels.value
bNumDataRateSupported
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwMaxIFSD
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwSyncProtocols
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwMechanical
target.asset.attribute.labels.key
target.asset.attribute.labels.value
dwFeatures
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Event ID 105
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Channel
Data/Channel
security_result.description
BackupPath
Data/BackupPath
target.file.full_path
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
AcOnline
target.asset.attribute.labels.key
target.asset.attribute.labels.value
RemainingCapacity
target.asset.attribute.labels.key
target.asset.attribute.labels.value
FullChargeCapacity
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Provider: VMTools
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
SourceName
Not available
target.application
Provider: WudfUsbccidDriver
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
dwMaxCCIDMessageLength
additional.fields.key
additional.fields.value_string
bClassGetResponse
additional.fields.key
additional.fields.value_string
bClassGetEnvelope
additional.fields.key
additional.fields.value_string
wLcdLayout
additional.fields.key
additional.fields.value_string
bPINSupport
additional.fields.key
additional.fields.value_string
bMaxCCIDBusySlots
additional.fields.key
additional.fields.value_string
Event ID 106
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Channel
Data/Channel
additional.fields.key
additional.fields.value_string
Event ID 107
version 0 Windows 10 client / Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
TargetState
Data/TargetState
additional.fields.key
additional.fields.value_string
EffectiveState
Data/EffectiveState
additional.fields.key
additional.fields.value_string
WakeFromState
Data/WakeFromState
additional.fields.key
additional.fields.value_string
version 1 Windows 10 client / Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
ProgrammedWakeTimeAc
Data/ProgrammedWakeTimeAc
additional.fields.key
additional.fields.value_string
ProgrammedWakeTimeDc
Data/ProgrammedWakeTimeDc
additional.fields.key
additional.fields.value_string
WakeRequesterTypeAc
Data/WakeRequesterTypeAc
additional.fields.key
additional.fields.value_string
WakeRequesterTypeDc
Data/WakeRequesterTypeDc
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
ProviderName
Data/ProviderName
additional.fields.key
additional.fields.value_string
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_ENABLE
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
InstanceId
Data/InstanceId
target.resource.product_object_id
Event ID 108
Provider: Application Management Group Policy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.description" set to "ErrorCode - %{error_code}"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ShutdownTime
Data/ShutdownTime
additional.fields.key
additional.fields.value_string
ActualMaxInterval
Data/ActualMaxInterval
additional.fields.key
additional.fields.value_string
DiskPmDisabledMaxInterval
Data/DiskPmDisabledMaxInterval
additional.fields.key
additional.fields.value_string
DiskPmEnabledFlag
Data/DiskPmEnabledFlag
additional.fields.key
additional.fields.value_string
DiskPmEnabledMaxInterval
Data/DiskPmEnabledMaxInterval
additional.fields.key
additional.fields.value_string
TimestampForced
Data/TimestampForced
additional.fields.key
additional.fields.value_string
DiskPmPolicy
Data/DiskPmPolicy
additional.fields.key
additional.fields.value_string
BiasValid
Data/BiasValid
additional.fields.key
additional.fields.value_string
StartBias
Data/StartBias
additional.fields.key
additional.fields.value_string
Provider: VMTools
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
Not available
target.application
Event ID 109
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ProcessID
Data/ProcessID
principal.process.pid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
EventID
Data/EventID
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
EventName
Data/EventName
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
ShutdownReason
Data/ShutdownReason
security_result.description
ShutdownActionType
Data/ShutdownActionType
security_result.detection_fields.key
security_result.detection_fields.value
ShutdownEventCode
Data/ShutdownEventCode
security_result.summary
Format:
ShutdownEventCode- %{ShutdownEventCode}
Event ID 110
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
Event ID 111
version 0/ Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
EventMetaDataCount
Data/EventMetaDataCount
additional.fields.key
additional.fields.value_string
version 0/ Provider: Microsoft-Windows-AppReadiness
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Result
Data/Result
security_result.summary
Event ID 112
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
ErrorCode
Data/ErrorCode
additional.fields.key
additional.fields.value_string
Event ID 115
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Event ID 129
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_ENABLE
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
Priority
Data/Priority
security_result.priority_details
Path
Data/Path
target.process.file.full_path
ProcessID
Data/ProcessID
target.process.pid
TaskName
Data/TaskName
target.resource.name
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorMessage
Data/ErrorMessage
security_result.description
AccountType
System/AccountType
principal.user.attribute.roles.name
RetryMinutes
Data/RetryMinutes
additional.fields.key
additional.fields.value_string
Event ID 130
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorMessage
Data/ErrorMessage
security_result.description
DomainPeer
Data/DomainPeer
target.administrative_domain
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
RetryMinutes
Data/RetryMinutes
additional.fields.key
additional.fields.value_string
Event ID 131
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorMessage
Data/ErrorMessage
security_result.description
DomainPeer
Data/DomainPeer
target.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
RetryMinutes
Data/RetryMinutes
additional.fields.key
additional.fields.value_string
Event ID 132
Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
principal.administrative_domain
AccountName
principal.user.userid
AccountType
principal.user.attribute.roles.name
operationName
additional.fields.key
additional.fields.value_string
Event ID 134
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorMessage
Data/ErrorMessage
security_result.description
DomainPeer
Data/DomainPeer
target.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
RetryMinutes
Data/RetryMinutes
additional.fields.key
additional.fields.value_string
Event ID 137
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 138
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DomainPeer
Data/DomainPeer
target.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 139
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 140
Provider: Microsoft-Windows-Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
DeviceName
principal.hostname
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
VolumeId
additional.fields.key
additional.fields.value_string
Error
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_MODIFICATION
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
UserName
Data/UserName
target.user..user_display_name
Event ID 142
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Message set to security_result.summary
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
errorCode
security_result.summary
Domain
principal.administrative_domain
AccountName
principal.user.userid
AccountType
principal.user.attribute.roles.name
AccountName
additional.fields.key
additional.fields.value_string
Event ID 143
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 145
Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
resourceUrl
target.url
AccountName
principal.user.userid
AccountType
principal.user.attribute.roles.name
Domain
principal.administrative_domain
operationName
additional.fields.key
additional.fields.value_string
Event ID 146
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Message set to security_result.summary
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ChainingCountRequests
additional.fields.key
additional.fields.value_string
ChainLoggingRate
additional.fields.key
additional.fields.value_string
ChainingCountSuccess
additional.fields.key
additional.fields.value_string
ChainingCountFailure
additional.fields.key
additional.fields.value_string
Event ID 150
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 153
Provider: Disk
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Status
Data/Status
additional.fields.key
additional.fields.value_string
EnableDisableReason
Data/EnableDisableReason
security_result.detection_fields.key
security_result.detection_fields.value
VsmPolicy
Data/VsmPolicy
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 156
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
NotAffectedRdclNo
Data/NotAffectedRdclNo
additional.fields.key
additional.fields.value_string
NotAffectedAtom
Data/NotAffectedAtom
additional.fields.key
additional.fields.value_string
CacheFlushSupported
Data/CacheFlushSupported
additional.fields.key
additional.fields.value_string
SmtEnabled
Data/SmtEnabled
additional.fields.key
additional.fields.value_string
ParentHypervisorFlushes
Data/ParentHypervisorFlushes
additional.fields.key
additional.fields.value_string
DisabledLoadOption
Data/DisabledLoadOption
additional.fields.key
additional.fields.value_string
Enabled
Data/Enabled
additional.fields.key
additional.fields.value_string
CacheFlushNeeded
Data/CacheFlushNeeded
additional.fields.key
additional.fields.value_string
Event ID 157
Provider: disk
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 158
Provider: Disk
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
target_url set to target.url
Provider: Microsoft-Windows-Time-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
TimeProvider
target.resource.name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Culture
additional.fields.key
additional.fields.value_string
Level
security_result.detection_fields.key
security_result.detection_fields.value
Provider
additional.fields.key
additional.fields.value_string
Event ID 159
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 160
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 161
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Event ID 163
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Processor
Data/Processor
additional.fields.key
additional.fields.value_string
Event ID 164
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Processor
Data/Processor
additional.fields.key
additional.fields.value_string
Event ID 165
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
NotAffectedMdsNo
Data/NotAffectedMdsNo
additional.fields.key
additional.fields.value_string
NotAffectedAtom
Data/NotAffectedAtom
additional.fields.key
additional.fields.value_string
MdClearSupported
Data/MdClearSupported
additional.fields.key
additional.fields.value_string
BufferFlushNeeded
Data/BufferFlushNeeded
additional.fields.key
additional.fields.value_string
Event ID 167
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 169
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Status
Data/Status
security_result.summary
version 1 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Status
Data/Status
additional.fields.key
additional.fields.value_string
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 170
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 171
version 0 / Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Version
Data/Version/
principal.asset.software.version
Event ID 172
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Reason
Data/Reason
security_result.description
AccountType
principal.user.attribute.roles.name
State
Data/State
security_result.detection_fields.key
security_result.detection_fields.value
State
Data/State
additional.fields.key
additional.fields.value_string
version 0 / Provider: Microsoft-Windows-Kernel-Processor-Power
NXLog field
Event Viewer field
UDM field
RegisterId
Data/RegisterId
additional.fields.key
additional.fields.value_string
ParameterId
Data/ParameterId
additional.fields.key
additional.fields.value_string
BitWidth
Data/BitWidth
additional.fields.key
additional.fields.value_string
BitOffset
Data/BitOffset
additional.fields.key
additional.fields.value_string
Type
Data/Type
additional.fields.key
additional.fields.value_string
NameLength
Data/NameLength
additional.fields.key
additional.fields.value_string
Name
Data/Name
additional.fields.key
additional.fields.value_string
Event ID 173
Provider: Microsoft-Windows-Hyper-V-Hypervisor
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Event ID 181
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = status_update
Status
Data/Status
security_result.summary
Event ID 182
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 183
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 185
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Status
Data/Status
security_result.summary
Event ID 187
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ApiCallerName
principal.process.file.full_path
ApiCallerNameLength
additional.fields.key
additional.fields.value_string
SystemAction
about.resource.attribute.labels.key
about.resource.attribute.labels.value
LightestSystemState
about.resource.attribute.labels.key
about.resource.attribute.labels.value
Event ID 195
Provider: Microsoft-Windows-USB-USBHUB3
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fid_UsbDevice
target.resource.name
fid_DripsWatchdogResult
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fid_idVendor
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fid_idProduct
target.resource.product_object_id
fid_bcdDevice
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 196
Provider: Microsoft-Windows-USB-USBHUB3
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
fid_UsbDevice
target.resource.name
fid_DripsWatchdogResult
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fid_idVendor
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fid_idProduct
target.resource.product_object_id
fid_bcdDevice
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 200
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ChannelName
Data/ChannelName
additional.fields.key
additional.fields.value_string
ChannelType
Data/ChannelType
additional.fields.key
additional.fields.value_string
Enabled
Data/Enabled
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_ENABLE
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
TaskInstanceId
Data/TaskInstanceId
target.resource.product_object_id
ActionName
Data/ActionName
security_result.action_details
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
url
target.url
hr
security_result.summary
Format:
hr - %{hr}
proxy
additional.fields.key
additional.fields.value_string
job
target.resource.name
owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
jobId
target.resource.product_object_id
xferId
additional.fields.key
additional.fields.value_string
proxyServerList
additional.fields.key
additional.fields.value_string
Event ID 201
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ChannelName
Data/ChannelName
additional.fields.key
additional.fields.value_string
Query
Data/Query
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
TaskInstanceId
Data/TaskInstanceId
target.resource.product_object_id
ActionName
Data/ActionName
security_result.action_details
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
job
target.resource.name
jobId
target.resource.product_object_id
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
url
target.url
transferId
additional.fields.key
additional.fields.value_string
proxyServerList
additional.fields.key
additional.fields.value_string
proxyBypassList
additional.fields.key
additional.fields.value_string
error
security_result.summary
Format:
error- %{error}
Event ID 202
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ChannelName
Data/ChannelName
additional.fields.key
additional.fields.value_string
Query
Data/Query
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
jobId
target.resource.product_object_id
url
target.url
xferId
additional.fields.key
additional.fields.value_string
proxy
additional.fields.key
additional.fields.value_string
hr
security_result.summary
Format:
hr - %{hr}
fileLength
target.url_metadata.last_http_response_content_length
HTTPVersion
additional.fields.key
additional.fields.value_string
URLRange
additional.fields.key
additional.fields.value_string
Event ID 203
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ModuleNameLen
Data/ModuleNameLen
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ModuleName
Data/ModuleName
target.resource.name
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
string
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
string2
target.resource.name
string3
target.url
version 1 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
server
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
job
target.resource.name
url
target.url
scheme
additional.fields.key
additional.fields.value_string
user
target.user.userid
Event ID 204
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ModuleNameLen
Data/ModuleNameLen
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ModuleName
Data/ModuleName
target.resource.name
Provider: Microsoft-Windows-Security-Kerberos
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = FAIL
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
string
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
string2
target.resource.name
string3
target.url
version 1 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
server
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
job
target.resource.name
url
target.url
scheme
additional.fields.key
additional.fields.value_string
user
target.user.userid
Event ID 205
version 0 Windows Server 2019 / Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ModuleNameLen
Data/ModuleNameLen
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ModuleName
Data/ModuleName
target.resource.name
version 1 / Windows 10 client /
NXLog field
Event Viewer field
UDM field
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DomainName
Data/DomainName
target.administrative_domain
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields.key
security_result.detection_fields.value
TdoDirection
Data/TdoDirection
security_result.detection_fields.key
security_result.detection_fields.value
TdoAttributes
Data/TdoAttributes
security_result.detection_fields.key
security_result.detection_fields.value
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields.key
security_result.detection_fields.value
version 2 / Windows 10 client /
NXLog field
Event Viewer field
UDM field
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DomainName
Data/DomainName
target.administrative_domain
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields.key
security_result.detection_fields.value
TdoDirection
Data/TdoDirection
security_result.detection_fields.key
security_result.detection_fields.value
TdoAttributes
Data/TdoAttributes
security_result.detection_fields.key
security_result.detection_fields.value
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields.key
security_result.detection_fields.value
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
profileType
target.user.attribute.labels.key
target.user.attribute.labels.value
currSlotStartTime
additional.fields.key
additional.fields.value_string
currSlotBandwidthLimit
additional.fields.key
additional.fields.value_string
nextSlotStartTime
additional.fields.key
additional.fields.value_string
nextSlotBandwidthLimit
additional.fields.key
additional.fields.value_string
Event ID 216
version 1 / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
version 1 / Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
NXLog field
Event Viewer field
UDM field
updateTitle
Data/updateTitle
target.resource.name
updateGuid
Data/updateGuid
target.resource.product_object_id
updateRevisionNumber
Data/updateRevisionNumber
target.resource.attribute.labels.key
target.resource.attribute.labels.value
serviceGuid
Data/serviceGuid
additional.fields.key
additional.fields.value_string
Event ID 219
Provider: Microsoft-Windows-Kernel-PnP
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DriverName
target.hostname
FailureName
target.resource.name
DriverNameLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Status
additional.fields.key
additional.fields.value_string
FailureNameLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 218
version 0 / Provider: Microsoft-Windows-WindowsUpdateClient
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
updateTitle
Data/updateTitle
target.resource.name
updateGuid
Data/updateGuid
target.resource.product_object_id
updateRevisionNumber
Data/updateRevisionNumber
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 221
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 225
Provider: Microsoft-Windows-Kernel-PnP
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DeviceInstance
target.hostname
ProcessName
target.process.file.full_path
ProcessNameLength
additional.fields.key
additional.fields.value_string
DeviceInstanceLength
additional.fields.key
additional.fields.value_string
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 228
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 229
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 230
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 233
Provider: Microsoft-Windows-Hyper-V-VmSwitch
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
NicNameLen
additional.fields.key
additional.fields.value_string
NicName
additional.fields.key
additional.fields.value_string
NicFNameLen
additional.fields.key
additional.fields.value_string
NicFName
additional.fields.key
additional.fields.value_string
Operation
additional.fields.key
additional.fields.value_string
Event ID 231
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Code
Data/Code
security_result.summary set to "Code - %{Code}"
KeyType
Data/KeyType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 234
Provider: Microsoft-Windows-Hyper-V-VmSwitch
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
NicNameLen
additional.fields.key
additional.fields.value_string
NicName
additional.fields.key
additional.fields.value_string
PortNameLen
additional.fields.key
additional.fields.value_string
Event ID 238
Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
System/Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
EfiTimeZoneBias
Data/EfiTimeZoneBias
additional.fields.key
additional.fields.value_string
EfiDaylightFlags
Data/EfiDaylightFlags
additional.fields.key
additional.fields.value_string
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
version 1 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
EfiTimeZoneBias
Data/EfiTimeZoneBias
additional.fields.key
additional.fields.value_string
EfiDaylightFlags
Data/EfiDaylightFlags
additional.fields.key
additional.fields.value_string
EfiTime
Data/EfiTime
additional.fields.key
additional.fields.value_string
EfiTimeZoneBias
Data/EfiTimeZoneBias
additional.fields.key
additional.fields.value_string
EfiDaylightFlags
Data/EfiDaylightFlags
additional.fields.key
additional.fields.value_string
EfiTime
Data/EfiTime
additional.fields.key
additional.fields.value_string
Event ID 241
version 0 / Provider: Microsoft-Windows-Kernel-Boot
NXLog field
Event Viewer field
UDM field
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 258
Provider: VMUpgradeHelper
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
SourceName
Not available
target.application
Event ID 260
Provider: VMUpgradeHelper
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
SourceName
Not available
target.application
Event ID 263
version 0 / Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
Event ID 271
Provider: VMUpgradeHelper
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
SourceName
Not available
target.application
Event ID 272
Provider: VMUpgradeHelper
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
SourceName
Not available
target.application
Event ID 299
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 300
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it to target.process.pid
Category
Data/Category
security_result.category_details
Event ID 301
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it to target.process.pid
Category
Data/Category
security_result.category_details
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 302
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it to target.process.pid
Category
Data/Category
security_result.category_details
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 304
version 0 / Provider: Microsoft-Windows-Ntfs
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Status
Data/Status
security_result.summary
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 313
version 0 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorCode
Data/ErrorCode
security_result.summary is set to "ErrorCode: %{ErrorCode}"
Event ID 325
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it target.process.pid
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
QueuedTaskInstanceId
target.resource.product_object_id
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Category
Data/Category
security_result.category_details
Event ID 326
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it to target.process.pid
Category
Data/Category
security_result.category_details
Event ID 400
Provider: PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data_2
Extract HostName from Data_2
HostName is set to target.hostname
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
version 1 /Provider: PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
NewEngineState
additional.fields.key
additional.fields.value.string_value
PreviousEngineState
additional.fields.key
additional.fields.value.string_value
HostName
additional.fields.key
additional.fields.value.string_value
HostVersion
additional.fields.key
additional.fields.value.string_value
HostId
additional.fields.key
additional.fields.value.string_value
HostApplication
principal.process.command_line
EngineVersion
additional.fields.key
additional.fields.value.string_value
RunspaceId
additional.fields.key
additional.fields.value.string_value
PipelineId
additional.fields.key
additional.fields.value.string_value
CommandName
additional.fields.key
additional.fields.value.string_value
CommandType
additional.fields.key
additional.fields.value.string_value
ScriptName
target.file.name
CommandPath
target.process.file.full_path
NewEngineState
target.process.command_line
Event ID 403
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Data_9
network.http.user_agent
Domain
System/Domain
principal.administrative_domain
Data_8
principal.ip
Data_7
principal.port
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Data_3
target.ip
Data_5
target.url
Data
target.resource.product_object_id
Data_1
additional.fields.key
additional.fields.value_string
Data_2
metadata.event_timestamp
Data_4
target.network.http.method
Data_6
additional.fields.key
additional.fields.value_string
Data_10
additional.fields.key
additional.fields.value_string
Data_11
additional.fields.key
additional.fields.value_string
Data_12
additional.fields.key
additional.fields.value_string
Data_13
additional.fields.key
additional.fields.value_string
Data_14
additional.fields.key
additional.fields.value_string
Data_15
additional.fields.key
additional.fields.value_string
Event ID 404
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Data_3
security_description set to %{Data_3}: %{Data_4}
Data_4
security_description set to %{Data_3}: %{Data_4}
Data
target.resource.product_object_id
Data_1
additional.fields.key
additional.fields.value_string
Data_2
metadata.event_timestamp
Event ID 405
Provider: ADSync
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
principal.administrative_domain
Data_1
principal.user.userid
Event ID 410
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Data_4
network.http.user_agent
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Data_10
target.ip
Data_8
target.url
Data
additional.fields.key
additional.fields.value_string
Data_2
additional.fields.key
additional.fields.value_string
Data_6
additional.fields.key
additional.fields.value_string
Data_12
additional.fields.key
additional.fields.value_string
Data_14
additional.fields.key
additional.fields.value_string
Event ID 412
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 424
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
client_certificate_serial set to network.tls.client.certificate.serial
client_certificate_subject set to network.tls.client.certificate.subject
security_result.action = FAIL
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 500
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 501
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 506
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.description
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
LidOpenState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ExternalMonitorConnectedState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryRemainingCapacityOnEnter
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryFullChargeCapacityOnEnter
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceIdV2
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BootId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Event ID 507
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
reason_description set to security_result.description
Domain
System/Domain
principal.administrative_domain
Reason
security_result.description
AccountName
System/AccountName
principal.user.userid
EnergyDrain
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ActiveResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonDripsTimeActivatedInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
FirstDripsEntryInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DripsResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DripsTransitions
target.asset.attribute.labels.key
target.asset.attribute.labels.value
FullChargeCapacityRatio
target.asset.attribute.labels.key
target.asset.attribute.labels.value
AudioPlaying
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Reason
security_result.detection_fields.key
security_result.detection_fields.value
AudioPlaybackInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonActivatedCpuInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PowerStateAc
target.asset.attribute.labels.key
target.asset.attribute.labels.value
HwDripsResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ExitLatencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DisconnectedStandby
target.asset.attribute.labels.key
target.asset.attribute.labels.value
AoAcCompliantNic
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonAttributedCpuInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ModernSleepEnabledActionsBitmask
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ModernSleepAppliedActionsBitmask
target.asset.attribute.labels.key
target.asset.attribute.labels.value
LidOpenState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ExternalMonitorConnectedState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
IsCsSessionInProgressOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryRemainingCapacityOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryFullChargeCapacityOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceIdV2
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BootId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
InputSuppressionActionCount
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonResiliencyTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ResiliencyDripsTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ResiliencyHwDripsTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
GdiOnTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DwmSyncFlushTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
MonitorPowerOnTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEntered
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffDurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepDurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffFullEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffFullEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepFullEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepFullEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
version 10 / Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Reason
Data/Reason
security_result.description
EnergyDrain
Data/EnergyDrain
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ActiveResidencyInUs
Data/ActiveResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonDripsTimeActivatedInUs
Data/NonDripsTimeActivatedInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
FirstDripsEntryInUs
Data/FirstDripsEntryInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DripsResidencyInUs
Data/DripsResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DurationInUs
Data/DurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DripsTransitions
Data/DripsTransitions
target.asset.attribute.labels.key
target.asset.attribute.labels.value
FullChargeCapacityRatio
Data/FullChargeCapacityRatio
target.asset.attribute.labels.key
target.asset.attribute.labels.value
AudioPlaying
Data/AudioPlaying
target.asset.attribute.labels.key
target.asset.attribute.labels.value
AudioPlaybackInUs
Data/AudioPlaybackInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonActivatedCpuInUs
Data/NonActivatedCpuInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PowerStateAc
Data/PowerStateAc
target.asset.attribute.labels.key
target.asset.attribute.labels.value
HwDripsResidencyInUs
Data/HwDripsResidencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ExitLatencyInUs
Data/ExitLatencyInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DisconnectedStandby
Data/DisconnectedStandby
target.asset.attribute.labels.key
target.asset.attribute.labels.value
AoAcCompliantNic
Data/AoAcCompliantNic
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonAttributedCpuInUs
Data/NonAttributedCpuInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ModernSleepEnabledActionsBitmask
Data/ModernSleepEnabledActionsBitmask
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ModernSleepAppliedActionsBitmask
Data/ModernSleepAppliedActionsBitmask
target.asset.attribute.labels.key
target.asset.attribute.labels.value
LidOpenState
Data/LidOpenState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ExternalMonitorConnectedState
Data/ExternalMonitorConnectedState
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceId
Data/ScenarioInstanceId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
IsCsSessionInProgressOnExit
Data/IsCsSessionInProgressOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryRemainingCapacityOnExit
Data/BatteryRemainingCapacityOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BatteryFullChargeCapacityOnExit
Data/BatteryFullChargeCapacityOnExit
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScenarioInstanceIdV2
Data/ScenarioInstanceIdV2
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BootId
Data/BootId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
InputSuppressionActionCount
Data/InputSuppressionActionCount
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NonResiliencyTimeInUs
Data/NonResiliencyTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ResiliencyDripsTimeInUs
Data/ResiliencyDripsTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ResiliencyHwDripsTimeInUs
Data/ResiliencyHwDripsTimeInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
GdiOnTime
Data/GdiOnTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
DwmSyncFlushTime
Data/DwmSyncFlushTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
MonitorPowerOnTime
Data/MonitorPowerOnTime
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEntered
Data/SleepEntered
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffEnergyCapacityAtStart
Data/ScreenOffEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffEnergyCapacityAtEnd
Data/ScreenOffEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffDurationInUs
Data/ScreenOffDurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEnergyCapacityAtStart
Data/SleepEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepEnergyCapacityAtEnd
Data/SleepEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepDurationInUs
Data/SleepDurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffFullEnergyCapacityAtStart
Data/ScreenOffFullEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
ScreenOffFullEnergyCapacityAtEnd
Data/ScreenOffFullEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepFullEnergyCapacityAtStart
Data/SleepFullEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
SleepFullEnergyCapacityAtEnd
Data/SleepFullEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PowerSchemeInfo
Data/PowerSchemeInfo
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Event ID 508
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID and map it to target.process.pid
Category
Data/Category
security_result.category_details
Event ID 510
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
Data_1
Data_1.Host set to target.hostname
Data_1.User-Agent set to network.http.user_agent
Data_1.X-MS-Endpoint-Absolute-Path set to target.url
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Data
target.resource.product_object_id
Data_2
additional.fields.key
additional.fields.value_string
Data_3
additional.fields.key
additional.fields.value_string
Data_4
additional.fields.key
additional.fields.value_string
Data_5
additional.fields.key
additional.fields.value_string
Data_6
additional.fields.key
additional.fields.value_string
Data_7
additional.fields.key
additional.fields.value_string
Data_8
additional.fields.key
additional.fields.value_string
Data_9
additional.fields.key
additional.fields.value_string
Data_10
additional.fields.key
additional.fields.value_string
Data_11
additional.fields.key
additional.fields.value_string
Data_12
additional.fields.key
additional.fields.value_string
Data_13
additional.fields.key
additional.fields.value_string
Data_14
additional.fields.key
additional.fields.value_string
Data_15
additional.fields.key
additional.fields.value_string
Data_16
additional.fields.key
additional.fields.value_string
Data_17
additional.fields.key
additional.fields.value_string
Data_18
additional.fields.key
additional.fields.value_string
Data_19
additional.fields.key
additional.fields.value_string
Data_20
additional.fields.key
additional.fields.value_string
Event ID 517
Provider: Microsoft-Windows-DFSN-Server
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
UserID
principal.user.windows_sid
DfsNamespace
target.resource.name
SyncFromPDC
additional.fields.key
additional.fields.value_string
Status
security_result.summary
Format:
Status: %{Status}
TimeConsumedInMilliSeconds
additional.fields.key
additional.fields.value_string
Event ID 521
Provider: Security
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = FAIL
Data
security_result.detection_fields.key
security_result.detection_fields.value
Data_1
security_result.detection_fields.key
security_result.detection_fields.value
Data_2
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 529
Provider: Security
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = BLOCK
security_result.category = AUTH_VIOLATION
LogonType
Not available
extensions.auth.mechanism
Message
Not available
username set to target.user.userid
domain set to target.administrative_domain
target_workstation set to target.hostname
Event ID 566
Provider: Microsoft-Windows-Kernel-Power
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Reason
Data/Reason
security_result.description
BootId
Data/BootId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousSessionId
Data/PreviousSessionId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousSessionType
Data/PreviousSessionType
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousSessionDurationInUs
Data/PreviousSessionDurationInUs
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousEnergyCapacityAtStart
Data/PreviousEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousFullEnergyCapacityAtStart
Data/PreviousFullEnergyCapacityAtStart
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousEnergyCapacityAtEnd
Data/PreviousEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PreviousFullEnergyCapacityAtEnd
Data/PreviousFullEnergyCapacityAtEnd
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NextSessionId
Data/NextSessionId
target.asset.attribute.labels.key
target.asset.attribute.labels.value
NextSessionType
Data/NextSessionType
target.asset.attribute.labels.key
target.asset.attribute.labels.value
PowerStateAc
Data/PowerStateAc
target.asset.attribute.labels.key
target.asset.attribute.labels.value
MonitorReason
Data/MonitorReason
target.asset.attribute.labels.key
target.asset.attribute.labels.value
Event ID 600
Provider: PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Category
metadata.description
SourceName
principal.application
HostApplication
target.file.full_path
ProviderName
target.resource.name
Event ID 601
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
metadata.description = Attempt to install a service
SubjectUserName
principal.user.userid
Summary
security_result.summary
ServiceName
target.process.command_line
ServiceFileName
target.process.file.full_path
Event ID 642
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Extract PID map it to target.process.pid
Category
Data/Category
security_result.category_details
Event ID 653
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Event ID 654
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Event ID 663
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Event ID 700
Provider: NTDS ISAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
MessageSourceAddress
principal.ip
Event ID 701
Provider: NTDS ISAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
MessageSourceAddress
principal.ip
Event ID 719
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
Category
Data/Category
security_result.category_details
Event ID 781
Provider: Microsoft-Windows-Complus
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
target.registry.registry_key
Event ID 800
Provider: PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
metadata.description set to "Pipeline execution"
security_result.summary set to "Pipeline execution details for command line"
SourceName
principal.application
UserId
principal.user.userid
HostApplication
principal.process.command_line
DetailSequence
additional.fields.key
additional.fields.value.string_value
DetailTotal
additional.fields.key
additional.fields.value.string_value
SequenceNumber
additional.fields.key
additional.fields.value.string_value
HostName
additional.fields.key
additional.fields.value.string_value
HostVersion
additional.fields.key
additional.fields.value.string_value
HostId
additional.fields.key
additional.fields.value.string_value
EngineVersion
additional.fields.key
additional.fields.value.string_value
RunspaceId
additional.fields.key
additional.fields.value.string_value
PipelineId
additional.fields.key
additional.fields.value.string_value
ScriptName
target.file.full_path
CommandLine
target.process.command_line
Details
additional.fields.key
additional.fields.value.string_value
Event ID 888
Provider: top_5
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 900
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = SERVICE_START
target.application = "Software Protection"
Event ID 902
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = SERVICE_START
target.application = "Software Protection"
Event ID 903
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = SERVICE_STOP
target.application = "Software Protection"
Event ID 904
Provider: Directory Synchronization
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.summary
Event ID 1000
Provider: Microsoft-Windows-SCPNP
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ReaderName
Data/ReaderName
target.resource.name
ErrorCode
Data/ErrorCode
security_result.summary is set to "ErrorCode: %{ErrorCode}"
Provider: Microsoft-Windows-LoadPerf
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AccountName
principal.user.attribute.roles.name
AccountType
principal.user.attribute.roles.description
UserID
principal.user.windows_sid
Provider: Application Error
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
Extracted FaultingApplicationPath and FaultingModulePath fields from the Message log field and mapped it to
additional.fields.key
additional.fields.value.string_value
FaultingModulePath
additional.fields.key
additional.fields.value_string
FaultingApplicationPath
additional.fields.key
additional.fields.value_string
Event ID 1001
Provider: Microsoft Antimalware
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
target_resource_product_object_id set to target.resource.product_object_id
Provider: Microsoft-Windows-WER-SystemErrorReporting
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
param2
target.file.full_path
param1
additional.fields.key
additional.fields.value_string
param3
additional.fields.key
additional.fields.value_string
Provider: SNMP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Provider: Windows Error Reporting
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-LoadPerf
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AccountName
principal.user.attribute.roles.name
AccountType
principal.user.attribute.roles.description
UserID
principal.user.windows_sid
Event ID 1003
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1004
Provider: IPMIDRV
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data
target.hostname
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
Reason
Data/Reason
security_result.description
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Provider: SNMP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: TdIca
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_ip set to target.ip
target_port set to target_port
EventData
additional.fields.key
additional.fields.value_string
Event ID 1005
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Event ID 1007
Provider: TdIca
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_ip set to target.ip
target_port set to target_port
Event ID 1008
Provider: Microsoft-Windows-Perflib
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
EventXML.param1
target.application
EventXML.param2
target.file.full_path
EventXML.binaryDataSize
additional.fields.key
additional.fields.value_string
EventXML.binaryData
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Reason
Data/Reason
security_result.description
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Event ID 1010
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Event ID 1013
Provider: Microsoft-Windows-Search
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Category
Data/Category
target.application
ExtraInfo
Data/ExtraInfo
additional.fields.key
additional.fields.value_string
Event ID 1014
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_DNS
network.ip_protocol is set to "DNS"
QueryName
network.dns.questions.name
AddressLength
additional.fields.key
additional.fields.value_string
Address
additional.fields.key
additional.fields.value_string
Event ID 1016
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 1023
Provider: Microsoft-Windows-Perflib
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Library
Data/Library
target.file.full_path
Win32Error
Data/Win32Error
security_result.summary
Format:
Win32Error - %{Win32Error}
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 1025
Provider: Microsoft-Windows-TPM-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1026
Provider: Microsoft-Windows-TPM-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorCode
Data/ErrorCode
security_result.summary is set to "ErrorCode: %{ErrorCode}
Status Information
Data/Status Information
additional.fields.key
additional.fields.value_string
Event ID 1027
Provider: Microsoft-Windows-TPM-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1030
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
security_result.description
ErrorCode
security_result.summary
Format:
ErrorCode - %{ErrorCode}
DCName
target.administrative_domain
SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ProcessingMode
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-Kernel-PnP
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Device
Data/Device
target.hostname
Event ID 1031
Provider: Microsoft-Windows-Kernel-PnP
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Device
Data/Device
target.hostname
Event ID 1033
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Extract product_name and map to target.application
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 1034
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 1037
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1040
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Extract process_id and map it to target.process.pid
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 1042
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Extract process_id and map it to target.process.pid
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 1053
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 1054
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 1055
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{ErrorCode}
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
Event ID 1056
Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
server_certificate_subject set to network.tls.server.certificate.subject
security_result.action = ALLOW
Event ID 1057
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target.resource_resource_type = DATABASE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
EventData
additional.fields.key
additional.fields.value_string
Event ID 1058
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
DCName
Data/DCName
target.administrative_domain
FilePath
Data/FilePath
target.file.full_path
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
GPOCNName
Data/GPOCNName
additional.fields.key
additional.fields.value_string
Event ID 1064
Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.summary
security_result.action = FAIL
Event ID 1066
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 1067
Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Event ID 1068
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
DCName
EventData.DCName
target.administrative_domain
SupportInfo1
additional.fields.key
additional.fields.value.string_value
SupportInfo2
additional.fields.key
additional.fields.value.string_value
ProcessingMode
additional.fields.key
additional.fields.value.string_value
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value.string_value
Event ID 1069
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ResourceGroup
target.group.group_display_name
ResourceName
target.resource.name
ResTypeDll
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 1073
Provider: User32
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.hostname
param2
Data/param2
target.user.userid
Event ID 1074
Provider: User32
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
Provider: USER32
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
target_process_file_full_path set to target.process.file.full_path
target_hostname set to target.hostname
Provider: User32
NXLog field
Event Viewer field
UDM field
Domain
principal.administrative_domain
Provider: USER32
NXLog field
Event Viewer field
UDM field
Domain
System/Domain
principal.administrative_domain
Provider: User32
NXLog field
Event Viewer field
UDM field
param2
Data/param2
principal.hostname
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
param5
Data/param5
additional.fields.key
additional.fields.value.string_value
param1
Data/param1
principal.process.file.full_path
AccountName
principal.user.attribute.roles.name
AccountType
principal.user.attribute.roles.name
Provider: USER32
NXLog field
Event Viewer field
UDM field
AccountName
System/AccountName
principal.user.userid
Provider: User32
NXLog field
Event Viewer field
UDM field
UserID
principal.user.windows_sid
param3
Data/param3
security_result.description
param7
Data/param7
target.user.userid
Event ID 1076
Provider: User32
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
additional.fields.key
additional.fields.value_string
param2
additional.fields.key
additional.fields.value_string
param5
additional.fields.key
additional.fields.value_string
param6
additional.fields.key
additional.fields.value_string
Event ID 1085
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
DCName
Data/DCName
target.administrative_domain
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ExtensionName
Data/ExtensionName
target.resource.name
ExtensionId
Data/ExtensionId
target.resource.product_object_id
Event ID 1096
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErrorCode - %{ErrorCode}
ErrorDescription
security_result.description
SupportInfo1
additional.fields.key
additional.fields.value.string_value
SupportInfo2
additional.fields.key
additional.fields.value.string_value
ProcessingMode
additional.fields.key
additional.fields.value.string_value
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value.string_value
DCName
target.administrative_domain
FilePath
principal.process.file.full_path
GPOCNName
additional.fields.key
additional.fields.value_string
Event ID 1100
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "Event Logging Service"
Message
security_result.description
Event ID 1101
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1102
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_ip set to target.ip
target_url set to target.url
client_certificate_serial set to network.tls.client.certificate.serial
client_certificate_subject set to network.tls.client.certificate.subject
security_result.action = ALLOW
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: DFS Replication
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_WIPE
SubjectDomainName
principal.administrative_domain
SubjectUserName
principal.user.userid
SubjectUserSid
principal.user.windows_sid
SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 1103
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
PercentFull
Data/PercentFull
additional.fields.key
additional.fields.value_string
Event ID 1104
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 1105
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AutoBackup.BackupPath
Data/BackupPath
target.file.full_path
AutoBackup.Channel
Data/Channel
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 1106
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Reason
Data/Reason
security_result.description
Event ID 1107
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = "Event Logging Service"
ProcessID
Data/ProcessID
principal.process.pid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
Error Code: %{value}
EventID
Data/EventID
additional.fields.key
additional.fields.value_string
PublisherName
Data/PublisherName
additional.fields.key
additional.fields.value_string
PublisherGuid
Data/PublisherGuid
additional.fields.key
additional.fields.value_string
Event ID 1108
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
Data/EventProcessingFailure/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
EventID
Data/EventProcessingFailure/EventID
metadata.product_event_type
PubID
Data/EventProcessingFailure/PubID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 1112
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
security_result.description
ErrorCode
security_result.summary
Format:
ErrorCode - %{ErrorCode}
DCName
target.administrative_domain
ExtensionName
target.resource.name
ExtensionId
target.resource.product_object_id
SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ProcessingMode
additional.fields.key
additional.fields.value_string
Event ID 1126
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_1
security_result.summary set to "Error: %{Data_1} - %{Data_2}"
Data_2
security_result.summary set to "Error: %{Data_1} - %{Data_2}"
Data
additional.fields.key
additional.fields.value_string
Event ID 1127
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErrorCode - %{ErrorCode}
ErrorDescription
security_result.description
DCName
target.administrative_domain
SupportInfo1
additional.fields.key
additional.fields.value.string_value
SupportInfo2
additional.fields.key
additional.fields.value.string_value
ProcessingMode
additional.fields.key
additional.fields.value.string_value
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value.string_value
Event ID 1128
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ExtensionName
target.resource.name
ExtensionId
target.resource.product_object_id
SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
additional.fields.key
additional.fields.value_string
Event ID 1129
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorDescription
Data/ErrorDescription
security_result.description
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 1130
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
ErrorDescription
Data/ErrorDescription
security_result.description
GPOFileSystemPath
Data/GPOFileSystemPath
target.file.full_path
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ScriptType
Data/ScriptType
additional.fields.key
additional.fields.value_string
GPODisplayName
Data/GPODisplayName
additional.fields.key
additional.fields.value_string
GPOScriptCommandString
Data/GPOScriptCommandString
additional.fields.key
additional.fields.value_string
Event ID 1134
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1150
Provider: Microsoft Antimalware
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
platform_version set to principal.asset.platform_software.platform_version
Event ID 1162
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1173
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1196
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
StatusString
security_result.summary
ResourceName
target.resource.name
Event ID 1200
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
Message
metadata.description
UserID
target.user.windows_sid
Event ID 1201
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Message
metadata.description
UserID
target.user.windows_sid
Event ID 1202
Provider: SceCli
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message
security_result.summary
Format:
summary is set to 0x%{error_code} - %{error_message}
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
Message
metadata.description
"SERVICE"
extensions.auth.mechanism
"SSO"
extensions.auth.typ
UserID
target.user.windows_sid
Event ID 1203
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Message
metadata.description
"SERVICE"
extensions.auth.mechanism
"SSO"
extensions.auth.typ
UserID
target.user.windows_sid
Event ID 1204
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PASSWORD
security_result.action = ALLOW
Message
metadata.description
Event ID 1205
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ResourceGroup
target.group.group_display_name
ResTypeDll
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PASSWORD
security_result.action = FAIL
Message
metadata.description
Event ID 1206
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGOUT
security_result.action = ALLOW
Message
metadata.description
UserID
target.user.windows_sid
Event ID 1207
Provider: AD FS Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGOUT
security_result.action = FAIL
Message
metadata.description
UserID
target.user.windows_sid
Event ID 1213
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
additional.fields.key
additional.fields.value_string
Event ID 1216
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data_3
security_result.description
Data
security_result.summary
Format:
"Error Code - %{Data}"
Data_1
additional.fields.key
additional.fields.value_string
Data_2
principal.ip
Event ID 1226
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1254
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ResourceGroup
target.group.group_display_name
Event ID 1257
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
DNSZone
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ResourceGroup
target.group.group_display_name
Event ID 1282
Provider: Microsoft-Windows-TPM-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 1307
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1311
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1317
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Event ID 1500
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DCName
Data/DCName
target.administrative_domain
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
Event ID 1501
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
Event ID 1502
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DCName
Data/DCName
target.administrative_domain
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
NumberOfGroupPolicyObjects
Data/NumberOfGroupPolicyObjects
additional.fields.key
additional.fields.value_string
Event ID 1503
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DCName
Data/DCName
target.administrative_domain
SupportInfo1
Data/SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
Data/SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
Data/ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
Data/ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
NumberOfGroupPolicyObjects
Data/NumberOfGroupPolicyObjects
additional.fields.key
additional.fields.value_string
Event ID 1531
Provider: Microsoft-Windows-User Profiles Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Domain
Not available
principal.administrative_domain
AccountName
Not available
principal.user.userid
UserID
Not available
principal.user.windows_sid
SourceName
Not available
target.application
Event ID 1532
Provider: Microsoft-Windows-User Profiles Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Domain
Not available
principal.administrative_domain
AccountName
Not available
principal.user.userid
UserID
Not available
principal.user.windows_sid
SourceName
Not available
target.application
Event ID 1535
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data
security_result.description
Event ID 1564
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_READ
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ShareName
target.resource.name
ResourceName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
BinaryParameterLength
additional.fields.key
additional.fields.value_string
BinaryData
additional.fields.key
additional.fields.value_string
Event ID 1566
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1573
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
NodeName
target.asset.hostname
Event ID 1593
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_READ
target.resource_resource_type = DATABASE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DatabaseFilePath
target.file.full_path
BadDatabaseFilePath
additional.fields.key
additional.fields.value_string
Event ID 1643
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1644
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1645
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1653
Provider: Microsoft-Windows-FailoverClustering
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
NodeName
target.asset.hostname
Event ID 1699
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_4
security_result.summary set to "Error Code - %{Data_4}"
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Data_2
security_result.description
Data_3
additional.fields.key
additional.fields.value_string
Data_5
additional.fields.key
additional.fields.value_string
Event ID 1704
Provider: SceCli
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
ProcessId
principal.process.pid
Message
security_result.summary
Event ID 1865
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1925
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 1955
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
ERROR_EVT_UNRESOLVED
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 2000
Provider: Microsoft Antimalware
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
current_signature_version set to target.resource.attribute.labels.key/value
previous_signature_version set to target.resource.attribute.labels.key/value
Event ID 2001
Provider: Microsoft Antimalware
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data_14
security_result.summary
Data_17
target.url
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Data_2
additional.fields.key
additional.fields.value_string
Data_3
additional.fields.key
additional.fields.value_string
Data_4
additional.fields.key
additional.fields.value_string
Data_5
principal.administrative_domain
Data_6
principal.user.windows_sid
Data_7
additional.fields.key
additional.fields.value_string
Data_8
additional.fields.key
additional.fields.value_string
Data_9
additional.fields.key
additional.fields.value_string
Data_10
additional.fields.key
additional.fields.value_string
Data_11
security_result.detection_fields.key
security_result.detection_fields.value
Data_12
additional.fields.key
additional.fields.value_string
Data_13
additional.fields.key
additional.fields.value_string
Data_15
additional.fields.key
additional.fields.value_string
Data_16
additional.fields.key
additional.fields.value_string
Provider: NTDS ISAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
MessageSourceAddress
principal.ip
Event ID 2004
Provider: Microsoft-Windows-Resource-Exhaustion-Detector
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider : Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
LifetimeId
additional.fields.key
additional.fields.value_string
InstanceId
target.resource.product_object_id
Level
additional.fields.key
additional.fields.value_string
Service
target.application
DriverClsid
additional.fields.key
additional.fields.value_string
Event ID 2041
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Event ID 2042
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2053
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2065
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2085
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
MessageSourceAddress
principal.ip
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2089
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2108
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_3
security_result.summary set to "Error: %{Data_4} - %{Data_3}"
Data_4
security_result.summary set to "Error: %{Data_4} - %{Data_3}"
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Data_2
additional.fields.key
additional.fields.value_string
Data_5
security_result.detection_fields.key
security_result.detection_fields.value
Data_6
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 2811
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2887
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2889
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Message
principal_ip is set to principal.ip
principal_port is set to principal.port
principal_user_id is set to principal.user.userid
Event ID 2896
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_1
security_result.summary set to "Error: %{Data_1} - %{Data_2}"
Data_2
security_result.summary set to "Error: %{Data_1} - %{Data_2}"
Data
additional.fields.key
additional.fields.value_string
Event ID 2904
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2946
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 2947
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
Data_2
principal.ip
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_3
security_result.summary set to "Error: %{Data_3}"
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Event ID 2974
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Data_2
security_result.summary set to "Error Code - %{Data_2}"
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Event ID 3005
Provider: LogRhythm Agent
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
Event ID 3006
Provider: LogRhythm Agent
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
Message
Message is set to security_result.description
ip is set to target.ip
port is set to target.port
Event ID 3040
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 3041
Provider: Microsoft-Windows-ActiveDirectory_DomainService
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Event ID 3072
Provider: Foundation Agents
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 3096
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Event ID 3260
Provider: Workstation
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 3261
Provider: Workstation
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 4000
version 0 Windows 10 client / Provider: Microsoft-Windows-Diagnostics-Networking
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
RepairOption
Data/RepairOption
security_result.detection_fields.key
security_result.detection_fields.value
RepairGUID
Data/RepairGUID
security_result.detection_fields.key
security_result.detection_fields.value
SecondsRequired
Data/SecondsRequired
additional.fields.key
additional.fields.value_string
SIDTypeRequired
Data/SIDTypeRequired
additional.fields.key
additional.fields.value_string
version 1 Windows 10 client / Provider: Microsoft-Windows-Diagnostics-Networking
NXLog field
Event Viewer field
UDM field
RootCause
Data/RootCause
security_result.description
RootCauseGUID
Data/RootCauseGUID
security_result.detection_fields.key
security_result.detection_fields.value
HelperClassName
Data/HelperClassName
additional.fields.key
additional.fields.value_string
InterfaceDesc
Data/InterfaceDesc
additional.fields.key
additional.fields.value_string
InterfaceGUID
Data/InterfaceGUID
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 4001
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 4003
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
%{ErrorCode}-%{ErrorMsg}
Event
Data/Event
security_result.detection_fields.key
security_result.detection_fields.value
ChangeReason
Data/ChangeReason
security_result.detection_fields.key
security_result.detection_fields.value
IpFamily
Data/IpFamily
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4005
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ReasonForSyncProcessing
Data/ReasonForSyncProcessing
security_result.summary
PrincipalSamName
Data/PrincipalSamName
target.hostname
PolicyActivityId
Data/PolicyActivityId
target.resource.product_object_id
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsDomainJoined
Data/IsDomainJoined
security_result.rule_labels.key
security_result.rule_labels.value
IsBackgroundProcessing
Data/IsBackgroundProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsAsyncProcessing
Data/IsAsyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsServiceRestart
Data/IsServiceRestart
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4006
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
PrincipalSamName
Data/PrincipalSamName
target.hostname
PolicyActivityId
Data/PolicyActivityId
target.resource.product_object_id
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsDomainJoined
Data/IsDomainJoined
security_result.rule_labels.key
security_result.rule_labels.value
IsBackgroundProcessing
Data/IsBackgroundProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsAsyncProcessing
Data/IsAsyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsServiceRestart
Data/IsServiceRestart
security_result.rule_labels.key
security_result.rule_labels.value
ReasonForSyncProcessing
Data/ReasonForSyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4016
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DescriptionString
Data/DescriptionString
security_result.description
CSEExtensionName
Data/CSEExtensionName
target.resource.name
CSEExtensionId
Data/CSEExtensionId
target.resource.product_object_id
IsExtensionAsyncProcessing
Data/IsExtensionAsyncProcessing
target.resource.attribute.labels.key
target.resource.attribute.labels.value
IsGPOListChanged
Data/IsGPOListChanged
security_result.rule_labels.key
security_result.rule_labels.value
GPOListStatusString
Data/GPOListStatusString
security_result.rule_labels.key
security_result.rule_labels.value
ApplicableGPOList
Data/ApplicableGPOList
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4017
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
OperationDescription
Data/OperationDescription
security_result.description
Parameter
Data/Parameter
additional.fields.key
additional.fields.value_string
Event ID 4096
Provider: NetJoin
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DomainName
Data/DomainName
target.administrative_domain
ComputerName
Data/ComputerName
target.hostname
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 4097
Provider: Microsoft-Windows-CAPI2
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Provider: NetJoin
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
NetStatusCode
Data/NetStatusCode
security_result.description
DomainName
Data/DomainName
target.administrative_domain
ComputerName
Data/ComputerName
target.hostname
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 4100
Provider: Microsoft-Windows-Diagnostics-Networking
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ContextInfo
Data/ContextInfo
additional.fields.key
additional.fields.value_string
UserData
Data/UserData
additional.fields.key
additional.fields.value_string
Payload
Data/Payload
additional.fields.key
additional.fields.value_string
Event ID 4101
Provider: Display
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 4103
version 1 / Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_LAUNCH
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.description
AccountName
principal.user.userid
UserID
principal.user.windows_sid
Category
security_result.summary
CommandName
additional.fields.key
additional.fields.value.string_value
ScriptName
target.file.full_path
HostApplication
target.process.command_line
HostName
additional.fields.key
additional.fields.value.string_value
HostVersion
additional.fields.key
additional.fields.value.string_value
HostId
additional.fields.key
additional.fields.value.string_value
EngineVersion
additional.fields.key
additional.fields.value.string_value
RunspaceId
additional.fields.key
additional.fields.value.string_value
CommandType
additional.fields.key
additional.fields.value.string_value
PipelineID
additional.fields.key
additional.fields.value.string_value
Payload
additional.fields.key
additional.fields.value.string_value
SubjectUserSid
Field is not present in the log
ContextInfo
Data/ContextInfo
additional.fields.key
additional.fields.value_string
UserData
Data/UserData
about.user.attribute.labels.key
about.user.attribute.labels.value
Event ID 4104
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_LAUNCH
metadata.description = Script block logging
Domain
principal.administrative_domain
MessageNumber
additional.fields.key
additional.fields.value.string_value
MessageTotal
additional.fields.key
additional.fields.value.string_value
ScriptBlockText
Data/ScriptBlockText
target.process.command_line
ScriptBlockId
principal.resource.product_object_id
UserID
principal.user.windows_sid
Category
security_result.summary
Message
security_result.description
SourceName
target.application
ScriptBlockId
principal.resource.product_object_id
Path
target.file.full_path
Event ID 4108
Provider: Microsoft-Windows-CAPI2
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Extract information from Message field and map it to network.tls.client.certificate
Event ID 4109
Provider: Microsoft-Windows-CAPI2
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Extract information from Message field and map it to network.tls.client.certificate
Event ID 4111
Provider: Microsoft-Windows-MSDTC
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
Not available
target.application
Category
Data/Category
security_result.category_details
Event ID 4112
Provider: Microsoft-Windows-CAPI2
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 4113
Provider: Microsoft-Windows-CAPI2
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 4115
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsServiceRestart
Data/IsServiceRestart
security_result.rule_labels.key
security_result.rule_labels.value
IsMachineBoot
Data/IsMachineBoot
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4116
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 4117
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsBackgroundProcessing
Data/IsBackgroundProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsAsyncProcessing
Data/IsAsyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4124
Provider: Microsoft-Windows-BitLocker-API
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 4125
Provider: Microsoft-Windows-BitLocker-API
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
security_result.description
Format:
Error - %{value}
Event ID 4126
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
Event ID 4127
Provider: Microsoft-Windows-BitLocker-API
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
security_result.description
Event ID 4133
Provider: Microsoft-Windows-BitLocker-API
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 4199
Provider: Tcpip
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
principal.ip
Data_1
Data/Data_1
target.mac
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 4200
Provider: Microsoft-Windows-Iphlpsvc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
Interface
target_resource_product_object_id set to target.resource.product_object_id
Address
target.ip
ProtocolType
additional.fields.key
additional.fields.value_string
Event ID 4202
Provider: Microsoft-Windows-MSDTC 2
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
SourceName
Not available
target.application
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
param5
Data/param5
additional.fields.key
additional.fields.value.string_value
param6
Data/param6
additional.fields.key
additional.fields.value.string_value
param7
Data/param7
additional.fields.key
additional.fields.value.string_value
param9
Data/param9
target.user.userid
param8
Data/param8
additional.fields.key
additional.fields.value_string
param10
Data/param10
additional.fields.key
additional.fields.value_string
param11
Data/param11
additional.fields.key
additional.fields.value_string
param12
Data/param12
additional.fields.key
additional.fields.value_string
Event ID 4227
Provider: Tcpip
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message set to security_result.summary
Event ID 4230
Provider: Tcpip
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
EventData.Binary
additional.fields.key
additional.fields.value_string
Culture
additional.fields.key
additional.fields.value_string
Level
security_result.detection_fields.key
security_result.detection_fields.value
Keywords.Keyword
additional.fields.key
additional.fields.value_string
Event ID 4257
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsBackgroundProcessing
Data/IsBackgroundProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsAsyncProcessing
Data/IsAsyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 4319
Provider: NetBT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 4321
Provider: NetBT
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
Data
Data/Data
principal.hostname and principal.port
Data_1
Data/Data_1
principal.ip
Data_2
Data/Data_2
target.ip
Event ID 4326
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
Event ID 4400
Provider: NPS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data_1
principal.administrative_domain
Data
additional.fields.key
additional.fields.value_string
Event ID 4608
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_STARTUP
security_result.action = ALLOW
Event ID 4609
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_SHUTDOWN
security_result.action = ALLOW
Event ID 4610
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
AuthenticationPackageName
Data/AuthenticationPackageName
target.resource.name
Event ID 4611
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
LogonProcessName
Data/LogonProcessName
target.process.command_line
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4612
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
AuditsDiscarded
about.labels.key
about.labels.value
Event ID 4614
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
NotificationPackageName
Data/NotificationPackageName
target.resource.name
Event ID 4615
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_UNCATEGORIZED
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
InvalidCallName
Data/InvalidCallName
additional.fields.key
additional.fields.value_string
ServerPortName
Data/ServerPortName
additional.fields.key
additional.fields.value_string
Event ID 4616
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type set to SETTING
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
PreviousDate
Data/PreviousDate
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PreviousTime
Data/PreviousTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewDate
Data/NewDate
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewTime
Data/NewTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 1 /
NXLog field
Event Viewer field
UDM field
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
NewDate
Data/NewDate
target.resource.attribute.labels.key/value
NewTime
Data/NewTime
target.resource.attribute.labels.key/value
PreviousDate
Data/PreviousDate
target.resource.attribute.labels.key/value
PreviousTime
Data/PreviousTime
target.resource.attribute.labels.key/value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4618
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
TargetUserDomain
Data/TargetUserDomain
target.administrative_domain
ComputerName
Data/ComputerName
target.hostname
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
EventId
Data/EventId
additional.fields.key
additional.fields.value_string
EventCount
Data/EventCount
additional.fields.key
additional.fields.value_string
Duration
Data/Duration
additional.fields.key
additional.fields.value_string
Event ID 4621
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
CrashOnAuditFailValue
Data/CrashOnAuditFailValue
security_result.summary
Event ID 4622
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SecurityPackageName
Data/SecurityPackageName
target.resource.name
Event ID 4624
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
LogonType
Data/LogonType
extensions.auth.mechanism and extensions.auth.details
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
WorkstationName
Data/WorkstationName
The WorkstationName field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the WorkstationName log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the WorkstationName log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the WorkstationName log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the WorkstationName log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original WorkstationName log field value is added to additional.fields.key and additional.fields.value.string_value.
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
AuthenticationPackageName
Data/AuthenticationPackageName
security_result.about.resource.name
ElevatedToken
Data/ElevatedToken
security_result.detection_fields.labels.key/value
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
LogonProcessName
Data/LogonProcessName
target.process.file.full_path
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
KeyLength
Data/KeyLength
target.labels.key/value
LmPackageName
Data/LmPackageName
target.labels.key/value
LogonGuid
Data/LogonGuid
additional.fields.key
additional.fields.value_string
version 1 /
NXLog field
Event Viewer field
UDM field
ImpersonationLevel
about.labels.key/value
version 2 /
NXLog field
Event Viewer field
UDM field
TargetOutboundUserName
Data/TargetOutboundUserName
target.user.user_display_name
RestrictedAdminMode
about.labels.key/value
TargetLinkedLogonId
about.labels.key/value
Hostname
intermediary.hostname
Event ID 4625
Provider: Microsoft-Windows-EventSystem
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
about.registry.registry_key
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.category = AUTH_VIOLATION
security_result.action = BLOCK
extensions.auth.type set to MACHINE
FailureReason
security_result.about.labels.key
security_result.about.labels.value
LogonType
Data/LogonType
extensions.auth.mechanism and extensions.auth.details
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
WorkstationName
Data/WorkstationName
The WorkstationName field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the WorkstationName log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the WorkstationName log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the WorkstationName log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the WorkstationName log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original WorkstationName log field value is added to additional.fields.key and additional.fields.value.string_value.
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
AuthenticationPackageName
Data/AuthenticationPackageName
security_result.about.resource.name
Status
Data/Status
security_result.summary
Populate description corresponding to the status codes. Format: Status(%{Status}): %{status_description}.
If the value coming is 0xc000006d, then store the value 'The cause is either a bad username or authentication information (referred from doc table.'
SubStatus
Data/SubStatus
security_result.description
Populate description corresponding to the substatus codes. Format: SubStatus(%{SubStatus}): %{sub_status_description}
If the value coming is 0xc000006d, then store the value 'The cause is either a bad username or authentication information (referred from doc table.'
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
LogonProcessName
Data/LogonProcessName
target.process.file.full_path
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TransmittedServices
Data/TransmittedServices
additional.fields.key
additional.fields.value_string
LmPackageName
Data/LmPackageName
additional.fields.key
additional.fields.value_string
KeyLength
Data/KeyLength
additional.fields.key
additional.fields.value_string
Hostname
intermediary.hostname
Event ID 4626
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
LogonType
Data/LogonType
extensions.auth.mechanism and extensions.auth.details
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
EventIdx
Data/EventIdx
additional.fields.key
additional.fields.value_string
EventCountTotal
Data/EventCountTotal
additional.fields.key
additional.fields.value_string
UserClaims
Data/UserClaims
additional.fields.key
additional.fields.value_string
DeviceClaims
Data/DeviceClaims
additional.fields.key
additional.fields.value_string
Event ID 4627
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_UNCATEGORIZED
security_result.action = ALLOW
LogonType
Data/LogonType
extensions.auth.mechanism and extensions.auth.details
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
GroupMembership
Data/GroupMembership
target.user.group_identifiers
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
EventIdx
Data/EventIdx
additional.fields.key
additional.fields.value_string
EventCountTotal
Data/EventCountTotal
additional.fields.key
additional.fields.value_string
Event ID 4634
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGOUT
security_result.action = ALLOW
LogonType
Data/LogonType
extensions.auth.mechanism and extensions.auth.details
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4646
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
security_result.action = BLOCK
notification
Data/notification
additional.fields.key
additional.fields.value_string
Event ID 4647
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGOUT
security_result.action = BLOCK
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4648
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
extensions.auth.mechanism set to "USERNAME_PASSWORD"
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
TargetServerName
target.hostname
TargetInfo
target.labels.key
target.labels.value
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
Event ID 4649
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_UNCATEGORIZED
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
LogonProcessName
Data/LogonProcessName
principal.process.command_line
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
WorkstationName
Data/WorkstationName
The WorkstationName field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the WorkstationName log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the WorkstationName log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the WorkstationName log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the WorkstationName log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original WorkstationName log field value is added to additional.fields.key and additional.fields.value.string_value.
ProcessName
Data/ProcessName
target.process.command_line
ProcessId
Data/ProcessId
target.process.pid
TargetUserName
Data/TargetUserName
target.user.userid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
RequestType
Data/RequestType
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationPackage
Data/AuthenticationPackage
security_result.detection_fields.key
security_result.detection_fields.value
TransmittedServices
Data/TransmittedServices
additional.fields.key
additional.fields.value_string
Event ID 4650
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
Event ID 4651
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMIssuingCA
Data/LocalMMIssuingCA
network.tls.client.certificate.issuer
RemoteMMIssuingCA
Data/RemoteMMIssuingCA
network.tls.server.certificate.issuer
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalMMCertHash
Data/LocalMMCertHash
additional.fields.key
additional.fields.value_string
LocalMMRootCA
Data/LocalMMRootCA
additional.fields.key
additional.fields.value_string
RemoteMMCertHash
Data/RemoteMMCertHash
additional.fields.key
additional.fields.value_string
RemoteMMRootCA
Data/RemoteMMRootCA
additional.fields.key
additional.fields.value_string
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
Event ID 4652
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = FAIL
LocalMMIssuingCA
Data/LocalMMIssuingCA
network.tls.client.certificate.issuer
RemoteMMIssuingCA
Data/RemoteMMIssuingCA
network.tls.server.certificate.issuer
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalMMCertHash
Data/LocalMMCertHash
additional.fields.key
additional.fields.value_string
LocalMMRootCA
Data/LocalMMRootCA
additional.fields.key
additional.fields.value_string
RemoteMMCertHash
Data/RemoteMMCertHash
additional.fields.key
additional.fields.value_string
RemoteMMRootCA
Data/RemoteMMRootCA
additional.fields.key
additional.fields.value_string
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
FailureReason
Data/FailureReason
security_result.summary
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
State
Data/State
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
InitiatorCookie
Data/InitiatorCookie
additional.fields.key
additional.fields.value_string
ResponderCookie
Data/ResponderCookie
additional.fields.key
additional.fields.value_string
Event ID 4653
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = FAIL
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
FailureReason
Data/FailureReason
security_result.summary
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
State
Data/State
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
InitiatorCookie
Data/InitiatorCookie
additional.fields.key
additional.fields.value_string
ResponderCookie
Data/ResponderCookie
additional.fields.key
additional.fields.value_string
Event ID 4654
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = FAIL
Protocol
Data/Protocol
network.ip_protocol
LocalAddress
Data/LocalAddress
principal.ip
LocalPort
Data/LocalPort
principal.port
FailureReason
Data/FailureReason
security_result.summary
RemoteAddress
Data/RemoteAddress
target.ip
RemotePort
Data/RemotePort
target.port
LocalAddressMask
Data/LocalAddressMask
additional.fields.key
additional.fields.value_string
LocalTunnelEndpoint
Data/calTunnelEndpoint
additional.fields.key
additional.fields.value_string
RemoteAddressMask
Data/RemoteAddressMask
additional.fields.key
additional.fields.value_string
RemoteTunnelEndpoint
Data/RemoteTunnelEndpoint
additional.fields.key
additional.fields.value_string
RemotePrivateAddress
Data/RemotePrivateAddress
additional.fields.key
additional.fields.value_string
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
Mode
Data/Mode
additional.fields.key
additional.fields.value_string
State
Data/State
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MessageID
Data/MessageID
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
TunnelId
Data/TunnelId
additional.fields.key
additional.fields.value_string
TrafficSelectorId
Data/TrafficSelectorId
additional.fields.key
additional.fields.value_string
Event ID 4655
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalAddress
Data/LocalAddress
principal.ip
RemoteAddress
Data/RemoteAddress
target.ip
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
Event ID 4656
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
TransactionId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RestrictedSidCount
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectName
Data/ObjectName
target.file.full_path (when ObjectType = "File")
target.process.command_line (when ObjectType = "Process")
AccessList
Data/AccessList
target.resource.attribute.permissions.name
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
ObjectType
Data/ObjectType
target.resource.resource_subtype
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessMask
Data/AccessMask
principal.process.access_mask
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
ResourceAttributes
Data/ResourceAttributes
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessReason
Data/AccessReason
security_result.description
Event ID 4657
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
OperationType
target.labels.key
target.labels.value
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectName
Data/ObjectName
target.registry.registry_key
OldValueType
target.labels.key
target.labels.value
OldValue
target.labels.key
target.labels.value
NewValueType
target.labels.key
target.labels.value
NewValue
Data/NewValue
target.registry.registry_value_data
ObjectValueName
Data/ObjectValueName
target.registry.registry_value_name
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
HandleId
target.labels.key/value
Event ID 4658
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
HandleId
target.labels.key/value
SubjectUserName
Data/SubjectUserName
principal.user.userid
ObjectServer
target.labels.key
target.labels.value
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Event ID 4659
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectName
Data/ObjectName
target.file.full_path (when ObjectType = "File")
target.process.command_line (when ObjectType = "Process")
AccessList
Data/AccessList
target.resource.attribute.permissions.name
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
ObjectServer
Data/ObjectServer
additional.fields.key
additional.fields.value_string
ObjectType
Data/ObjectType
additional.fields.key
additional.fields.value_string
HandleId
Data/HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TransactionId
Data/TransactionId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessMask
Data/AccessMask
principal.process.access_mask
principal.resource.attribute.permissions
Event ID 4660
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TransactionId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4661
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
AccessReason
Data/AccessReason
security_result.description
RestrictedSidCount
target.labels.key
target.labels.value
version 0 /
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ObjectType
target.labels.key/value
ProcessName
Data/ProcessName
principal.process.file.full_path
HandleId
target.labels.key/value
TransactionId
target.labels.key
target.labels.value
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectName
Data/ObjectName
target.group.group_display_name (when ObjectType is SAM_ALIAS, SAM_GROUP)
target.user.userid (when ObjectType is SAM_USER)
target.administrative_domain (when ObjectType is SAM_DOMAIN)
target.hostname (when ObjectType is SAM_SERVER)
AccessList
Data/AccessList
target.resource.attribute.permissions.name
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
ObjectServer
target.labels.key
target.labels.value
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
AccessMask
Data/AccessMask
additional.fields.key
additional.fields.value_string
Properties
Data/Properties
additional.fields.key
additional.fields.value_string
Event ID 4662
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
ObjectType
target.resource.resource_subtype
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
AdditionalInfo
Data/AdditionalInfo
security_result.description
AdditionalInfo2
security_result.detection_fields.key/value
Properties
Data/Properties
security_result.detection_fields.key/value
AccessMask
Data/AccessMask
principal.process.access_mask
principal.resource.attribute.permissions
ObjectName
Data/ObjectName
target.resource.name
ObjectServer
Data/ObjectServer
target.resource.parent
target.resource_ancestors.name
OperationType
Data/OperationType
additional.fields.key
additional.fields.value_string
HandleId
Data/HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessList
Data/AccessList
target.resource.attribute.permissions.name
Event ID 4663
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
FILE_OPEN (ObjectType = File, SymbolicLink)
REGISTRY_UNCATEGORIZED (ObjectType = Key)
PROCESS_OPEN (ObjectType = Process)
USER_RESOURCE_ACCESS (ObjectType = Event)
security_result.action = ALLOW
ObjectName
Data/ObjectName
Object Type | UDM Field
--------------------------+------------------------------------
File, SymbolicLink | target.file.full_path
Key | target.registry.registry_key
Process | target.process.file.full_path
Event | target.resource.name
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ObjectType
target.resource.resource_subtype
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
AccessList
Data/AccessList
target.resource.attribute.permissions.name
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ResourceAttributes
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessMask
Data/AccessMask
principal.process.access_mask
principal.resource.attribute.permissions
Event ID 4664
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
FileName
Data/FileName
target.file.full_path
TransactionId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LinkName
Data/LinkName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4665
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_CREATION
security_result.action = UNKNOWN_ACTION
ClientDomain
Data/ClientDomain
principal.administrative_domain
ClientName
Data/ClientName
principal.labels.key/value
AppName
Data/AppName
target.application
AppInstance
Data/AppInstance
target.resource.product_object_id
ClientLogonId
Data/ClientLogonId
additional.fields.key
additional.fields.value_string
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 4666
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = UNKNOWN_ACTION
ClientDomain
Data/ClientDomain
principal.administrative_domain
AppInstance
target.resource.product_object_id
ClientName
Data/ClientName
principal.labels.key/value
AppName
Data/AppName
target.application
ObjectName
Data/ObjectName
target.resource.name
ScopeName
Data/ScopeName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClientLogonId
Data/ClientLogonId
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
Group
Data/Group
additional.fields.key
additional.fields.value_string
OperationName
Data/OperationName
additional.fields.key
additional.fields.value_string
OperationId
Data/OperationId
additional.fields.key
additional.fields.value_string
Event ID 4667
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_DELETION
security_result.action = UNKNOWN_ACTION
ClientDomain
Data/ClientDomain
principal.administrative_domain
AppInstance
target.resource.product_object_id
ClientName
Data/ClientName
principal.labels.key/value
AppName
Data/AppName
target.application
ClientLogonId
Data/ClientLogonId
additional.fields.key
additional.fields.value_string
Event ID 4668
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ClientDomain
Data/ClientDomain
principal.administrative_domain
ClientName
Data/ClientName
principal.labels.key/value
AppInstance
target.resource.product_object_id
AppName
Data/AppName
target.application
ClientLogonId
Data/ClientLogonId
additional.fields.key
additional.fields.value_string
StoreUrl
Data/StoreUrl
additional.fields.key
additional.fields.value_string
Event ID 4670
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
FILE_OPEN (ObjectType = File, SymbolicLink)
REGISTRY_UNCATEGORIZED (ObjectType = Key)
PROCESS_OPEN (ObjectType = Process)
USER_RESOURCE_ACCESS (ObjectType = Event)
security_result.action = ALLOW_WITH_MODIFICATION
ObjectName
Data/ObjectName
Object Type | UDM Field
--------------------------+------------------------------------
File, SymbolicLink | target.file.full_path
Key | target.registry.registry_key
Process | target.process.file.full_path
Event | target.resource.name
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldSd
Data/OldSd
security_result.detection_fields.key/value
NewSd
Data/NewSd
security_result.detection_fields.key/value
ObjectType
target.resource.resource_subtype
Event ID 4671
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
CallerDomainName
Data/CallerDomainName
principal.administrative_domain
CallerUserName
Data/CallerUserName
principal.user.userid
CallerUserSid
Data/CallerUserSid
principal.user.windows_sid
CallerLogonId
Data/CallerLogonId
principal.user.attribute.labels.key
principal.user.attribute.labels.value
Ordinal
Data/Ordinal
additional.fields.key
additional.fields.value_string
Event ID 4672
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4673
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to GENERIC_EVENT.
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
Service
target.application
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
SubjectUserSid
principal.user.windows_sid
ProcessName
Data/ProcessName
target.process.command_line
If ProcessName field not in log then extract "Process ID" and "Process Name" from "Message" field.
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProcessId
Data/ProcessId
target.process.pid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
PrivilegeList
Data/PrivilegeList
target.resource.attribute.permissions.name
Event ID 4674
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
If the ProcessName field is absent, then set metadata.event_type to GENERIC_EVENT.
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ProcessName
Data/ProcessName
target.process.command_line
If ProcessName field not in log then extract "Process ID" and "Process Name" from "Message" field.
ProcessId
Data/ProcessId
target.process.pid
ObjectName
ObjectName
target.resource.name
ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectType
Data/ObjectType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccessMask
Data/AccessMask
additional.fields.key
additional.fields.value_string
PrivilegeList
Data/PrivilegeList
principal.user.attribute.permissions.name
Event ID 4675
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TdoDirection
Data/TdoDirection
security_result.detection_fields.key
security_result.detection_fields.value
TdoAttributes
Data/TdoAttributes
security_result.detection_fields.key
security_result.detection_fields.value
TdoType
Data/TdoType
security_result.detection_fields.key
security_result.detection_fields.value
TdoSid
Data/TdoSid
security_result.detection_fields.key
security_result.detection_fields.value
SidList
Data/SidList
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4688
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_LAUNCH
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
NewProcessName
Data/NewProcessName
target.process.file.full_path
NewProcessId
Data/NewProcessId
target.process.pid
ParentProcessName
Data/ParentProcessName
principal.process.file.full_path
TokenElevationType
Data/TokenElevationType
target.labels
additional.fields.key
additional.fields.value.string_value
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
version 1 /
NXLog field
Event Viewer field
UDM field
commandLine
Data/commandLine
principal.process.command_line
version 2 /
NXLog field
Event Viewer field
UDM field
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
MandatoryLabel
Data/MandatoryLabel
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4689
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_TERMINATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ProcessName
Data/ProcessName
target.process.file.full_path
principal.process.file.full_path
ProcessId
Data/ProcessId
target.process.pid
principal.process.pid
Status
Data/Status
security_result.summary
Event ID 4690
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_CREATION
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SourceProcessId
Data/SourceProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
SourceHandleId
Data/SourceHandleId
src.resource.name
TargetProcessId
Data/TargetProcessId
target.process.pid
TargetHandleId
Data/TargetHandleId
target.resource.name
Event ID 4691
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
FILE_OPEN (ObjectType = File, SymbolicLink)
REGISTRY_UNCATEGORIZED (ObjectType = Key)
PROCESS_OPEN (ObjectType = Process)
USER_RESOURCE_ACCESS (ObjectType = Event)
security_result.action = ALLOW
ObjectName
Data/ObjectName
Object Type | UDM Field
--------------------------+------------------------------------
File, SymbolicLink | target.file.full_path
Key | target.registry.registry_key
Process | target.process.file.full_path
Event | target.resource.name
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ObjectType
Data/ObjectType
additional.fields.key
additional.fields.value_string
AccessList
Data/AccessList
additional.fields.key
additional.fields.value_string
AccessMask
Data/AccessMask
additional.fields.key
additional.fields.value_string
Event ID 4692
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW if FailureReason contains "0x0"; otherwise, set it to FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
MasterKeyId
security_result.detection_fields.key
security_result.detection_fields.value
RecoveryKeyId
security_result.detection_fields.key
security_result.detection_fields.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
FailureReason
Data/FailureReason
security_result.description
RecoveryServer
Data/RecoveryServer
target.hostname
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4693
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW if FailureId contains "0x380000"; otherwise, set it to FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
MasterKeyId
security_result.detection_fields.key
security_result.detection_fields.value
RecoveryKeyId
security_result.detection_fields.key
security_result.detection_fields.value
FailureId
security_result.detection_fields.key
security_result.detection_fields.value
RecoveryServer
target.hostname
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RecoveryReason
Data/RecoveryReason
security_result.description
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4694
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
MasterKeyId
security_result.detection_fields.key
security_result.detection_fields.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
FailureReason
Data/FailureReason
security_result.description
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DataDescription
Data/DataDescription
security_result.detection_fields.key
security_result.detection_fields.value
ProtectedDataFlags
Data/ProtectedDataFlags
security_result.detection_fields.key
security_result.detection_fields.value
CryptoAlgorithms
Data/CryptoAlgorithms
additional.fields.key
additional.fields.value_string
Event ID 4695
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
SubjectUserName
Data/SubjectUserName
principal.user.userid
MasterKeyId
security_result.detection_fields.key
security_result.detection_fields.value
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
FailureReason
Data/FailureReason
security_result.description
DataDescription
Data/DataDescription
security_result.detection_fields.key
security_result.detection_fields.value
ProtectedDataFlags
Data/ProtectedDataFlags
security_result.detection_fields.key
security_result.detection_fields.value
CryptoAlgorithms
Data/CryptoAlgorithms
additional.fields.key
additional.fields.value_string
Event ID 4696
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetProcessName
Data/TargetProcessName
target.process.command_line
TargetProcessId
Data/TargetProcessId
target.process.pid
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4697
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ServiceType
target.labels.key
target.labels.value
ServiceStartType
target.labels.key
target.labels.value
ServiceAccount
target.resource.name
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ServiceName
Data/ServiceName
target.application
ServiceFileName
Data/ServiceFileName
target.process.file.full_path
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ClientProcessId
Data/ClientProcessId
principal.process.pid
ParentProcessId
Data/ParentProcessId
principal.process.parent_process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
Event ID 4698
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_CREATION
target.resource.resource_type = TASK
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TaskName
Data/TaskName
target.resource.name
Message
Data/Message
URI set to target.file.full_path
Command set to target.process.command_line
TaskContent
Data/TaskContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ParentProcessId
Data/ParentProcessId
target.process.parent_process.pid
ClientProcessId
Data/ClientProcessId
target.process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
RpcCallClientLocality
Data/RpcCallClientLocality
additional.fields.key
additional.fields.value_string
FQDN
Data/FQDN
additional.fields.key
additional.fields.value_string
Event ID 4699
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_DELETION
target.resource.resource_type = "TASK"
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TaskName
Data/TaskName
target.resource.name
TaskContent
Data/TaskContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ParentProcessId
Data/ParentProcessId
principal.process.parent_process.pid
ClientProcessId
Data/ClientProcessId
principal.process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
RpcCallClientLocality
Data/RpcCallClientLocality
additional.fields.key
additional.fields.value_string
FQDN
Data/FQDN
additional.fields.key
additional.fields.value_string
Event ID 4700
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
SCHEDULED_TASK_ENABLE
target.resource.resource_type = TASK
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TaskName
Data/TaskName
target.resource.name
TaskContent
Data/TaskContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ParentProcessId
Data/ParentProcessId
principal.process.parent_process.pid
ClientProcessId
Data/ClientProcessId
principal.process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
RpcCallClientLocality
Data/RpcCallClientLocality
additional.fields.key
additional.fields.value_string
FQDN
Data/FQDN
additional.fields.key
additional.fields.value_string
Event ID 4701
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
SCHEDULED_TASK_DISABLE
target.resource.resource_type = TASK
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TaskName
Data/TaskName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TaskContent
Data/TaskContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ParentProcessId
Data/ParentProcessId
principal.process.parent_process.pid
ClientProcessId
Data/ClientProcessId
principal.process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
RpcCallClientLocality
Data/RpcCallClientLocality
additional.fields.key
additional.fields.value_string
FQDN
Data/FQDN
additional.fields.key
additional.fields.value_string
Event ID 4702
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_MODIFICATION
target.resource.resource_type = TASK
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
FQDN
target.labels.key
target.labels.value
TaskContentNew
Extract the XML data from the TaskContentNew log field and map all the extracted fields with target.labels.key/value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TaskName
Data/TaskName
target.resource.name
version 1 / Windows 10 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
ClientProcessId
Data/ClientProcessId
target.process.pid
ParentProcessId
Data/ParentProcessId
target.process.parent_process.pid
ClientProcessStartKey
Data/ClientProcessStartKey
additional.fields.key
additional.fields.value_string
RpcCallClientLocality
Data/RpcCallClientLocality
additional.fields.key
additional.fields.value_string
Event ID 4703
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_PERMISSIONS_CHANGE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
EnabledPrivilegeList
Data/EnabledPrivilegeList
target.user.attribute.permissions.name
target.user.attribute.permissions.description
DisabledPrivilegeList
Data/DisabledPrivilegeList
target.user.attribute.permissions.name
target.user.attribute.permissions.description
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4704
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetSid
Data/TargetSid
target.user.windows_sid
Extract userId from TargetSid and map it to target.user.userid.
Extract domain from TargetSid and map it to target.administrative_domain.
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4705
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetSid
Data/TargetSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4706
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DomainName
Data/DomainName
target.administrative_domain
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields[Trust Type]
TdoDirection
Data/TdoDirection
security_result.detection_fields[Trust Direction]
TdoAttributes
Data/TdoAttributes
security_result.detection_fields[Trust Attributes]
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields[Sid Filtering]
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields.key
security_result.detection_fields.value
TdoDirection
Data/TdoDirection
security_result.detection_fields.key
security_result.detection_fields.value
TdoAttributes
Data/TdoAttributes
security_result.detection_fields.key
security_result.detection_fields.value
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4707
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DomainName
Data/DomainName
target.administrative_domain
DomainSid
Data/DomainSid
target.user.windows_sid
DomainSid
Data/DomainSid
target.user.windows_sid
Event ID 4709
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = "IPsec Policy Agent Service"
security_result.action = ALLOW
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
Event ID 4710
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "IPsec Policy Agent Service"
security_result.action = ALLOW
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
Event ID 4711
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to FAIL if param1 contains "failed"; Set it to ALLOW if param1 contains "applied" or "loaded".
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
Event ID 4712
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "IPsec Policy Agent Service"
security_result.action = FAIL
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
Event ID 4713
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
KerberosPolicyChange
Data/KerberosPolicyChange
target.resource.attribute.labels.key = "FieldName_OLD_VALUE" and value="<old_value>" and
target.resource.attribute.labels.key = "FieldName_NEW_VALUE" and value="<new_value>"
Event ID 4714
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
EfsPolicyChange
Data/EfsPolicyChange
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4715
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
OldSd
Data/OldSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSd
Data/NewSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4716
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DomainName
Data/DomainName
target.administrative_domain
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields[Trust Type]
TdoDirection
Data/TdoDirection
security_result.detection_fields[Trust Direction]
TdoAttributes
Data/TdoAttributes
security_result.detection_fields[Trust Attributes]
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields[Sid Filtering]
DomainSid
Data/DomainSid
target.user.windows_sid
TdoType
Data/TdoType
security_result.detection_fields.key
security_result.detection_fields.value
TdoDirection
Data/TdoDirection
security_result.detection_fields.key
security_result.detection_fields.value
TdoAttributes
Data/TdoAttributes
security_result.detection_fields.key
security_result.detection_fields.value
SidFilteringEnabled
Data/SidFilteringEnabled
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4717
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
AccessGranted
Data/AccessGranted
target.user.attribute.permissions.name
target.user.attribute.permissions.description
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4718
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
AccessRemoved
Data/AccessRemoved
target.user.attribute.permissions.name
target.user.attribute.permissions.description
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4719
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
SubcategoryGuid
Data/SubcategoryGuid
Populate security_result.category_details based on description received in output of command: auditpol /list /subcategory:* /v.
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
CategoryId
Data/CategoryId
security_result[0].category_details is set to "CategoryId"
security_result[0].summary is set to "%{CategoryId}"
security_result[0].description is set to "%{Category}"
SubcategoryId
Data/SubcategoryId
security_result[0].category_details is set to "SubCategoryId"
security_result[0].summary is set to "%{SubCategoryId}"
security_result[0].description is set to "%{SubCategory}"
extract "Subcategory" description from "Message" field.
SubcategoryGuid
Data/SubcategoryGuid
security_result[2].category_details is set to "SubcategoryGuid"
security_result[2].summary is set to "%{SubcategoryGuid}"
security_result[2].description is set to "%{subcategory_guid_description}"
AuditPolicyChanges
Data/AuditPolicyChanges
security_result[3].category_details is set to "AuditPolicyChanges"
security_result[3].summary is set to "%{AuditPolicyChanges_description}"
extract "AuditPolicyChanges_description" description from "Message" field
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4720
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
DisplayName
Data/DisplayName
target.user.user_display_name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SamAccountName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserPrincipalName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomeDirectory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ScriptPath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProfilePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserWorkstations
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PasswordLastSet
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccountExpires
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PrimaryGroupId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AllowedToDelegateTo
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserAccountControl
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserParameters
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SidHistory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LogonHours
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4722
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4723
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PASSWORD
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4724
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PASSWORD
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4725
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4726
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4727
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4728
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Message
Data/Message
Extracted OU, CN, DC fields from the Message log field and mapped it to target.user.attribute.labels
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4729
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4730
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4731
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SamAccountName
principal.user.attribute.labels.key/value
SidHistory
principal.user.attribute.labels.key/value
Event ID 4732
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
version 1 /
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
target.user.attribute.labels.key/value
Event ID 4733
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
Event ID 4734
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4735
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SamAccountName
principal.user.attribute.labels.key/value
SidHistory
principal.user.attribute.labels.key/value
Event ID 4737
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
target.group.attribute.labels.key
target.group.attribute.labels.value
Event ID 4738
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.user_display_name
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
SamAccountName
Data/SamAccountName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DisplayName
Data/DisplayName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserPrincipalName
Data/UserPrincipalName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomeDirectory
Data/HomeDirectory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomePath
Data/HomePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ScriptPath
Data/ScriptPath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProfilePath
Data/ProfilePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserWorkstations
Data/UserWorkstations
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PasswordLastSet
Data/PasswordLastSet
target.resource.attribute.labels.key
target.resource.attribute.labels.value
target.user.last_password_change_time
AccountExpires
Data/AccountExpires
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PrimaryGroupId
Data/PrimaryGroupId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AllowedToDelegateTo
Data/AllowedToDelegateTo
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldUacValue
Data/OldUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewUacValue
Data/NewUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserAccountControl
Data/UserAccountControl
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserParameters
Data/UserParameters
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SidHistory
Data/SidHistory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LogonHours
Data/LogonHours
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Dummy
Data/Dummy
additional.fields.key
additional.fields.value_string
Event ID 4739
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = "SETTING"
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DomainName
Data/DomainName
target.administrative_domain
DomainPolicyChanged
Data/DomainPolicyChanged
target.resource.name
PrivilegeList
target.user.attribute.permissions.name
MinPasswordAge
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MaxPasswordAge
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ForceLogoff
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LockoutThreshold
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LockoutObservationWindow
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LockoutDuration
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PasswordProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MinPasswordLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PasswordHistoryLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MachineAccountQuota
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MixedDomainMode
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainBehaviorVersion
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OemInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainSid
Data/DomainSid
target.user.windows_sid
Event ID 4740
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
CallerComputerName
src.hostname
Event ID 4741
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_CREATION
target.resource.resource_type = STORAGE_OBJECT
target.resource.resource_subtype = Computer Account
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.user_display_name
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
DnsHostName
Data/DnsHostName
target.asset.hostname
SamAccountName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DisplayName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserPrincipalName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomeDirectory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HomePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ScriptPath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ProfilePath
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserWorkstations
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PasswordLastSet
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AccountExpires
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PrimaryGroupId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AllowedToDelegateTo
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewUacValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserAccountControl
target.resource.attribute.labels.key
target.resource.attribute.labels.value
UserParameters
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SidHistory
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LogonHours
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ServicePrincipalNames
target.application
Event ID 4742
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
target.resource.resource_type = STORAGE_OBJECT
target.resource.resource_subtype = Computer Account
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
ServicePrincipalNames
Data/ServicePrincipalNames
target.application
ComputerAccountChange
Data/ComputerAccountChange
additional.fields.key
additional.fields.value_string
Event ID 4743
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4744
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
target.group.attribute.labels.key
target.group.attribute.labels.value
Event ID 4745
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
target.group.attribute.labels.key
target.group.attribute.labels.value
Event ID 4746
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4747
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4748
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4749
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SamAccountName
target.labels.key/value
SidHistory
target.labels.key/value
Event ID 4750
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SamAccountName
target.labels.key/value
SidHistory
target.labels.key/value
Event ID 4751
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4752
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
Event ID 4753
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4754
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SamAccountName
Data/SamAccountName
additional.fields.key
additional.fields.value_string
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4755
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
additional.fields.key
additional.fields.value_string
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4756
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value.string_value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4757
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4758
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4759
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
target.group.attribute.labels.key
target.group.attribute.labels.value
Event ID 4760
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
target.group.attribute.labels.key
target.group.attribute.labels.value
Event ID 4761
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4762
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4763
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4764
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
GroupTypeChange
Data/GroupTypeChange
security_result.summary
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
PrivilegeList
target.user.attribute.permissions.name (repeated)
Event ID 4765
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
target.resource.resource_type = SETTING
target.resource.resource_subtype = SID History
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SourceUserName
Data/SourceUserName
about.user.userid
SourceSid
Data/SourceSid
about.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SidList
Data/SidList
target.user.attribute.labels.key
target.user.attribute.labels.value
Event ID 4766
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SourceUserName
Data/SourceUserName
about.user.userid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4767
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4768
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
If LogonType field is missing then extensions.auth.mechanism = MECHANISM_UNSPECIFIED
Set security_result.action to ALLOW if Status contains "0x0"; otherwise, set it to FAIL.
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
Status
Data/Status
security_result.description
CertIssuerName
Data/CertIssuerName
security_result.detection_fields.labels.key = cert_issuer_name and value = %{cert_issuer_name}
CertSerialNumber
Data/CertSerialNumber
security_result.detection_fields.labels.key = cert_serial_number and value = %{cert_serial_number}
CertThumbprint
Data/CertThumbprint
security_result.detection_fields.labels.key = cert_thumbprint and value = %{cert_thumbprint}
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
ServiceSid
target.labels.key/value
TicketOptions
target.resource.name
TicketEncryptionType
additional.fields.key and additional.fields.value.string_value
PreAuthType
target.labels.key/value
ResponseTicket
Data/ResponseTicket
security_result.detection_fields.key and security_result.detection_fields.value
AccountSupportedEncryptionTypes
Data/AccountSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
AccountAvailableKeys
Data/AccountAvailableKeys
additional.fields.key and additional.fields.value.string_value
ServiceSupportedEncryptionTypes
Data/ServiceSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
ServiceAvailableKeys
Data/ServiceAvailableKeys
additional.fields.key and additional.fields.value.string_value
DCSupportedEncryptionTypes
Data/DCSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
DCAvailableKeys
Data/DCAvailableKeys
additional.fields.key and additional.fields.value.string_value
ClientAdvertizedEncryptionTypes
Data/ClientAdvertizedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
SessionKeyEncryptionType
Data/SessionKeyEncryptionType
additional.fields.key and additional.fields.value.string_value
PreAuthEncryptionType
Data/PreAuthEncryptionType
additional.fields.key and additional.fields.value.string_value
Hostname
intermediary.hostname
Event ID 4769
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
If LogonType field is missing then extensions.auth.mechanism = MECHANISM_UNSPECIFIED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Set security_result.action to ALLOW if Status contains "0x0"; otherwise, set it to FAIL.
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
ServiceSid
Data/ServiceSid
target.user.windows_sid
Status
Data/Status
security_result.description
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TicketOptions
Data/TicketOptions
additional.fields.key and additional.fields.value.string_value
TicketEncryptionType
Data/TicketEncryptionType
additional.fields.key and additional.fields.value.string_value
LogonGuid
Data/LogonGuid
additional.fields.key and additional.fields.value.string_value
TransmittedServices
Data/TransmittedServices
additional.fields.key and additional.fields.value.string_value
ClientAdvertizedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
RequestTicketHash
Data/RequestTicketHash
additional.fields.key and additional.fields.value.string_value
ResponseTicketHash
Data/ResponseTicketHash
additional.fields.key and additional.fields.value.string_value
AccountSupportedEncryptionTypes
Data/AccountSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
AccountAvailableKeys
Data/AccountAvailableKeys
additional.fields.key and additional.fields.value.string_value
ServiceSupportedEncryptionTypes
Data/ServiceSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
ServiceAvailableKeys
Data/ServiceAvailableKeys
additional.fields.key and additional.fields.value.string_value
DCSupportedEncryptionTypes
Data/DCSupportedEncryptionTypes
additional.fields.key and additional.fields.value.string_value
DCAvailableKeys
Data/DCAvailableKeys
additional.fields.key and additional.fields.value.string_value
SessionKeyEncryptionType
Data/SessionKeyEncryptionType
additional.fields.key and additional.fields.value.string_value
Hostname
intermediary.hostname
Event ID 4770
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TicketEncryptionType
Data/TicketEncryptionType
security_result.about.resource.name
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
ServiceSid
target.user.windows_sid
TicketOptions
security_result.about.resource.attribute.labels.key/value
Hostname
intermediary.hostname
Event ID 4771
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
Set security_result.action to ALLOW if Status contains "0x0"; otherwise, set it to FAIL.
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
Status
Data/Status
security_result.description
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
TicketOptions
Data/TicketOptions
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
PreAuthType
Data/PreAuthType
additional.fields.key
additional.fields.value_string
CertIssuerName
Data/CertIssuerName
security_result.detection_fields.key
security_result.detection_fields.value
CertSerialNumber
Data/CertSerialNumber
security_result.detection_fields.key
security_result.detection_fields.value
CertThumbprint
Data/CertThumbprint
security_result.detection_fields.key
security_result.detection_fields.value
Hostname
intermediary.hostname
Event ID 4772
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TicketOptions
Data/TicketOptions
additional.fields.key
additional.fields.value_string
FailureCode
Data/FailureCode
additional.fields.key
additional.fields.value_string
Event ID 4773
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TicketOptions
Data/TicketOptions
additional.fields.key
additional.fields.value_string
FailureCode
Data/FailureCode
additional.fields.key
additional.fields.value_string
Event ID 4774
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
ClientUserName
Data/ClientUserName
principal.user.userid
MappingBy
Data/MappingBy
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
MappedName
Data/MappedName
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4775
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
ClientUserName
Data/ClientUserName
principal.user.userid
MappingBy
Data/MappingBy
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4776
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
Set security_result.action to ALLOW if Status contains "0x0"; otherwise, set it to BLOCK.
Hostname
target.hostname
Workstation
Data/Workstation
The Workstation field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the Workstation log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the Workstation log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the Workstation log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the Workstation log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original Workstation log field value is added to additional.fields.key and additional.fields.value.string_value.
Status
Data/Status
security_result.description
Format:
Status - Description
TargetUserName
Data/TargetUserName
target.user.userid
Version
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Level
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Task
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Opcode
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
Keywords
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
ThreadID
Data/ThreadID
about.labels.key/value
additional.fields.key
additional.fields.value.string_value
PackageName
Data/PackageName
security_result.about.resource.name
Event ID 4777
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.category = "AUTH_VIOLATION"
security_result.action = FAIL
Status
Data/Status
security_result.summary
Workstation
Data/Workstation
The Workstation field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the Workstation log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the Workstation log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the Workstation log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the Workstation log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original Workstation log field value is added to additional.fields.key and additional.fields.value.string_value.
TargetUserName
Data/TargetUserName
target.user.userid
ClientUserName
Data/ClientUserName
additional.fields.key
additional.fields.value_string
Event ID 4778
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SessionName
Data/SessionName
network.session_id
AccountDomain
Data/AccountDomain
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
AccountName
Data/AccountName
principal.user.userid
ClientName
Data/ClientName
principal.hostname
principal.asset.hostname
ClientAddress
Data/ClientAddress
principal.ip
Hostname
Computer
target.asset.hostname
target.hostname
LogonID
Data/LogonID
additional.fields.key
additional.fields.value_string
Event ID 4779
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SessionName
Data/SessionName
network.session_id
AccountDomain
Data/AccountDomain
principal.administrative_domain
AccountName
Data/AccountName
principal.user.userid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
ClientAddress
Data/ClientAddress
target.ip
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
LogonID
Data/LogonID
additional.fields.key
additional.fields.value_string
Event ID 4780
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
Event ID 4781
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
OldTargetUserName
Data/OldTargetUserName
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
PrivilegeList
target.user.attribute.permissions.name (repeated)
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
NewTargetUserName
Data/NewTargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
Event ID 4782
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4783
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4784
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4785
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
MembershipExpirationTime
Data/MembershipExpirationTime
additional.fields.key
additional.fields.value_string
Event ID 4786
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4787
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4788
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
MemberName
Data/MemberName
target.user.user_display_name
MemberSid
Data/MemberSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4789
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4790
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4791
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SamAccountName
Data/SamAccountName
target.group.attribute.labels.key
target.group.attribute.labels.value
SidHistory
Data/SidHistory
additional.fields.key
additional.fields.value_string
Event ID 4792
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
PrivilegeList
Data/PrivilegeList
target.group.attribute.permissions.name
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4793
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Status
Data/Status
security_result.summary
Workstation
Data/Workstation
The Workstation field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the Workstation log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the Workstation log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the Workstation log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the Workstation log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original Workstation log field value is added to additional.fields.key and additional.fields.value.string_value.
TargetUserName
Data/TargetUserName
target.user.userid
Event ID 4794
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
target.resource.resource_type = SETTING
target.resource.name = "Directory Services Restore Mode administrator password"
Set security_result.action to ALLOW if Status contains "0x0"; otherwise, set it to FAIL.
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
Workstation
Data/Workstation
The Workstation field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the Workstation log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the Workstation log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the Workstation log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the Workstation log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original Workstation log field value is added to additional.fields.key and additional.fields.value.string_value.
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Status
Data/Status
security_result.description
Format:
Status - Description
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4797
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
Workstation
Data/Workstation
The Workstation field is mapped to UDM fields based on its format. The following checks are performed in order:
1. If the Workstation log field value matches the pattern ^principal_ip:principal_port$, the extracted principal_ip is mapped to principal.ip and the optional principal_port to principal.port.
2. Else, if the Workstation log field value matches the pattern principal_hostname\domain_name, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
3. Else, if the Workstation log field value matches the pattern domain_name\principal_hostname, the extracted principal_hostname is mapped to principal.hostname. The extracted domain_name is mapped to principal.asset.network_domain if SubjectDomainName is present, otherwise it's mapped to principal.administrative_domain.
4. Else, if the Workstation log field value matches the pattern ^principal_hostname$, the extracted principal_hostname is mapped to principal.hostname.
5. If none of the above patterns match, the original Workstation log field value is added to additional.fields.key and additional.fields.value.string_value.
TargetUserName
Data/TargetUserName
target.user.userid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4798
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
CallerProcessName
Data/CallerProcessName
principal.process.file.full_path
CallerProcessId
Data/CallerProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.userid
Event ID 4799
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
CallerProcessName
Data/CallerProcessName
principal.process.file.full_path
CallerProcessId
Data/CallerProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
Event ID 4800
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
TargetDomainName
Data/TargetDomainName
principal.administrative_domain
TargetUserName
Data/TargetUserName
principal.user.userid
SessionID
about.labels.key
about.labels.value
TargetUserSid
Data/TargetUserSid
principal.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4801
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
TargetDomainName
Data/TargetDomainName
principal.administrative_domain
TargetUserName
Data/TargetUserName
principal.user.userid
SessionID
about.labels.key
about.labels.value
TargetUserSid
Data/TargetUserSid
principal.user.windows_sid
TargetLogonId
Data/TargetLogonId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 4816
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
PeerName
Data/PeerName
target.ip
ProtocolSequence
Data/ProtocolSequence
additional.fields.key
additional.fields.value.string_value
SecurityError
Data/SecurityError
security_result.detection_fields.key/value
param1
additional.additional.fields.key
additional.fields.value.string_value
param2
additional.additional.fields.key
additional.fields.value.string_value
param3
additional.additional.fields.key
additional.fields.value.string_value
Event ID 4817
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = "SETTING"
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
OldSd
Data/OldSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSd
Data/NewSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectName
Data/ObjectName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ObjectServer
Data/ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectType
Data/ObjectType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4818
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
AccessReason
Data/AccessReason
security_result.description
ObjectName
Data/ObjectName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ObjectServer
Data/ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectType
Data/ObjectType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HandleId
Data/HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
StagingReason
Data/StagingReason
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4819
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ObjectServer
Data/ObjectServer
additional.fields.key
additional.fields.value_string
ObjectType
Data/ObjectType
additional.fields.key
additional.fields.value_string
AddedCAPs
Data/AddedCAPs
security_result.detection_fields.key
security_result.detection_fields.value
DeletedCAPs
Data/DeletedCAPs
security_result.detection_fields.key
security_result.detection_fields.value
ModifiedCAPs
Data/ModifiedCAPs
security_result.detection_fields.key
security_result.detection_fields.value
AsIsCAPs
Data/AsIsCAPs
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4820
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = BLOCK
DeviceName
Data/DeviceName
principal.hostname
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
ServiceSid
Data/ServiceSid
additional.fields.key
additional.fields.value_string
TicketOptions
Data/TicketOptions
additional.fields.key
additional.fields.value_string
Status
Data/Status
additional.fields.key
additional.fields.value_string
TicketEncryptionType
Data/TicketEncryptionType
additional.fields.key
additional.fields.value_string
PreAuthType
Data/PreAuthType
additional.fields.key
additional.fields.value_string
CertIssuerName
Data/CertIssuerName
security_result.detection_fields.key
security_result.detection_fields.value
CertSerialNumber
Data/CertSerialNumber
security_result.detection_fields.key
security_result.detection_fields.value
CertThumbprint
Data/CertThumbprint
security_result.detection_fields.key
security_result.detection_fields.value
SiloName
Data/SiloName
security_result.detection_fields.key
security_result.detection_fields.value
PolicyName
Data/PolicyName
security_result.detection_fields.key
security_result.detection_fields.value
TGT Lifetime
Data/TGT Lifetime
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4821
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = BLOCK
DeviceName
Data/DeviceName
principal.hostname
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
TargetDomainName
Data/TargetDomainName
target.administrative_domain
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.user.userid
ServiceSid
Data/ServiceSid
additional.fields.key
additional.fields.value_string
TicketOptions
Data/TicketOptions
additional.fields.key
additional.fields.value_string
TicketEncryptionType
Data/TicketEncryptionType
additional.fields.key
additional.fields.value_string
LogonGuid
Data/LogonGuid
additional.fields.key
additional.fields.value_string
TransitedServices
Data/TransitedServices
additional.fields.key
additional.fields.value_string
SiloName
Data/SiloName
security_result.detection_fields.key
security_result.detection_fields.value
PolicyName
Data/PolicyName
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4822
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
security_result.action = FAIL
DeviceName
Data/DeviceName
principal.hostname
AccountName
Data/AccountName
principal.user.userid
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 4823
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
security_result.action = FAIL
DeviceName
Data/DeviceName
principal.hostname
AccountName
Data/AccountName
principal.user.userid
Status
Data/Status
additional.fields.key
additional.fields.value_string
SiloName
Data/SiloName
security_result.detection_fields.key
security_result.detection_fields.value
PolicyName
Data/PolicyName
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4824
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
security_result.action = FAIL
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
ServiceName
Data/ServiceName
target.application
TargetUserName
Data/TargetUserName
target.group.group_display_name
TargetSid
Data/TargetSid
target.group.windows_sid
TicketOptions
Data/TicketOptions
additional.fields.key
additional.fields.value_string
Status
Data/Status
additional.fields.key
additional.fields.value_string
TicketEncryptionType
Data/TicketEncryptionType
additional.fields.key
additional.fields.value_string
PreAuthType
Data/PreAuthType
additional.fields.key
additional.fields.value_string
CertIssuerName
Data/CertIssuerName
security_result.detection_fields.key
security_result.detection_fields.value
CertSerialNumber
Data/CertSerialNumber
security_result.detection_fields.key
security_result.detection_fields.value
CertThumbprint
Data/CertThumbprint
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4825
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
AccountDomain
Data/AccountDomain
principal.administrative_domain
ClientAddress
Data/ClientAddress
principal.ip
AccountName
Data/AccountName
principal.user.userid
LogonID
Data/LogonID
additional.fields.key
additional.fields.value_string
Event ID 4826
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
LoadOptions
principal.labels.key/value
AdvancedOptions
principal.labels.key/value
ConfigAccessPolicy
principal.labels.key/value
RemoteEventLogging
principal.labels.key/value
KernelDebug
principal.labels.key/value
VsmLaunchType
principal.labels.key/value
TestSigning
principal.labels.key/value
FlightSigning
principal.labels.key/value
DisableIntegrityChecks
principal.labels.key/value
HypervisorLoadOptions
principal.labels.key/value
HypervisorLaunchType
principal.labels.key/value
HypervisorDebug
principal.labels.key/value
Event ID 4830
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetSid
Data/TargetSid
target.user.windows_sid
SourceUserName
Data/SourceUserName
additional.fields.key
additional.fields.value_string
SourceSid
Data/SourceSid
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
PrivilegeList
Data/PrivilegeList
target.user.attribute.permissions.name
SidList
Data/SidList
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4864
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
CollisionTargetType
Data/CollisionTargetType
additional.fields.key
additional.fields.value_string
CollisionTargetName
Data/CollisionTargetName
additional.fields.key
additional.fields.value_string
ForestRoot
Data/ForestRoot
target.resource.name
TopLevelName
Data/TopLevelName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainSid
Data/DomainSid
target.user.windows_sid
Flags
Data/Flags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4865
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels[Operation ID]
EntryType
Data/EntryType
target.resource.attribute.labels[Entry Type]
Flags
Data/Flags
target.resource.attribute.labels[Flags]
TopLevelName
Data/TopLevelName
target.resource.attribute.labels[Top Level Name]
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels[NetBIOS Name]
DomainSid
Data/DomainSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels[SubjectLogonId]
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
EntryType
Data/EntryType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Flags
Data/Flags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TopLevelName
Data/TopLevelName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainSid
Data/DomainSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4866
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels[Operation ID]
EntryType
Data/EntryType
target.resource.attribute.labels[Entry Type]
Flags
Data/Flags
target.resource.attribute.labels[Flags]
TopLevelName
Data/TopLevelName
target.resource.attribute.labels[Top Level Name]
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels[NetBIOS Name]
DomainSid
Data/DomainSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels[SubjectLogonId]
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
EntryType
Data/EntryType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Flags
Data/Flags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TopLevelName
Data/TopLevelName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainSid
Data/DomainSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4867
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels[Operation ID]
EntryType
Data/EntryType
target.resource.attribute.labels[Entry Type]
Flags
Data/Flags
target.resource.attribute.labels[Flags]
TopLevelName
Data/TopLevelName
target.resource.attribute.labels[Top Level Name]
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels[NetBIOS Name]
DomainSid
Data/DomainSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels[SubjectLogonId]
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ForestRoot
Data/ForestRoot
target.resource.name
ForestRootSid
Data/ForestRootSid
target.resource.product_object_id
OperationId
Data/OperationId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
EntryType
Data/EntryType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Flags
Data/Flags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TopLevelName
Data/TopLevelName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DnsName
Data/DnsName
target.hostname
NetbiosName
Data/NetbiosName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DomainSid
Data/DomainSid
target.user.windows_sid
Event ID 4868
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4869
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4870
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RevocationReason
Data/RevocationReason
security_result.description
CertificateSerialNumber
Data/CertificateSerialNumber
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4871
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
NextUpdate
Data/NextUpdate
additional.fields.key
additional.fields.value_string
NextPublishForBaseCRL
Data/NextPublishForBaseCRL
additional.fields.key
additional.fields.value_string
NextPublishForDeltaCRL
Data/NextPublishForDeltaCRL
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4872
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
PublishURLs
Data/PublishURLs
target.file.full_path
IsBaseCRL
Data/IsBaseCRL
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CRLNumber
Data/CRLNumber
target.resource.attribute.labels.key
target.resource.attribute.labels.value
KeyContainer
Data/KeyContainer
target.resource.name
NextPublish
Data/NextPublish
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4873
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ExtensionName
target.resource.name
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
ExtensionDataType
Data/ExtensionDataType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ExtensionPolicyFlags
Data/ExtensionPolicyFlags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ExtensionData
Data/ExtensionData
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4874
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
Attributes
Data/Attributes
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4875
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4876
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
BackupType
Data/BackupType
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4877
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4878
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 4879
Provider: Microsoft-Windows-MSDTC Client 2
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
param1
Data/param1
security_result.summary
Format:
Error Code: %{value}
SourceName
Not available
target.application
param2
Data/param2
target.hostname
Category
Data/Category
security_result.category_details
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 4880
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
CertificateDatabaseHash
Data/CertificateDatabaseHash
security_result.detection_fields.key
security_result.detection_fields.value
PrivateKeyUsageCount
Data/PrivateKeyUsageCount
security_result.detection_fields.key
security_result.detection_fields.value
CACertificateHash
Data/CACertificateHash
security_result.detection_fields.key
security_result.detection_fields.value
CAPublicKeyHash
Data/CAPublicKeyHash
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4881
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
CertificateDatabaseHash
Data/CertificateDatabaseHash
security_result.detection_fields.key
security_result.detection_fields.value
PrivateKeyUsageCount
Data/PrivateKeyUsageCount
security_result.detection_fields.key
security_result.detection_fields.value
CACertificateHash
Data/CACertificateHash
security_result.detection_fields.key
security_result.detection_fields.value
CAPublicKeyHash
Data/CAPublicKeyHash
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4882
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_PERMISSIONS_CHANGE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SecuritySettings
Data/SecuritySettings
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4883
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4884
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Certificate
Data/Certificate
security_result.detection_fields.key
security_result.detection_fields.value
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4885
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
AuditFilter
Data/AuditFilter
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4886
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
RequestId
Data/RequestId
additional.fields.key
additional.fields.value.string_value
Requester
Data/Requester
additional.fields.key
additional.fields.value.string_value
Attributes
Data/Attributes
additional.fields.key
additional.fields.value.string_value
Event ID 4887
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
RequestId
Data/RequestId
additional.fields.key
additional.fields.value.string_value
Requester
Data/Requester
additional.fields.key
additional.fields.value.string_value
Attributes
Data/Attributes
additional.fields.key
additional.fields.value.string_value
Disposition
Data/Disposition
additional.fields.key
additional.fields.value.string_value
SubjectKeyIdentifier
Data/SubjectKeyIdentifier
additional.fields.key
additional.fields.value.string_value
Subject
Data/Subject
additional.fields.key
additional.fields.value.string_value
Event ID 4888
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
Requester
Data/Requester
additional.fields.key
additional.fields.value_string
Attributes
Data/Attributes
additional.fields.key
additional.fields.value_string
Disposition
Data/Disposition
additional.fields.key
additional.fields.value_string
SubjectKeyIdentifier
Data/SubjectKeyIdentifier
additional.fields.key
additional.fields.value_string
Subject
Data/Subject
additional.fields.key
additional.fields.value_string
Event ID 4889
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
Requester
Data/Requester
additional.fields.key
additional.fields.value_string
Attributes
Data/Attributes
additional.fields.key
additional.fields.value_string
Disposition
Data/Disposition
additional.fields.key
additional.fields.value_string
SubjectKeyIdentifier
Data/SubjectKeyIdentifier
additional.fields.key
additional.fields.value_string
Subject
Data/Subject
additional.fields.key
additional.fields.value_string
Event ID 4890
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
EnableRestrictedPermissions
Data/EnableRestrictedPermissions
additional.fields.key
additional.fields.value_string
RestrictedPermissions
Data/RestrictedPermissions
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4891
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Node
Data/Node
target.resource.name
Entry
Data/Entry
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Value
Data/Value
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4892
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
PropertyName
Data/PropertyName
target.resource.name
PropertyIndex
Data/PropertyIndex
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PropertyType
Data/PropertyType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PropertyValue
Data/PropertyValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4893
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
Requester
Data/Requester
principal.user.userid
KRAHashes
Data/KRAHashes
additional.fields.key
additional.fields.value_string
Event ID 4894
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
RequestId
Data/RequestId
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4895
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
CertificateHash
Data/CertificateHash
If the CertificateHash log field value matches the regular expression pattern ^[a-f0-9]{32}$, then the CertificateHash log field is mapped to the network.tls.client.certificate.md5 UDM field.
If the CertificateHash log field value matches the regular expression pattern ^[a-f0-9]{64}$, then the CertificateHash log field is mapped to the network.tls.client.certificate.sha256 UDM field.
If the CertificateHash log field value matches the regular expression pattern ^[a-f0-9]{40}$, then the CertificateHash log field is mapped to the network.tls.client.certificate.sha1 UDM field.
ValidFrom
Data/ValidFrom
network.tls.client.certificate.not_before
ValidTo
Data/ValidTo
network.tls.client.certificate.not_after
Event ID 4896
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TableId
Data/TableId
target.resource.product_object_id
target.resource.resource_type = DATABASE
Filter
Data/Filter
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RowsDeleted
Data/RowsDeleted
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 4897
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
RoleSeparationEnabled
Data/RoleSeparationEnabled
target.resource.name = "Role separation enabled: %{RoleSeparationEnabled}"
Event ID 4898
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
TemplateInternalName
Data/TemplateInternalName
target.resource.name
Event ID 4899
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
TemplateInternalName
Data/TemplateInternalName
target.resource.name
TemplateOID
target.resource.product_object_id
TemplateVersion
Data/TemplateVersion
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TemplateSchemaVersion
Data/TemplateSchemaVersion
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TemplateDSObjectFQDN
Data/TemplateDSObjectFQDN
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DCDNSName
Data/DCDNSName
about.hostname
NewTemplateContent
Data/NewTemplateContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldTemplateContent
Data/OldTemplateContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4900
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
TemplateInternalName
Data/TemplateInternalName
target.resource.name
TemplateOID
target.resource.product_object_id
TemplateVersion
Data/TemplateVersion
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TemplateSchemaVersion
Data/TemplateSchemaVersion
target.resource.attribute.labels.key
target.resource.attribute.labels.value
TemplateDSObjectFQDN
Data/TemplateDSObjectFQDN
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DCDNSName
Data/DCDNSName
about.hostname
NewTemplateContent
Data/NewTemplateContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSecurityDescriptor
Data/NewSecurityDescriptor
security_result.detection_fields.key
security_result.detection_fields.value
OldTemplateContent
Data/OldTemplateContent
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldSecurityDescriptor
Data/OldSecurityDescriptor
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4902
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_CREATION
target.resource.resource_type = SETTING
security_result.action = ALLOW
PuaCount
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PuaPolicyId
Data/PuaPolicyId
target.resource.product_object_id
Event ID 4904
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
AuditSourceName
target.application
EventSourceId
target.labels.key
target.labels.value
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4905
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
AuditSourceName
target.application
EventSourceId
target.labels.key
target.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Event ID 4906
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
CrashOnAuditFailValue
Data/CrashOnAuditFailValue
security_result.summary
Event ID 4907
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
FILE_MODIFICATION (ObjectType = File, SymbolicLink)
REGISTRY_MODIFICATION (ObjectType = Key)
PROCESS_UNCATEGORIZED (ObjectType = Process)
USER_RESOURCE_UPDATE_PERMISSIONS (ObjectType = all other)
security_result.action = ALLOW_WITH_MODIFICATION
ObjectName
Data/ObjectName
Object Type | UDM Field
--------------------------+------------------------------------
File, SymbolicLink | target.file.full_path
Key | target.registry.registry_key
Process | target.process.file.full_path
Event | target.resource.name
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectType
target.resource.resource_subtype
ProcessName
Data/ProcessName
target.process.command_line
ObjectServer
target.labels.key
target.labels.value
ProcessId
Data/ProcessId
target.process.pid
NewSd
Data/NewSd
target.resource.attribute.labels.key = "NewSd" value in target.resource.attribute.labels.value
OldSd
Data/OldSd
target.resource.attribute.labels.key = "OldSd" value in target.resource.attribute.labels.value
HandleId
target.labels.key/value
Event ID 4908
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SidList
Data/SidList
target.user.group_identifiers
Event ID 4909
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
OldBlockedOrdinals
Data/OldBlockedOrdinals
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewBlockedOrdinals
Data/NewBlockedOrdinals
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4910
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
OldIgnoreDefaultSettings
Data/OldIgnoreDefaultSettings
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewIgnoreDefaultSettings
Data/NewIgnoreDefaultSettings
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldIgnoreLocalSettings
Data/OldIgnoreLocalSettings
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewIgnoreLocalSettings
Data/NewIgnoreLocalSettings
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldBlockedOrdinals
Data/OldBlockedOrdinals
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewBlockedOrdinals
Data/NewBlockedOrdinals
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4911
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
HandleId
target.labels.key/value
ObjectType
target.resource.resource_subtype
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectServer
target.labels.key
target.labels.value
OldSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectName
Data/ObjectName
target.resource.name
Event ID 4912
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
CategoryId
Data/CategoryId
security_result.category_details
SubcategoryId
Data/SubcategoryId
security_result.category_details
SubcategoryGuid
Data/SubcategoryGuid
security_result.detection_fields.key
security_result.detection_fields.value
AuditPolicyChanges
Data/AuditPolicyChanges
security_result.description
Event ID 4913
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectName
Data/ObjectName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ObjectServer
Data/ObjectServer
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectType
Data/ObjectType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HandleId
Data/HandleId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldSd
Data/OldSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSd
Data/NewSd
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 4928
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW if StatusCode contains "0"; otherwise, set it to FAIL
SourceAddr
Data/SourceAddr
target.ip or target.hostname
If SourceAddr field value not in IP form then it map to target.hostname
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
additional.fields.key
additional.fields.value_string
SourceDRA
Data/SourceDRA
additional.fields.key
additional.fields.value_string
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
Event ID 4929
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW if StatusCode contains "0"; otherwise, set it to FAIL
SourceAddr
Data/SourceAddr
target.ip or target.hostname
If SourceAddr field value not in IP form then map to target.hostname
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
additional.fields.key
additional.fields.value_string
SourceDRA
Data/SourceDRA
additional.fields.key
additional.fields.value_string
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
Event ID 4930
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW_WITH_MODIFICATION if StatusCode contains "0"; otherwise, set it to FAIL
SourceAddr
Data/SourceAddr
target.ip or target.hostname
If SourceAddr field value not in IP form then it map to target.hostname
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
additional.fields.key
additional.fields.value_string
SourceDRA
Data/SourceDRA
additional.fields.key
additional.fields.value_string
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
Event ID 4931
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW_WITH_MODIFICATION if StatusCode contains "0"; otherwise, set it to FAIL
SourceAddr
Data/SourceAddr
target.ip or target.hostname
If SourceAddr field value not in IP form then it map to target.hostname
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
additional.fields.key
additional.fields.value_string
SourceDRA
Data/SourceDRA
additional.fields.key
additional.fields.value_string
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
Event ID 4932
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
DestinationDRA
Data/DestinationDRA
target.resource.name
SourceDRA
Data/SourceDRA
src.resource.name
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
SessionID
Data/SessionID
network.session_id
StartUSN
Data/StartUSN
additional.fields.key
additional.fields.value_string
Event ID 4933
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Set security_result.action to ALLOW if StatusCode contains "0"; otherwise, set it to FAIL
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
target.resource.name
SourceDRA
Data/SourceDRA
src.resource.name
NamingContext
Data/NamingContext
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
SessionID
Data/SessionID
network.session_id
EndUSN
Data/EndUSN
additional.fields.key
additional.fields.value_string
Event ID 4934
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
NewValue
target.registry.registry_value_data
SessionID
Data/SessionID
network.session_id
Object
Data/Object
additional.fields.key
additional.fields.value_string
Attribute
Data/Attribute
additional.fields.key
additional.fields.value_string
TypeOfChange
Data/TypeOfChange
additional.fields.key
additional.fields.value_string
USN
Data/USN
additional.fields.key
additional.fields.value_string
StatusCode
Data/StatusCode
security_result.summary
Format:
StatusCode: %{StatusCode}
Event ID 4935
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ReplicationEvent
Data/ReplicationEvent
additional.fields.key
additional.fields.value_string
AuditStatusCode
Data/AuditStatusCode
additional.fields.key
additional.fields.value_string
Event ID 4936
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ReplicationEvent
Data/ReplicationEvent
additional.fields.key
additional.fields.value_string
AuditStatusCode
Data/AuditStatusCode
additional.fields.key
additional.fields.value_string
ReplicationStatusCode
Data/ReplicationStatusCode
additional.fields.key
additional.fields.value_string
Event ID 4937
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
StatusCode
Data/StatusCode
security_result.summary is set to StatusCode: %{StatusCode}
DestinationDRA
Data/DestinationDRA
target.resource.name
SourceDRA
Data/SourceDRA
src.resource.name
Object
Data/Object
additional.fields.key
additional.fields.value_string
Options
Data/Options
additional.fields.key
additional.fields.value_string
Event ID 4944
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
GroupPolicyApplied
about.labels.key/value
Profile
about.labels.key/value
OperationMode
about.labels.key/value
RemoteAdminEnabled
about.labels.key/value
MulticastFlowsEnabled
about.labels.key/value
LogDroppedPacketsEnabled
about.labels.key/value
LogSuccessfulConnectionsEnabled
about.labels.key/value
Event ID 4945
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.resource.resource_type = "FIREWALL_RULE"
security_result.action = ALLOW
ProfileUsed
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RuleId
Data/RuleId
target.resource.product_object_id
RuleName
Data/RuleName
target.resource.name
Event ID 4946
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RuleName
Data/RuleName
target.resource.name
RuleId
Data/RuleId
target.resource.product_object_id
Event ID 4947
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
ProfileUsed
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RuleId
Data/RuleId
target.resource.product_object_id
RuleName
Data/RuleName
target.resource.name
Event ID 4948
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_DELETION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RuleId
Data/RuleId
target.resource.product_object_id
RuleName
Data/RuleName
target.resource.name
Event ID 4949
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
Event ID 4950
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SettingValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SettingType
Data/SettingType
target.resource.name
Event ID 4951
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
Data/RuleId
security_result.rule_id
RuleName
Data/RuleName
security_result.rule_name
Profile
Data/Profile
additional.fields.key
additional.fields.value_string
Event ID 4952
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
Data/RuleId
security_result.rule_id
RuleName
Data/RuleName
security_result.rule_name
Profile
Data/Profile
additional.fields.key
additional.fields.value_string
Event ID 4953
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ReasonForRejection
Data/ReasonForRejection
security_result.description
RuleId
Data/RuleId
security_result.rule_id
RuleName
Data/RuleName
security_result.rule_name
Profile
Data/Profile
additional.fields.key
additional.fields.value_string
Event ID 4954
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
Event ID 4956
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
ActiveProfile
target.labels.key
target.labels.value
Event ID 4957
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
Data/RuleId
security_result.rule_id
RuleName
Data/RuleName
security_result.rule_name
RuleAttr
Data/RuleAttr
security_result.summary
Event ID 4958
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Reason
Data/Reason
security_result.description
RuleId
Data/RuleId
security_result.rule_id
RuleName
Data/RuleName
security_result.rule_name
Error
Data/Error
security_result.summary
Event ID 4960
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RemoteAddress
Data/RemoteAddress
target.ip
SPI
Data/SPI
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4961
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RemoteAddress
Data/RemoteAddress
target.ip
SPI
Data/SPI
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4962
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RemoteAddress
Data/RemoteAddress
target.ip
SPI
Data/SPI
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4963
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RemoteAddress
Data/RemoteAddress
target.ip
SPI
Data/SPI
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4964
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetDomainName
Data/TargetDomainName
target.administrative_domain
TargetUserName
Data/TargetUserName
target.user.userid
TargetUserSid
Data/TargetUserSid
target.user.windows_sid
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
LogonGuid
Data/LogonGuid
additional.fields.key
additional.fields.value_string
TargetLogonGuid
Data/TargetLogonGuid
additional.fields.key
additional.fields.value_string
SidList
Data/SidList
target.user.group_identifiers
Event ID 4965
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RemoteAddress
Data/RemoteAddress
target.ip
SPI
Data/SPI
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 4976
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
LocalAddress
Data/LocalAddress
principal.ip
RemoteAddress
Data/RemoteAddress
target.ip
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
Event ID 4977
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
LocalAddress
Data/LocalAddress
principal.ip
RemoteAddress
Data/RemoteAddress
target.ip
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
Event ID 4978
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
LocalAddress
Data/LocalAddress
principal.ip
RemoteAddress
Data/RemoteAddress
target.ip
KeyModName
Data/KeyModName
additional.fields.key
additional.fields.value_string
Event ID 4979
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
LocalEMPrincipalName
Data/LocalEMPrincipalName
about.hostname
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
about.hostname
EMAuthMethod
Data/EMAuthMethod
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4980
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
MMAuthMethod
Data/MMAuthMethod
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
LocalEMPrincipalName
Data/LocalEMPrincipalName
about.hostname
LocalEMCertHash
Data/LocalEMCertHash
additional.fields.key
additional.fields.value_string
LocalEMIssuingCA
Data/LocalEMIssuingCA
additional.fields.key
additional.fields.value_string
LocalEMRootCA
Data/LocalEMRootCA
additional.fields.key
additional.fields.value_string
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
about.hostname
RemoteEMCertHash
Data/RemoteEMCertHash
additional.fields.key
additional.fields.value_string
RemoteEMIssuingCA
Data/RemoteEMIssuingCA
additional.fields.key
additional.fields.value_string
RemoteEMRootCA
Data/RemoteEMRootCA
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4981
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalMMCertHash
Data/LocalMMCertHash
additional.fields.key
additional.fields.value_string
LocalMMIssuingCA
Data/LocalMMIssuingCA
network.tls.client.certificate.issuer
LocalMMRootCA
Data/LocalMMRootCA
additional.fields.key
additional.fields.value_string
RemoteMMCertHash
Data/RemoteMMCertHash
additional.fields.key
additional.fields.value_string
RemoteMMIssuingCA
Data/RemoteMMIssuingCA
network.tls.server.certificate.issuer
RemoteMMRootCA
Data/RemoteMMRootCA
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
LocalEMPrincipalName
Data/LocalEMPrincipalName
about.hostname
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
about.hostname
EMAuthMethod
Data/EMAuthMethod
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4982
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = ALLOW
LocalMMPrincipalName
Data/LocalMMPrincipalName
principal.hostname
LocalKeyModPort
Data/LocalKeyModPort
principal.port
RemoteMMPrincipalName
Data/RemoteMMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalMMCertHash
Data/LocalMMCertHash
additional.fields.key
additional.fields.value_string
LocalMMIssuingCA
Data/LocalMMIssuingCA
network.tls.client.certificate.issuer
LocalMMRootCA
Data/LocalMMRootCA
additional.fields.key
additional.fields.value_string
RemoteMMCertHash
Data/RemoteMMCertHash
additional.fields.key
additional.fields.value_string
RemoteMMIssuingCA
Data/RemoteMMIssuingCA
network.tls.server.certificate.issuer
RemoteMMRootCA
Data/RemoteMMRootCA
additional.fields.key
additional.fields.value_string
MMCipherAlg
Data/MMCipherAlg
additional.fields.key
additional.fields.value_string
MMIntegrityAlg
Data/MMIntegrityAlg
additional.fields.key
additional.fields.value_string
DHGroup
Data/DHGroup
additional.fields.key
additional.fields.value_string
MMLifetime
Data/MMLifetime
additional.fields.key
additional.fields.value_string
QMLimit
Data/QMLimit
additional.fields.key
additional.fields.value_string
Role
Data/Role
additional.fields.key
additional.fields.value_string
MMImpersonationState
Data/MMImpersonationState
additional.fields.key
additional.fields.value_string
MMFilterID
Data/MMFilterID
additional.fields.key
additional.fields.value_string
MMSAID
Data/MMSAID
additional.fields.key
additional.fields.value_string
LocalEMPrincipalName
Data/LocalEMPrincipalName
about.hostname
LocalEMCertHash
Data/LocalEMCertHash
additional.fields.key
additional.fields.value_string
LocalEMIssuingCA
Data/LocalEMIssuingCA
additional.fields.key
additional.fields.value_string
LocalEMRootCA
Data/LocalEMRootCA
additional.fields.key
additional.fields.value_string
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
about.hostname
RemoteEMCertHash
Data/RemoteEMCertHash
additional.fields.key
additional.fields.value_string
RemoteEMIssuingCA
Data/RemoteEMIssuingCA
additional.fields.key
additional.fields.value_string
RemoteEMRootCA
Data/RemoteEMRootCA
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4983
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = FAIL
LocalEMPrincipalName
Data/LocalEMPrincipalName
principal.hostname
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
FailureReason
Data/FailureReason
security_result.description
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
LocalEMCertHash
Data/LocalEMCertHash
additional.fields.key
additional.fields.value_string
LocalEMIssuingCA
Data/LocalEMIssuingCA
additional.fields.key
additional.fields.value_string
LocalEMRootCA
Data/LocalEMRootCA
additional.fields.key
additional.fields.value_string
RemoteEMCertHash
Data/RemoteEMCertHash
additional.fields.key
additional.fields.value_string
RemoteEMIssuingCA
Data/RemoteEMIssuingCA
additional.fields.key
additional.fields.value_string
RemoteEMRootCA
Data/RemoteEMRootCA
additional.fields.key
additional.fields.value_string
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
State
Data/State
security_result.detection_fields.key
security_result.detection_fields.value
Role
Data/Role
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4984
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = FAIL
LocalEMPrincipalName
Data/LocalEMPrincipalName
principal.hostname
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
LocalAddress
Data/LocalAddress
principal.ip
LocalKeyModPort
Data/LocalKeyModPort
principal.port
FailureReason
Data/FailureReason
security_result.description
RemoteEMPrincipalName
Data/RemoteEMPrincipalName
target.hostname
RemoteAddress
Data/RemoteAddress
target.ip
RemoteKeyModPort
Data/RemoteKeyModPort
target.port
FailurePoint
Data/FailurePoint
security_result.detection_fields.key
security_result.detection_fields.value
EMAuthMethod
Data/EMAuthMethod
additional.fields.key
additional.fields.value_string
State
Data/State
security_result.detection_fields.key
security_result.detection_fields.value
Role
Data/Role
additional.fields.key
additional.fields.value_string
EMImpersonationState
Data/EMImpersonationState
additional.fields.key
additional.fields.value_string
QMFilterID
Data/QMFilterID
additional.fields.key
additional.fields.value_string
Event ID 4985
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ProcessName
Data/ProcessName
principal.process.file.full_path
NewState
target.labels.key
target.labels.value
ResourceManager
target.labels.key
target.labels.value
TransactionId
target.labels.key
target.labels.value
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Event ID 5002
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 5005
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 5007
Provider: Microsoft Antimalware
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 5009
Provider: Microsoft-Windows-WAS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
AppPoolID
target.resource.name
ExitCode
additional.fields.key
additional.fields.value_string
Event ID 5016
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
CSEExtensionName
Data/CSEExtensionName
target.resource.name
CSEExtensionId
Data/CSEExtensionId
target.resource.product_object_id
CSEElaspedTimeInMilliSeconds
Data/CSEElaspedTimeInMilliSeconds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5017
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
OperationDescription
Data/OperationDescription
security_result.description
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
OperationElapsedTimeInMilliSeconds
Data/OperationElapsedTimeInMilliSeconds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Parameter
Data/Parameter
additional.fields.key
additional.fields.value_string
Event ID 5024
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5025
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5027
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
Event ID 5028
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
Event ID 5029
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
Event ID 5030
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
Event ID 5031
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
metadata.event_type = STATUS_UPDATE
and
security_result.action=BLOCK
Profiles
target.labels.key
target.labels.value
Application
Data/Application
target.application
Event ID 5032
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
and
security_result.action=BLOCK
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
Event ID 5033
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5034
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5035
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
ErrorCode
Data/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5037
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
ErrorCode
Data/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5038
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
security_result.action = FAIL
param1
Data/param1
target.file.full_path
Event ID 5039
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = REGISTRY_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ProcessName
Data/ProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
ObjectPath
Data/ObjectPath
principal.registry.registry_key
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectVirtualPath
Data/ObjectVirtualPath
target.registry.registry_key
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 5040
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
AuthenticationSetName
Data/AuthenticationSetName
target.resource.name
AuthenticationSetId
Data/AuthenticationSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5041
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
AuthenticationSetName
Data/AuthenticationSetName
target.resource.name
AuthenticationSetId
Data/AuthenticationSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5042
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
AuthenticationSetName
Data/AuthenticationSetName
target.resource.name
AuthenticationSetId
Data/AuthenticationSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5043
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
ConnectionSecurityRuleId
Data/ConnectionSecurityRuleId
security_result.rule_id
ConnectionSecurityRuleName
Data/ConnectionSecurityRuleName
security_result.rule_name
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5044
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
ConnectionSecurityRuleId
Data/ConnectionSecurityRuleId
security_result.rule_id
ConnectionSecurityRuleName
Data/ConnectionSecurityRuleName
security_result.rule_name
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5045
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
AuthenticationSetName
Data/AuthenticationSetName
target.resource.name
AuthenticationSetId
Data/AuthenticationSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5046
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
CryptographicSetName
Data/CryptographicSetName
target.resource.name
CryptographicSetId
Data/CryptographicSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5047
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
CryptographicSetName
Data/CryptographicSetName
target.resource.name
CryptographicSetId
Data/CryptographicSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5048
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
security_result.action = ALLOW_WITH_MODIFICATION
CryptographicSetName
Data/CryptographicSetName
target.resource.name
CryptographicSetId
Data/CryptographicSetId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5049
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_DELETION
security_result.action = ALLOW
IpSecSecurityAssociationName
Data/IpSecSecurityAssociationName
target.resource.name
IpSecSecurityAssociationId
Data/IpSecSecurityAssociationId
target.resource.product_object_id
ProfileChanged
Data/ProfileChanged
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5050
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "Windows Firewall"
security_result.action = BLOCK
CallerProcessName
Data/CallerProcessName
principal.process.command_line
ProcessId
Data/ProcessId
principal.process.pid
Publisher
Data/Publisher
additional.fields.key
additional.fields.value_string
Event ID 5051
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
FileName
Data/FileName
principal.file.full_path
ProcessName
Data/ProcessName
principal.process.file.full_path
ProcessId
Data/ProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
VirtualFileName
Data/VirtualFileName
target.file.full_path
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 5056
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Module
Data/Module
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5057
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_UNCATEGORIZED
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Reason
Data/Reason
security_result.description
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ProviderName
Data/ProviderName
additional.fields.key
additional.fields.value_string
AlgorithmName
Data/AlgorithmName
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5058
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
Set security_result.action to ALLOW if ReturnCode contains "0x0"; otherwise, set it to FAIL.
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
KeyUserPath
Data/KeyFilePath
target.file.full_path and security_result.about.file.full_path
KeyName
Data/KeyName
target.resource.name
ProviderName
Data/ProviderName
target.resource.attribute.labels.key/value
AlgorithmName
Data/AlgorithmName
target.resource.attribute.labels.key/value
KeyType
Data/KeyType
target.resource.attribute.labels.key/value
ReturnCode
Data/ReturnCode
target.labels.key/value
Operation
Data/Operation
target.resource.attribute.labels.key/value
version 1 /
NXLog field
Event Viewer field
UDM field
ClientProcessId
Data/ClientProcessId
principal.process.pid
ClientCreationTime
Data/ClientCreationTime
principal.labels.key/value
Event ID 5059
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
Set security_result.action to ALLOW if ReturnCode contains "0x0"; otherwise, set it to FAIL.
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ReturnCode
Data/ReturnCode
security_result.summary
Format:
Error Code - %{value}
KeyName
Data/KeyName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ProviderName
Data/ProviderName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AlgorithmName
Data/AlgorithmName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
KeyType
Data/KeyType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
version 1 /
NXLog field
Event Viewer field
UDM field
ClientProcessId
Data/ClientProcessId
target.process.pid
ClientCreationTime
Data/ClientCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5060
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_UNCATEGORIZED
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Reason
Data/Reason
security_result.description
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ProviderName
Data/ProviderName
additional.fields.key
additional.fields.value_string
AlgorithmName
Data/AlgorithmName
additional.fields.key
additional.fields.value_string
KeyName
Data/KeyName
additional.fields.key
additional.fields.value_string
KeyType
Data/KeyType
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5061
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
Set security_result.action to ALLOW if ReturnCode contains "0x0"; otherwise, set it to FAIL.
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
Operation
Data/Operation
security_result.description
ReturnCode
Data/ReturnCode
security_result.summary
Format:
Return Code - %{value}
KeyName
Data/KeyName
target.resource.name
AlgorithmName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
KeyName
target.resource.name
KeyType
target.resource.resource_subtype
Event ID 5062
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Module
Data/Module
target.resource.name
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5063
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ModuleName
Data/ModuleName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ProviderName
Data/ProviderName
additional.fields.key
additional.fields.value_string
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5064
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
additional.fields.key
additional.fields.value_string
ContextName
Data/ContextName
additional.fields.key
additional.fields.value_string
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5065
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.name
OldValue
Data/OldValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewValue
Data/NewValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5066
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.name
InterfaceId
Data/InterfaceId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
FunctionName
Data/FunctionName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Position
Data/Position
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5067
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
InterfaceId
Data/InterfaceId
target.resource.product_object_id
FunctionName
Data/FunctionName
target.resource.name
OldValue
Data/OldValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewValue
Data/NewValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5068
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
InterfaceId
Data/InterfaceId
target.resource.product_object_id
FunctionName
Data/FunctionName
target.resource.name
ProviderName
Data/ProviderName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Position
Data/Position
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5069
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
InterfaceId
Data/InterfaceId
target.resource.product_object_id
FunctionName
Data/FunctionName
target.resource.name
PropertyName
Data/PropertyName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Operation
Data/Operation
additional.fields.key
additional.fields.value_string
Value
Data/Value
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5070
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Scope
Data/Scope
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ContextName
Data/ContextName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
InterfaceId
Data/InterfaceId
target.resource.product_object_id
FunctionName
Data/FunctionName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PropertyName
Data/PropertyName
target.resource.name
OldValue
Data/OldValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewValue
Data/NewValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ReturnCode
Data/ReturnCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5071
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SecurityDescriptor
Data/SecurityDescriptor
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5074
Provider: Microsoft-Windows-WAS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_process_pid set to target.process.pid
AppPoolID
target.resource.name
Event ID 5077
Provider: Microsoft-Windows-WAS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_process_pid set to target.process.pid
AppPoolID
target.resource.name
Event ID 5116
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
GpsvcInitTimeElapsedInMilliseconds
Data/GpsvcInitTimeElapsedInMilliseconds
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5117
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
SessionTimeElapsedInMilliseconds
Data/SessionTimeElapsedInMilliseconds
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5120
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5121
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5122
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
CAConfigurationId
Data/CAConfigurationId
additional.fields.key
additional.fields.value_string
NewValue
Data/NewValue
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
NewValue
Data/NewValue
additional.fields.key
additional.fields.value_string
Event ID 5123
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
PropertyName
Data/PropertyName
target.resource.name
NewValue
Data/NewValue
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 5124
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
NewSecuritySettings
Data/NewSecuritySettings
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 5125
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
SerialNumber
Data/SerialNumber
network.tls.client.certificate.serial
CAName
Data/CAName
network.tls.client.certificate.issuer
Status
Data/Status
additional.fields.key
additional.fields.value_string
Event ID 5126
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsBackgroundProcessing
Data/IsBackgroundProcessing
security_result.rule_labels.key
security_result.rule_labels.value
IsAsyncProcessing
Data/IsAsyncProcessing
security_result.rule_labels.key
security_result.rule_labels.value
NumberOfGPOsDownloaded
Data/NumberOfGPOsDownloaded
security_result.rule_labels.key
security_result.rule_labels.value
NumberOfGPOsApplicable
Data/NumberOfGPOsApplicable
security_result.rule_labels.key
security_result.rule_labels.value
GPODownloadTimeElapsedInMilliseconds
Data/GPODownloadTimeElapsedInMilliseconds
security_result.rule_labels.key
security_result.rule_labels.value
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
security_result.action = ALLOW_WITH_MODIFICATION
CAConfigurationId
Data/CAConfigurationId
additional.fields.key
additional.fields.value_string
NewSigningCertificateHash
Data/NewSigningCertificateHash
additional.fields.key
additional.fields.value_string
Event ID 5127
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
security_result.action = ALLOW_WITH_MODIFICATION
CAConfigurationId
Data/CAConfigurationId
additional.fields.key
additional.fields.value_string
BaseCRLNumber
Data/BaseCRLNumber
additional.fields.key
additional.fields.value_string
BaseCRLThisUpdate
Data/BaseCRLThisUpdate
additional.fields.key
additional.fields.value_string
BaseCRLHash
Data/BaseCRLHash
additional.fields.key
additional.fields.value_string
DeltaCRLNumber
Data/DeltaCRLNumber
additional.fields.key
additional.fields.value_string
DeltaCRLIndicator
Data/DeltaCRLIndicator
additional.fields.key
additional.fields.value_string
DeltaCRLThisUpdate
Data/DeltaCRLThisUpdate
additional.fields.key
additional.fields.value_string
DeltaCRLHash
Data/DeltaCRLHash
additional.fields.key
additional.fields.value_string
Event ID 5136
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_MODIFICATION (ObjectClass="group")
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT (other ObjectClass)
security_result.action = ALLOW_WITH_MODIFICATION
ObjectGUID
Data/ObjectGUID
based on type of object class.
target.group.product_object_id (ObjectClass="group")
target.resource.product_object_id (other ObjectClass)
AttributeValue
Data/AttributeValue
If AttributeLDAPDisplayName is "member" then attribute_value set to target.user.user_display_name, else attribute_value set to target.resource.name
ObjectDN
Data/ObjectDN
If ObjectClass is "group" then object_name set to target.group.group_display_name
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
OperationType
about.labels.key
about.labels.value
DSName
target.administrative_domain
OpCorrelationID
about.labels.key/value
AppCorrelationID
about.labels.key/value
DSType
target.labels.key/value
ObjectClass
target.labels.key/value
AttributeLDAPDisplayName
about.labels.key/value
AttributeSyntaxOID
about.labels.key/value
Event ID 5137
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
DSName
Data/DSName
target.administrative_domain
DSType
Data/DSType
target.application
OpCorrelationID
about.labels.key/value
AppCorrelationID
about.labels.key/value
ObjectDN
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
ObjectClass
target.labels.key/value
Event ID 5138
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_CREATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
OpCorrelationID
Data/OpCorrelationID
additional.fields.key
additional.fields.value_string
AppCorrelationID
Data/AppCorrelationID
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DSName
Data/DSName
target.administrative_domain
DSType
Data/DSType
additional.fields.key
additional.fields.value_string
OldObjectDN
Data/OldObjectDN
additional.fields.key
additional.fields.value_string
NewObjectDN
Data/NewObjectDN
additional.fields.key
additional.fields.value_string
ObjectClass
Data/ObjectClass
additional.fields.key
additional.fields.value_string
Event ID 5139
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
OldObjectDN
Data/OldObjectDN
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
NewObjectDN
Data/NewObjectDN
additional.fields.key
additional.fields.value.string_value
If ObjectClass = "computer", object_name is set to target.hostname
If ObjectClass = "user", object_name is set to target.user.user_display_name.
If ObjectClass = "group", object_name is set to target.group.group_display_name.
ObjectClass
Data/ObjectClass
additional.fields.key
additional.fields.value.string_value
OpCorrelationID
Data/OpCorrelationID
additional.fields.key
additional.fields.value_string
AppCorrelationID
Data/AppCorrelationID
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DSName
Data/DSName
target.administrative_domain
DSType
Data/DSType
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-WAS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_process_pid set to target.process.pid
ProtocolID
network.application_protocol
AppPoolID
target.resource.name
param3
additional.fields.key
additional.fields.value_string
Event ID 5140
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ShareName
Data/ShareName
target.resource.name
Hostname
target.hostname
version 1 /
NXLog field
Event Viewer field
UDM field
ShareLocalPath
Data/ShareLocalPath
target.file.full_path
AccessList
Data/AccessList
target.resource.attribute.permissions.name
AccessMask
Data/AccessMask
principal.process.access_mask
Event ID 5141
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
additional.fields.key
additional.fields.value.string_value
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
ObjectClass
Data/ObjectClass
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
ObjectDN
Data/ObjectDN
If ObjectClass == "group" then
object_name is set to target.group.group_display_name
If ObjectClass = "computer", then
object_name is set to target.hostname
If ObjectClass = "user", then
object_name is set to target.user.user_display_name
else
ObjectDN is set to target.labels.key/value
ObjectClass is set to target.labels.key/value
ObjectDN is set to additional.fields.key and additional.fields.value.string_value
ObjectClass is set to additional.fields.key and additional.fields.value.string_value
ObjectDN
Data/ObjectDN
additional.fields.key
additional.fields.value.string_value
DSName
Data/DSName
target.administrative_domain
DSType
Data/DSType
target.application
OpCorrelationID
about.labels.key/value
AppCorrelationID
about.labels.key/value
TreeDelete
Data/TreeDelete
additional.fields.key
additional.fields.value_string
Event ID 5142
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ShareName
Data/ShareName
target.resource.name
Data/ShareLocalPath
target.file.full_path
Event ID 5143
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ShareLocalPath
Data/ShareLocalPath
target.file.full_path
ShareName
Data/ShareName
target.resource.name
OldRemark
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewRemark
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldMaxUsers
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewMaxUsers
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldShareFlags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewShareFlags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OldSD
target.resource.attribute.labels.key
target.resource.attribute.labels.value
NewSD
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectType
target.resource.resource_subtype
Event ID 5144
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_DELETION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ShareLocalPath
Data/ShareLocalPath
target.file.full_path
ShareName
Data/ShareName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Event ID 5145
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
IpAddress
Data/IpAddress
principal.ip
IpPort
Data/IpPort
principal.port
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
AccessReason
Data/AccessReason
security_result.description
ShareLocalPath
Data/ShareLocalPath
target.file.full_path
AccessList
Data/AccessList
target.resource.attribute.permissions.name
ShareName
Data/ShareName
target.resource.name
RelativeTargetName
Data/RelativeTargetName
target.file.names
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
AccessMask
Data/AccessMask
principal.process.access_mask
Event ID 5146
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = BLOCK
Direction
Data/Direction
network.direction
EtherType
Data/EtherType
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
SourcevSwitchPort
Data/SourcevSwitchPort
principal.port
DestAddress
Data/DestAddress
target.ip
DestinationvSwitchPort
Data/DestinationvSwitchPort
target.port
VlanTag
Data/VlanTag
security_result.detection_fields.key
security_result.detection_fields.value
vSwitch ID
Data/vSwitch ID
security_result.detection_fields.key
security_result.detection_fields.value
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
vSwitch ID
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5147
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = BLOCK
Direction
Data/Direction
network.direction
EtherType
Data/EtherType
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
DestAddress
Data/DestAddress
target.ip
VlanTag
Data/VlanTag
security_result.detection_fields.key
security_result.detection_fields.value
vSwitch ID
Data/vSwitch ID
security_result.detection_fields.key
security_result.detection_fields.value
SourcevSwitchPort
Data/SourcevSwitchPort
principal.port
DestinationvSwitchPort
Data/DestinationvSwitchPort
target.port
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5148
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.category=NETWORK_DENIAL_OF_SERVICE
security_result.action = BLOCK
Type
Data/Type
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5149
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Type
Data/Type
security_result.detection_fields.key
security_result.detection_fields.value
PacketsDiscarded
Data/PacketsDiscarded
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5150
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = BLOCK
Direction
Data/Direction
network.direction
EtherType
Data/EtherType
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
DestAddress
Data/DestAddress
target.ip
MediaType
Data/MediaType
security_result.detection_fields.key
security_result.detection_fields.value
InterfaceType
Data/InterfaceType
security_result.detection_fields.key
security_result.detection_fields.value
VlanTag
Data/VlanTag
security_result.detection_fields.key
security_result.detection_fields.value
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5151
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = BLOCK
Direction
Data/Direction
network.direction
EtherType
Data/EtherType
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
DestAddress
Data/DestAddress
target.ip
MediaType
Data/MediaType
security_result.detection_fields.key
security_result.detection_fields.value
InterfaceType
Data/InterfaceType
security_result.detection_fields.key
security_result.detection_fields.value
VlanTag
Data/VlanTag
security_result.detection_fields.key
security_result.detection_fields.value
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5152
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
security_result.action = BLOCK
Direction
Data/Direction
network.direction
Protocol
Data/Protocol
network.ip_protocol
Application
Data/Application
principal.application
SourceAddress
Data/SourceAddress
principal.ip
SourcePort
Data/SourcePort
principal.port
ProcessId
Data/ProcessId
principal.process.pid
FilterRTID
Data/FilterRTID
security_result.detection_fields.key/value
LayerName
Data/LayerName
security_result.detection_fields.key/value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key/value
DestAddress
Data/DestAddress
target.ip
DestPort
Data/DestPort
target.port
version 1 / Windows 11 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
FilterOrigin
Data/FilterOrigin
security_result.detection_fields.key/value
Event ID 5153
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
security_result.action = BLOCK
Direction
Data/Direction
network.direction
Protocol
Data/Protocol
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
SourcePort
Data/SourcePort
principal.port
ProcessId
Data/ProcessId
principal.process.pid
Application
Data/Application
target.application
FilterRTID
Data/FilterRTID
security_result.detection_fields.key/value
LayerName
Data/LayerName
security_result.detection_fields.key/value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key/value
DestAddress
Data/DestAddress
target.ip
DestPort
Data/DestPort
target.port
version 1 / Windows 11 and Windows Server 2022/
NXLog field
Event Viewer field
UDM field
FilterOrigin
Data/FilterOrigin
security_result.detection_fields.key/value
Event ID 5154
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Protocol
Data/Protocol
network.ip_protocol
FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Application
Data/Application
target.application
SourceAddress
Data/SourceAddress
target.ip
SourcePort
Data/SourcePort
target.port
ProcessId
Data/ProcessId
target.process.pid
Event ID 5155
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
Protocol
Data/Protocol
network.ip_protocol
SourceAddress
Data/SourceAddress
principal.ip
SourcePort
Data/SourcePort
principal.port
ProcessId
Data/ProcessId
principal.process.pid
Application
Data/Application
target.application
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5156
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
security_result.action = ALLOW
Direction
Data/Direction
network.direction
Protocol
Data/Protocol
network.ip_protocol
Application
Data/Application
principal.application
SourceAddress
Data/SourceAddress
principal.ip
SourcePort
Data/SourcePort
principal.port
ProcessId
Data/ProcessId
principal.process.pid
FilterRTID
Data/FilterRTID
security_result.detection_fields.key/value
LayerName
Data/LayerName
security_result.detection_fields.key/value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key/value
DestAddress
Data/DestAddress
target.ip
DestPort
Data/DestPort
target.port
version 1 /
NXLog field
Event Viewer field
UDM field
RemoteUserID
Data/RemoteUserID
target.user.userid
RemoteMachineID
Data/RemoteMachineID
target.user.windows_sid
Event ID 5157
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
security_result.action = BLOCK
Direction
Data/Direction
network.direction
Protocol
Data/Protocol
network.ip_protocol
Application
Data/Application
principal.application
SourceAddress
Data/SourceAddress
principal.ip
SourcePort
Data/SourcePort
principal.port
ProcessId
Data/ProcessId
principal.process.pid
DestAddress
Data/DestAddress
target.ip
DestPort
Data/DestPort
target.port
FilterRTID
Data/FilterRTID
security_result.detection_fields.key/value
LayerName
Data/LayerName
security_result.detection_fields.key/value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key/value
version 1 /
NXLog field
Event Viewer field
UDM field
FilterOrigin
Data/FilterOrigin
security_result.detection_fields.key/value
RemoteUserID
Data/RemoteUserID
target.user.userid
RemoteMachineID
Data/RemoteMachineID
target.user.windows_sid
version 3 /
NXLog field
Event Viewer field
UDM field
OriginalProfile
Data/OriginalProfile
security_result.detection_fields.key
security_result.detection_fields.value
CurrentProfile
Data/CurrentProfile
security_result.detection_fields.key
security_result.detection_fields.value
IsLoopback
Data/IsLoopback
security_result.detection_fields.key
security_result.detection_fields.value
HasRemoteDynamicKeywordAddress
Data/HasRemoteDynamicKeywordAddress
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5158
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Protocol
Data/Protocol
network.ip_protocol
FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Application
Data/Application
target.application
SourceAddress
Data/SourceAddress
target.ip
SourcePort
Data/SourcePort
target.port
ProcessId
Data/ProcessId
target.process.pid
Event ID 5159
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
Protocol
Data/Protocol
network.ip_protocol
Application
Data/Application
target.application
SourceAddress
Data/SourceAddress
target.ip
SourcePort
Data/SourcePort
target.port
ProcessId
Data/ProcessId
target.process.pid
FilterRTID
Data/FilterRTID
security_result.detection_fields.key
security_result.detection_fields.value
LayerName
Data/LayerName
security_result.detection_fields.key
security_result.detection_fields.value
LayerRTID
Data/LayerRTID
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5168
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
IpAddresses
Data/IpAddresses
target.ip
ErrorCode
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SpnName
Data/SpnName
target.resource.name
ServerNames
Data/ServerNames
additional.fields.key
additional.fields.value_string
ConfiguredNames
Data/ConfiguredNames
additional.fields.key
additional.fields.value_string
Event ID 5169
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DSName
Data/DSName
target.application
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
OpCorrelationID
Data/OpCorrelationID
additional.fields.key
additional.fields.value_string
AppCorrelationID
Data/AppCorrelationID
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DSType
Data/DSType
additional.fields.key
additional.fields.value_string
ObjectDN
Data/ObjectDN
target.resource.name
ObjectClass
Data/ObjectClass
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeLDAPDisplayName
Data/AttributeLDAPDisplayName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeSyntaxOID
Data/AttributeSyntaxOID
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeValue
Data/AttributeValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ExpirationTime
Data/ExpirationTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OperationType
Data/OperationType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5170
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DSName
Data/DSName
target.application
ObjectGUID
Data/ObjectGUID
target.resource.product_object_id
OpCorrelationID
Data/OpCorrelationID
additional.fields.key
additional.fields.value_string
AppCorrelationID
Data/AppCorrelationID
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
DSType
Data/DSType
additional.fields.key
additional.fields.value_string
ObjectDN
Data/ObjectDN
target.resource.name
ObjectClass
Data/ObjectClass
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeLDAPDisplayName
Data/AttributeLDAPDisplayName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeSyntaxOID
Data/AttributeSyntaxOID
target.resource.attribute.labels.key
target.resource.attribute.labels.value
AttributeValue
Data/AttributeValue
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ExpirationTime
Data/ExpirationTime
target.resource.attribute.labels.key
target.resource.attribute.labels.value
OperationType
Data/OperationType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5186
Provider: Microsoft-Windows-WAS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
AppPoolID
target.resource.name
Minutes
additional.fields.key
additional.fields.value_string
Event ID 5257
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
PolicyDownloadTimeElapsedInMilliseconds
Data/PolicyDownloadTimeElapsedInMilliseconds
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5308
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DCName
Data/DCName
target.administrative_domain
DCIPAddress
Data/DCIPAddress
target.ip
Event ID 5309
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
MachineRole
Data/MachineRole
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5310
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
PrincipalCNName
Data/PrincipalCNName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
DCDomainName
Data/DCDomainName
target.administrative_domain
DCName
Data/DCName
target.hostname
PrincipalDomainName
Data/PrincipalDomainName
additional.fields.key
additional.fields.value_string
Event ID 5311
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
PolicyProcessingMode
Data/PolicyProcessingMode
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5312
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DescriptionString
Data/DescriptionString
security_result.description
GPOInfoList
Data/GPOInfoList
target.resource.name
Event ID 5313
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
DescriptionString
Data/DescriptionString
security_result.description
GPOInfoList
Data/GPOInfoList
target.resource.name
Event ID 5314
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
LinkDescription
Data/LinkDescription
security_result.description
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
PolicyApplicationMode
Data/PolicyApplicationMode
target.resource.attribute.labels.key
target.resource.attribute.labels.value
BandwidthInkbps
Data/BandwidthInkbps
security_result.detection_fields.key
security_result.detection_fields.value
IsSlowLink
Data/IsSlowLink
security_result.detection_fields.key
security_result.detection_fields.value
ThresholdInkbps
Data/ThresholdInkbps
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5315
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
PrincipalSamName
Data/PrincipalSamName
target.hostname
NextPolicyApplicationTime
Data/NextPolicyApplicationTime
security_result.rule_labels.key
security_result.rule_labels.value
NextPolicyApplicationTimeUnit
Data/NextPolicyApplicationTimeUnit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5320
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
InfoDescription
Data/InfoDescription
security_result.description
Event ID 5321
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
InfoDescription
Data/InfoDescription
security_result.description
OperationParameter1
Data/OperationParameter1
target.resource.product_object_id
Event ID 5324
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
SessionId
Data/SessionId
network.session_id
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
NotificationType
Data/NotificationType
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5326
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
DCDiscoveryTimeInMilliSeconds
Data/DCDiscoveryTimeInMilliSeconds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5327
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
NetworkBandwidthInKbps
Data/NetworkBandwidthInKbps
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5340
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
PolicyApplicationMode
Data/PolicyApplicationMode
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5351
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
WinlogonReturnTimeElapsedInMilliseconds
Data/WinlogonReturnTimeElapsedInMilliseconds
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 5376
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
BackupFileName
Data/BackupFileName
target.file.full_path
ClientProcessId
Data/ClientProcessId
target.process.pid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5377
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
BackupFileName
Data/BackupFileName
target.file.full_path
ClientProcessId
Data/ClientProcessId
target.process.pid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5378
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
and
security_result.category=POLICY_VIOLATION
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
TargetServer
Data/TargetServer
target.hostname
UserUPN
Data/UserUPN
target.user.userid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Package
Data/Package
additional.fields.key
additional.fields.value_string
CredType
Data/CredType
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5379
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = RESOURCE_READ
target.resource.name = Credential Manager credentials
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClientProcessId
Data/ClientProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
TargetName
Data/TargetName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Type
Data/Type
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CountOfCredentialsReturned
Data/CountOfCredentialsReturned
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ReadOperation
Data/ReadOperation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ReturnCode
Data/ReturnCode
additional.fields.key
additional.fields.value_string
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5380
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClientProcessId
Data/ClientProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SearchString
Data/SearchString
additional.fields.key
additional.fields.value_string
SchemaFriendlyName
Data/SchemaFriendlyName
additional.fields.key
additional.fields.value_string
Schema
Data/Schema
additional.fields.key
additional.fields.value_string
CountOfCredentialsReturned
Data/CountOfCredentialsReturned
additional.fields.key
additional.fields.value_string
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5381
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClientProcessId
Data/ClientProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
Flags
Data/Flags
additional.fields.key
additional.fields.value_string
CountOfCredentialsReturned
Data/CountOfCredentialsReturned
additional.fields.key
additional.fields.value_string
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5382
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClientProcessId
Data/ClientProcessId
principal.process.pid
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
Resource
Data/Resource
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
SchemaFriendlyName
Data/SchemaFriendlyName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Schema
Data/Schema
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Identity
Data/Identity
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PackageSid
Data/PackageSid
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Flags
Data/Flags
additional.fields.key
additional.fields.value_string
ReturnCode
Data/ReturnCode
additional.fields.key
additional.fields.value_string
ProcessCreationTime
Data/ProcessCreationTime
additional.fields.key
additional.fields.value_string
Event ID 5440
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutKey
Data/CalloutKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutName
Data/CalloutName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutType
Data/CalloutType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutId
Data/CalloutId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerKey
Data/LayerKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerName
Data/LayerName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerId
Data/LayerId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5441
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
FilterKey
Data/FilterKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
FilterName
Data/FilterName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
FilterType
Data/FilterType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
FilterId
Data/FilterId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerKey
Data/LayerKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerName
Data/LayerName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerId
Data/LayerId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Weight
Data/Weight
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Conditions
Data/Conditions
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Action
Data/Action
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutKey
Data/CalloutKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutName
Data/CalloutName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5442
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderType
Data/ProviderType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5443
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProviderKey
Data/ProviderKey
additional.fields.key
additional.fields.value_string
ProviderName
Data/ProviderName
additional.fields.key
additional.fields.value_string
ProviderContextKey
Data/ProviderContextKey
additional.fields.key
additional.fields.value_string
ProviderContextName
Data/ProviderContextName
additional.fields.key
additional.fields.value_string
ProviderContextType
Data/ProviderContextType
additional.fields.key
additional.fields.value_string
Event ID 5444
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProviderKey
Data/ProviderKey
about.resource.product_object_id
ProviderName
Data/ProviderName
about.resource.name
SubLayerKey
Data/SubLayerKey
about.resource.product_object_id
SubLayerName
Data/SubLayerName
about.resource.name
SubLayerType
Data/SubLayerType
about.resource.attribute.labels.key
about.resource.attribute.labels.value
Weight
Data/Weight
about.resource.attribute.labels.key
about.resource.attribute.labels.value
Event ID 5446
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
ProcessId
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ChangeType
Data/ChangeType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutKey
Data/CalloutKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutName
Data/CalloutName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutType
Data/CalloutType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
CalloutId
Data/CalloutId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerKey
Data/LayerKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerName
Data/LayerName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
LayerId
Data/LayerId
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5447
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type set to SETTING
security_result.action = ALLOW_WITH_MODIFICATION
ProviderKey
Data/ProviderKey
about.resource.attribute.labels.key / value
ProviderName
Data/ProviderName
about.resource.attribute.labels.key / value
ChangeType
Data/ChangeType
about.resource.attribute.labels.key / value
FilterKey
Data/FilterKey
about.resource.attribute.labels.key / value
FilterType
Data/FilterType
about.resource.attribute.labels.key / value
LayerKey
Data/LayerKey
about.resource.attribute.labels.key / value
LayerName
Data/LayerName
about.resource.attribute.labels.key / value
LayerId
Data/LayerId
about.resource.attribute.labels.key / value
Weight
Data/Weight
about.resource.attribute.labels.key / value
Conditions
Data/Conditions
about.resource.attribute.labels.key / value
Action
Data/Action
about.resource.attribute.labels.key / value
CalloutKey
Data/CalloutKey
about.resource.attribute.labels.key / value
CalloutName
Data/CalloutName
about.resource.attribute.labels.key / value
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
FilterName
Data/FilterName
target.resource.name
FilterId
Data/FilterId
target.resource.product_object_id
Event ID 5448
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
ProcessId
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
ChangeType
Data/ChangeType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderType
Data/ProviderType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5449
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
ProcessId
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ChangeType
Data/ChangeType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderContextKey
Data/ProviderContextKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderContextName
Data/ProviderContextName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderContextType
Data/ProviderContextType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5450
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
ProcessId
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
ProviderKey
Data/ProviderKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ProviderName
Data/ProviderName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
ChangeType
Data/ChangeType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
SubLayerKey
Data/SubLayerKey
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
SubLayerName
Data/SubLayerName
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
SubLayerType
Data/SubLayerType
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Weight
Data/Weight
security_result.about.resource.attribute.labels.key
security_result.about.resource.attribute.labels.value
Event ID 5451
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
IpProtocol
Data/IpProtocol
network.ip_protocol
LocalAddress
Data/LocalAddress
principal.ip
LocalPort
Data/LocalPort
principal.port
RemoteAddress
Data/RemoteAddress
target.ip
RemotePort
Data/RemotePort
target.port
LocalAddressMask
Data/LocalAddressMask
additional.fields.key
additional.fields.value_string
LocalTunnelEndpoint
Data/LocalTunnelEndpoint
additional.fields.key
additional.fields.value_string
RemoteAddressMask
Data/RemoteAddressMask
additional.fields.key
additional.fields.value_string
PeerPrivateAddress
Data/PeerPrivateAddress
target.nat_ip
RemoteTunnelEndpoint
Data/RemoteTunnelEndpoint
additional.fields.key
additional.fields.value_string
KeyingModuleName
Data/KeyingModuleName
additional.fields.key
additional.fields.value_string
AhAuthType
Data/AhAuthType
security_result.detection_fields.key
security_result.detection_fields.value
EspAuthType
Data/EspAuthType
security_result.detection_fields.key
security_result.detection_fields.value
CipherType
Data/CipherType
security_result.detection_fields.key
security_result.detection_fields.value
LifetimeSeconds
Data/LifetimeSeconds
security_result.detection_fields.key
security_result.detection_fields.value
LifetimeKilobytes
Data/LifetimeKilobytes
security_result.detection_fields.key
security_result.detection_fields.value
LifetimePackets
Data/LifetimePackets
security_result.detection_fields.key
security_result.detection_fields.value
Mode
Data/Mode
security_result.detection_fields.key
security_result.detection_fields.value
Role
Data/Role
security_result.detection_fields.key
security_result.detection_fields.value
TransportFilterId
Data/TransportFilterId
additional.fields.key
additional.fields.value_string
MainModeSaId
Data/MainModeSaId
security_result.detection_fields.key
security_result.detection_fields.value
QuickModeSaId
Data/QuickModeSaId
security_result.detection_fields.key
security_result.detection_fields.value
InboundSpi
Data/InboundSpi
additional.fields.key
additional.fields.value_string
OutboundSpi
Data/OutboundSpi
additional.fields.key
additional.fields.value_string
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
TunnelId
Data/TunnelId
additional.fields.key
additional.fields.value_string
TrafficSelectorId
Data/TrafficSelectorId
additional.fields.key
additional.fields.value_string
Event ID 5452
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
IpProtocol
Data/IpProtocol
network.ip_protocol
LocalAddress
Data/LocalAddress
principal.ip
LocalPort
Data/LocalPort
principal.port
RemoteAddress
Data/RemoteAddress
target.ip
RemotePort
Data/RemotePort
target.port
LocalTunnelEndpoint
Data/LocalTunnelEndpoint
additional.fields.key
additional.fields.value_string
RemoteTunnelEndpoint
Data/RemoteTunnelEndpoint
additional.fields.key
additional.fields.value_string
QuickModeSaId
Data/QuickModeSaId
security_result.detection_fields.key
security_result.detection_fields.value
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
LocalAddressMask
Data/LocalAddressMask
additional.fields.key
additional.fields.value_string
RemoteAddressMask
Data/RemoteAddressMask
additional.fields.key
additional.fields.value_string
TunnelId
Data/TunnelId
additional.fields.key
additional.fields.value_string
TrafficSelectorId
Data/TrafficSelectorId
additional.fields.key
additional.fields.value_string
Event ID 5453
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Event ID 5456
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Policy
Data/Policy
target.resource.name
Event ID 5457
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Policy
Data/Policy
target.resource.name
Error
Data/Error
security_result.summary
Format:
Error Code: %{value}
Event ID 5458
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Policy
Data/Policy
target.resource.name
Event ID 5459
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Policy
Data/Policy
target.resource.name
Event ID 5460
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Policy
Data/Policy
target.resource.name
Event ID 5461
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Policy
Data/Policy
target.resource.name
Event ID 5462
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Policy
Data/Policy
target.resource.name
Event ID 5463
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5464
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW_WITH_MODIFICATION
Event ID 5465
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5466
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Event ID 5467
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5468
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Event ID 5471
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Policy
Data/Policy
target.resource.name
Event ID 5472
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Policy
Data/Policy
target.resource.name
Event ID 5473
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Policy
Data/Policy
target.resource.name
Event ID 5474
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Policy
Data/Policy
target.resource.name
Event ID 5477
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
QuickModeFilter
Data/QuickModeFilter
additional.fields.key
additional.fields.value_string
Error
Data/Error
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5478
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = "IPsec Policy Agent service"
security_result.action = ALLOW
Event ID 5479
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "IPsec Policy Agent service"
security_result.action = ALLOW
Event ID 5480
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Event ID 5483
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Event ID 5484
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Error
Data/Error
security_result.summary
Format -
Error Code: %{value}
Event ID 5485
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Event ID 5615
Provider: Microsoft-Windows-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = "Windows Management Instrumentation"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 5617
Provider: Microsoft-Windows-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = "Windows Management Instrumentation"
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 5632
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
LocalMac
Data/LocalMac
principal.mac
SubjectUserName
Data/SubjectUserName
principal.user.userid
ReasonText
Data/ReasonText
security_result.description
PeerMac
Data/PeerMac
target.mac
SSID
Data/SSID
security_result.detection_fields.key
security_result.detection_fields.value
Identity
Data/Identity
security_result.detection_fields.key
security_result.detection_fields.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
IntfGuid
Data/IntfGuid
additional.fields.key
additional.fields.value_string
ReasonCode
Data/ReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
ErrorCode
Data/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
EAPReasonCode
Data/EAPReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
EapRootCauseString
Data/EapRootCauseString
security_result.detection_fields.key
security_result.detection_fields.value
EAPErrorCode
Data/EAPErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5633
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
ReasonText
Data/ReasonText
security_result.description
InterfaceName
Data/InterfaceName
additional.fields.key
additional.fields.value_string
Identity
Data/Identity
additional.fields.key
additional.fields.value_string
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ReasonCode
Data/ReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
ErrorCode
Data/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5712
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = UNKNOWN_ACTION
ProcessName
Data/ProcessName
principal.process.file.full_path
SubjectUserSid
principal.user.windows_sid
SubjectUserName
principal.user.userid
SubjectDomainName
principal.administrative_domain
ProcessId
Data/ProcessId
principal.process.pid
RemoteIpAddress
Data/RemoteIpAddress
target.ip
RemotePort
Data/RemotePort
target.port
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
InterfaceUuid
Data/InterfaceUuid
additional.fields.key
additional.fields.value_string
ProtocolSequence
Data/ProtocolSequence
additional.fields.key
additional.fields.value_string
AuthenticationService
Data/AuthenticationService
additional.fields.key
additional.fields.value_string
AuthenticationLevel
AuthenticationLevel
additional.fields.key
additional.fields.value_string
Event ID 5719
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 5721
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 5722
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data_2
security_result.summary
Format:
%{Data_2} - %{Extract description from Message}
Data
target.hostname
Data_1
principal.user.userid
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5723
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
target.hostname
Data_1
principal.user.userid
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5774
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data_1
Data/Data_1
additional.fields.key
additional.fields.value_string
Data_2
Data/Data_2
additional.fields.key
additional.fields.value_string
Data_3
Data/Data_3
additional.fields.key
additional.fields.value_string
Data_4
Data/Data_4
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5775
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data_1
Data/Data_1
additional.fields.key
additional.fields.value_string
Data_2
Data/Data_2
additional.fields.key
additional.fields.value_string
Data_3
Data/Data_3
additional.fields.key
additional.fields.value_string
Data_4
Data/Data_4
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5781
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5782
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5802
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Culture
additional.fields.key
additional.fields.value_string
Level
security_result.detection_fields.key
security_result.detection_fields.value
Keywords.Keyword
additional.fields.key
additional.fields.value_string
Event ID 5805
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
target.hostname
Data_1
additional.fields.key
additional.fields.value_string
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 5807
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Data_2
additional.fields.key
additional.fields.value_string
Data_3
additional.fields.key
additional.fields.value_string
Event ID 5823
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 5827
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
target.hostname
Data_1
target.domain.name
Data_2
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Data_3
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Data_4
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Data_5
principal.asset.attribute.labels.key
principal.asset.attribute.labels.value
Event ID 5830
Provider: NETLOGON
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target_hostname set to target.hostname
Event ID 5857
Provider: Microsoft-Windows-WMI-Activity
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ProcessID
Data/ProcessID
target.process.pid
Code
Data/Code
security_result.summary is set to "Code - %{Code}"
HostProcess
Data/HostProcess
target.process.file.full_path
ProviderPath
Data/ProviderPath
target.file.full_path
ProviderName
Data/ProviderName
about.resource.attribute.labels.key
about.resource.attribute.labels.value
Event ID 5858
Provider: Microsoft-Windows-WMI-Activity
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ClientMachine
Data/ClientMachine
principal.hostname
User
Data/User
principal.user.windows_sid
ClientProcessId
Data/ClientProcessId
principal.process.pid
PossibleCause
Data/PossibleCause
security_result.description
Id
additional.fields.key
additional.fields.value_string
Component
Data/Component
security_result.detection_fields.key
security_result.detection_fields.value
Operation
Data/Operation
security_result.detection_fields.key
security_result.detection_fields.value
ResultCode
Data/ResultCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 5859
Provider: Microsoft-Windows-WMI-Activity
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
NamespaceName
Data/NamespaceName
target.file.full_path
User
Data/User
principal.user.windows_sid
ProcessID
Data/ProcessID
target.process.pid
PossibleCause
Data/PossibleCause
security_result.description
Query
Data/Query
additional.fields.key
additional.fields.value_string
Provider
Data/Provider
about.resource.attribute.labels.key
about.resource.attribute.labels.value
queryid
Data/queryid
additional.fields.key
additional.fields.value_string
Event ID 5860
Provider: Microsoft-Windows-WMI-Activity
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
NamespaceName
Data/NamespaceName
target.file.full_path
User
Data/User
principal.user.windows_sid
Processid
Data/User
target.process.pid
ClientMachine
Data/ClientMachine
principal.hostname
PossibleCause
Data/PossibleCause
security_result.description
Query
Data/Query
additional.fields.key
additional.fields.value_string
Event ID 5861
Provider: Microsoft-Windows-WMI-Activity
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application" set to "%{SourceName}"
security_result.summary" set to "%{Channel}"
Message
System/Message
Namespace set to target.file.full_path
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
PossibleCause
Data/PossibleCause
security_result.description
AccountType
System/AccountType
principal.user.attribute.roles.name
ESS
Data/ESS
additional.fields.key
additional.fields.value_string
CONSUMER
Data/CONSUMER
additional.fields.key
additional.fields.value_string
Event ID 5888
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_UPDATE_CONTENT
security_result.action = ALLOW_WITH_MODIFICATION
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectCollectionName
Data/ObjectCollectionName
target.resource.name
ModifiedObjectProperties
Data/ModifiedObjectProperties
We can use target.resource.attribute.labels.key/value UDM mappings as follows (check whether it is possible by using kv in conf):
target.resource.attribute.labels.key = "<Property_Name>_OLD_VALUE"
target.resource.attribute.labels.value= "<OLD_VALUE>"
target.resource.attribute.labels.key = "<Property_Name>_NEW_VALUE"
target.resource.attribute.labels.value= "<NEW_VALUE>"
ObjectIdentifyingProperties
Data/ObjectIdentifyingProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5889
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_DELETION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectCollectionName
target.resource.name
ObjectIdentifyingProperties
Data/ObjectIdentifyingProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectProperties
Data/ObjectProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 5890
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_CREATION
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ObjectCollectionName
Data/ObjectCollectionName
target.resource.name
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
ObjectIdentifyingProperties
Data/ObjectIdentifyingProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ObjectProperties
Data/ObjectProperties
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6000
Windows 10 client / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.application = "winlogon notification subscriber"
Provider: Microsoft-Windows-Eventlog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Channel
Data/Channel
target.file.full_path
Windows Server 2019 / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
Data
Data/Data
additional.fields.key
additional.fields.value_string
Event ID 6001
Windows 10 client / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.application = "winlogon notification subscriber"
Windows Server 2019 / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
Data
Data/Data
additional.fields.key
additional.fields.value_string
Event ID 6003
Windows 10 client / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.application = "winlogon notification subscriber"
Windows Server 2019 / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
Data
Data/Data
additional.fields.key
additional.fields.value_string
Event ID 6005
Windows Server 2019 / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.application = "winlogon notification subscriber"
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data1
Data/Data1
additional.fields.key
additional.fields.value_string
Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
metadata.event_type = SERVICE_START
target.application = "%{SourceName}"
SourceName
target.application
Event ID 6006
Windows 10 client / Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
target.application
metadata.event_type = SERVICE_STOP
target.application = "%{SourceName}"
Windows Server 2019 / Provider: EventLog
NXLog field
Event Viewer field
UDM field
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-W3LOGSVC
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Message
security_result.summary
SourceName
target.application
ProcessId
target.process.pid
Event ID 6008
Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
target.application = "%{SourceName}"
Event ID 6009
Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 6011
Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
Extract hostnames and map old value with principal.hostname and new modified value to target.hostname
Event ID 6013
Provider: EventLog
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 6038
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 6062
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 6100
Provider: Microsoft-Windows-Diagnostics-Networking
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
HelperClassName
Data/HelperClassName
additional.fields.key
additional.fields.value_string
EventDescription
Data/EventDescription
additional.fields.key
additional.fields.value_string
EventVerbosity
Data/EventVerbosity
additional.fields.key
additional.fields.value_string
Event ID 6144
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
GPOList
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6145
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
GPOList
Data/GPOList
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6148
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
Event ID 6149
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
Event ID 6272
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineState
Data/QuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSessionIdentifier
Data/QuarantineSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
LoggingResult
Data/LoggingResult
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6273
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
Reason
Data/Reason
security_result.summary
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
ReasonCode
Data/ReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
LoggingResult
Data/LoggingResult
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6274
version 1 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
ReasonCode
Data/ReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
Reason
Data/Reason
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6275
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
Reason
Data/Reason
security_result.summary
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
ReasonCode
Data/ReasonCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6276
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
USER_CHANGE_PERMISSIONS
security_result.action = QUARANTINE
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineState
Data/QuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
ExtendedQuarantineState
Data/ExtendedQuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSessionID
Data/QuarantineSessionID
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineHelpURL
Data/QuarantineHelpURL
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSystemHealthResult
Data/QuarantineSystemHealthResult
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6277
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
USER_CHANGE_PERMISSIONS
security_result.action = ALLOW_WITH_MODIFICATION
CalledStationID
Data/CalledStationID
principal.asset.platform_software.platform_version
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
principal.user.userid
SubjectMachineName
Data/SubjectMachineName
principal.user.windows_sid
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
SubjectMachineSID
Data/SubjectMachineSID
additional.fields.key
additional.fields.value_string
MachineInventory
Data/MachineInventory
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineState
Data/QuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
ExtendedQuarantineState
Data/ExtendedQuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSessionID
Data/QuarantineSessionID
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineHelpURL
Data/QuarantineHelpURL
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSystemHealthResult
Data/QuarantineSystemHealthResult
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineGraceTime
Data/QuarantineGraceTime
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6278
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
MachineInventory
Data/MachineInventory
principal.asset.platform_software.platform_version
SubjectMachineName
Data/SubjectMachineName
principal.user.userid
SubjectMachineSID
Data/SubjectMachineSID
principal.user.windows_sid
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
FullyQualifiedSubjectMachineName
Data/FullyQualifiedSubjectMachineName
additional.fields.key
additional.fields.value_string
CalledStationID
Data/CalledStationID
additional.fields.key
additional.fields.value_string
CallingStationID
Data/CallingStationID
additional.fields.key
additional.fields.value_string
NASIPv4Address
Data/NASIPv4Address
additional.fields.key
additional.fields.value_string
NASIPv6Address
Data/NASIPv6Address
additional.fields.key
additional.fields.value_string
NASIdentifier
Data/NASIdentifier
additional.fields.key
additional.fields.value_string
NASPortType
Data/NASPortType
additional.fields.key
additional.fields.value_string
NASPort
Data/NASPort
target.port
ClientIPAddress
Data/ClientIPAddress
principal.ip
ProxyPolicyName
Data/ProxyPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
NetworkPolicyName
Data/NetworkPolicyName
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationProvider
Data/AuthenticationProvider
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationServer
Data/AuthenticationServer
security_result.detection_fields.key
security_result.detection_fields.value
AuthenticationType
Data/AuthenticationType
security_result.detection_fields.key
security_result.detection_fields.value
EAPType
Data/EAPType
security_result.detection_fields.key
security_result.detection_fields.value
AccountSessionIdentifier
Data/AccountSessionIdentifier
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineState
Data/QuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
ExtendedQuarantineState
Data/ExtendedQuarantineState
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSessionID
Data/QuarantineSessionID
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineHelpURL
Data/QuarantineHelpURL
security_result.detection_fields.key
security_result.detection_fields.value
QuarantineSystemHealthResult
Data/QuarantineSystemHealthResult
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6279
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
USER_CHANGE_PERMISSIONS
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
ClientName
Data/ClientName
principal.asset.attribute.labels.key/value
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
Event ID 6280
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type =
USER_CHANGE_PERMISSIONS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
target.administrative_domain
SubjectUserName
Data/SubjectUserName
target.user.userid
SubjectUserSid
Data/SubjectUserSid
target.user.windows_sid
FullyQualifiedSubjectUserName
Data/FullyQualifiedSubjectUserName
additional.fields.key
additional.fields.value_string
Event ID 6281
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
security_result.action = ALLOW_WITH_MODIFICATION
param1
Data/param1
target.file.full_path
Event ID 6313
Provider: ADSync
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
principal.administrative_domain
Event ID 6400
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ClientIPAddress
Data/ClientIPAddress
principal.ip
Event ID 6401
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ClientIPAddress
Data/ClientIPAddress
principal.ip
Event ID 6402
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ClientIPAddress
Data/ClientIPAddress
principal.ip
Event ID 6403
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
HostedCacheName
Data/HostedCacheName
additional.fields.key
additional.fields.value_string
Event ID 6404
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ErrorCode
Data/ErrorCode
security_result.description set to Error Code - %{ErrorCode}
HostedCacheName
Data/HostedCacheName
additional.fields.key
additional.fields.value_string
Event ID 6405
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
EventId
Data/EventId
additional.fields.key
additional.fields.value_string
Count
Data/Count
additional.fields.key
additional.fields.value_string
Event ID 6406
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProductName
Data/ProductName
additional.fields.key
additional.fields.value_string
Categories
Data/Categories
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6407
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
Message
Data/Message
additional.fields.key
additional.fields.value_string
Event ID 6408
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ProductName
Data/ProductName
additional.fields.key
additional.fields.value_string
Categories
Data/Categories
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6409
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
GUID
Data/GUID
additional.fields.key
additional.fields.value_string
Event ID 6410
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = FILE_UNCATEGORIZED
security_result.action = BLOCK
param1
Data/param1
target.file.full_path
Event ID 6416
version 0 / Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
resource.resource_type set to "DEVICE"
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
ClassId
Data/ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
VendorIds
Data/VendorIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
Data/CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
Data/LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
version 1 /
NXLog field
Event Viewer field
UDM field
DeviceDescription
Data/DeviceDescription
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassName
Data/ClassName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DeviceId
Data/DeviceId
target.resource.product_object_id
Event ID 6417
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
ProcessId
Data/ProcessId
principal.process.pid
ProcessName
principal.process.command_line
Event ID 6418
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
ProcessId
Data/ProcessId
principal.process.pid
ProcessName
principal.process.command_line
FatalCode
Data/FatalCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 6419
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClassName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6420
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClassName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6421
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClassName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6422
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
ClassName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
SubjectLogonId
Data/SubjectLogonId
principal.labels.key/value
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6423
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = BLOCK
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ClassId
Data/ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassName
Data/Data/SubjectUserName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
Data/CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
Data/LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6424
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_RESOURCE_ACCESS
security_result.action = ALLOW
SubjectDomainName
Data/SubjectDomainName
principal.administrative_domain
SubjectUserName
Data/SubjectUserName
principal.user.userid
SubjectUserSid
Data/SubjectUserSid
principal.user.windows_sid
DeviceId
Data/DeviceId
target.resource.id
DeviceDescription
Data/DeviceDescription
target.resource.name
SubjectLogonId
Data/SubjectLogonId
additional.fields.key
additional.fields.value_string
ClassId
Data/ClassId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ClassName
Data/Data/SubjectUserName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
HardwareIds
Data/HardwareIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
CompatibleIds
Data/CompatibleIds
target.resource.attribute.labels.key
target.resource.attribute.labels.value
LocationInformation
Data/LocationInformation
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 6946
Provider: ADSync
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.description
Event ID 6952
Provider: ADSync
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
If required fields for above mentioned metadata.event_type are not present, then set metadata.event_type to STATUS_UPDATE.
Data
security_result.description
Event ID 7000
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Extract error and map it to security_result.summary
param1
Data/param1
target.application
Event ID 7001
Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
UserSid
Data/UserSid
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
TSId
Data/TSId
additional.fields.key
additional.fields.value_string
Event ID 7002
Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
TSId
Data/TSId
additional.fields.key
additional.fields.value_string
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7003
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7005
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7009
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
target.application
Event ID 7010
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7011
Windows Server 2019 / Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
param1
Data/param1
target.application
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7012
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7017
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7021
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
metadata.event_type = STATUS_UNCATEGORIZED
Data
target.hostname
Data_1
target.resource.name
Netwwt01
NXLog field
Event Viewer field
UDM field
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 7022
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
param1
Not available
target.application
Event ID 7023
Windows 10 client / Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Extract error and map it to security_result.summary
param1
Data/param1
target.application
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
metadata.event_type = SERVICE_STOP
param2
Not available
security_result.description
Format:
Error Code - %{value}
param1
Not available
target.application
Windows Server 2019 / Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 7024
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
param2
Not available
security_result.description
Format:
Error Code - %{value}
param1
Not available
target.application
Event ID 7025
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Event ID 7026
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.resource.resource_type = DEVICE
target.resource.resource_subtype = "boot-start or system-start driver"
param1
Not available
target.application
Event ID 7031
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
param1
Not available
target.application
param2
additional.fields.key
additional.fields.value_string
param3
additional.fields.key
additional.fields.value_string
param4
additional.fields.key
additional.fields.value_string
param5
Not available
security_result.action_details
Event ID 7032
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
param2
Not available
security_result.action_details
param4
Not available
security_result.description
Error Code: %{value}
param3
Not available
target.application
param1
Not available
additional.fields.key
additional.fields.value_string
Event ID 7034
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
security_result.action = BLOCK
param1
Not available
target.application
param2
Not available
additional.fields.key
additional.fields.value_string
Event ID 7036
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
If the param2 log field value is equal to stopped, then the
metadata.event_type UDM field is set to SERVICE_STOP.
Else, if the param2 log field value is equal to start, then the
metadata.event_type UDM field is set to SERVICE_START.
Else, if the param2 log field value is equal to running,
then the metadata.event_type UDM field is set to SERVICE_UNSPECIFIED.
param1
Not available
target.application
param2
Not available
security_result.action_details
If the param2 log field value is equal to stopped,
then the security_result.action UDM field is set to ALLOW.
Event ID 7038
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
param2
principal.hostname
param3
security_result.description
Format:
%{param3} - %{Extract description from Message}
param1
target.application
Event ID 7040
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_MODIFICATION
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.application
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 7042
Windows Server 2019 / Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.application
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
param5
Data/param5
additional.fields.key
additional.fields.value.string_value
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 7045
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_CREATION
ServiceName
Data/ServiceName
target.application
ImagePath
Data/ImagePath
target.process.file.full_path
UserID
System/UserID
target.user.windows_sid
ServiceType
additional.fields.key
additional.fields.value.string_value
StartType
additional.fields.key
additional.fields.value.string_value
ServiceType
Data/ServiceType
additional.fields.key
additional.fields.value_string
StartType
Data/StartType
additional.fields.key
additional.fields.value_string
Event ID 8000
Provider: Netwtw10
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
Status
security_result.summary
Event ID 8003
Provider: bowser
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Data_1
target.hostname
Data_2
target.resource.product_object_id
Data
additional.fields.key
additional.fields.value_string
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
FullFilePath
target.process.file.full_path
FilePath
target.file.full_path
FileHash
target.file.sha256
Fqbn
target.group.group_display_name
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
FilePathLength
additional.fields.key
additional.fields.value_string
FileHashLength
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
FullFilePathLength
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
InterfaceGuid
additional.fields.key
additional.fields.value_string
InterfaceDescription
additional.fields.key
additional.fields.value_string
ConnectionMode
additional.fields.key
additional.fields.value_string
ProfileName
target.hostname
ProfileName
target.asset.hostname
SSID
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BSSType
additional.fields.key
additional.fields.value_string
Reason
security_result.summary
ConnectionId
additional.fields.key
additional.fields.value_string
ReasonCode
security_result.detection_fields
Event ID 8004
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
FullFilePath
target.process.file.full_path
FilePath
target.file.full_path
FileHash
target.file.sha256
Fqbn
target.group.group_display_name
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
FilePathLength
additional.fields.key
additional.fields.value_string
FileHashLength
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
FullFilePathLength
additional.fields.key
additional.fields.value_string
Event ID 8005
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.description
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
PrincipalSamName
Data/PrincipalSamName
target.hostname
TargetLogonId
Data/TargetLogonId
additional.fields.key
additional.fields.value.string_value
PolicyElaspedTimeInSeconds
Data/PolicyElaspedTimeInSeconds
security_result.rule_labels.key
security_result.rule_labels.value
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsConnectivityFailure
Data/IsConnectivityFailure
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 8006
Provider: Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.attribute.roles.name
UserID
System/UserID
principal.user.windows_sid
ErrorCode
Data/ErrorCode
security_result.summary
Format:
ErrorCode - %{value}
PrincipalSamName
Data/PrincipalSamName
target.hostname
PolicyElaspedTimeInSeconds
Data/PolicyElaspedTimeInSeconds
security_result.rule_labels.key
security_result.rule_labels.value
IsMachine
Data/IsMachine
security_result.rule_labels.key
security_result.rule_labels.value
IsConnectivityFailure
Data/IsConnectivityFailure
security_result.rule_labels.key
security_result.rule_labels.value
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
FullFilePath
target.process.file.full_path
FilePath
target.file.full_path
FileHash
target.file.sha256
Fqbn
target.group.group_display_name
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
FilePathLength
additional.fields.key
additional.fields.value_string
FileHashLength
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
FullFilePathLength
additional.fields.key
additional.fields.value_string
Event ID 8007
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
FullFilePath
target.process.file.full_path
FilePath
target.file.full_path
FileHash
target.file.sha256
Fqbn
target.group.group_display_name
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
FilePathLength
additional.fields.key
additional.fields.value_string
FileHashLength
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
FullFilePathLength
additional.fields.key
additional.fields.value_string
Event ID 8008
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 8009
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
Data/ErrorCode
security_result.summary set to ErrorCode - %{ErrorCode}
Event ID 8010
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8015
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8017
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8018
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8019
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8020
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8021
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: BROWSER
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
additional.fields.key
additional.fields.value_string
Data
additional.fields.key
additional.fields.value_string
Binary
additional.fields.key
additional.fields.value_string
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = FAIL
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
Fqbn
target.group.group_display_name
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
PackageLength
additional.fields.key
additional.fields.value_string
Package
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
Event ID 8022
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
Fqbn
target.group.group_display_name
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
PackageLength
additional.fields.key
additional.fields.value_string
Package
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
Event ID 8025
Provider: Microsoft-Windows-AppLocker
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = BLOCK
RuleId
security_result.rule_id
TargetUser
target.user.userid
TargetProcessId
target.process.pid
Fqbn
target.group.group_display_name
PolicyNameLength
additional.fields.key
additional.fields.value_string
PolicyName
additional.fields.key
additional.fields.value_string
RuleNameLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleName
security_result.rule_name
RuleSddlLength
security_result.rule_labels.key
security_result.rule_labels.value
RuleSddl
security_result.rule_labels.key
security_result.rule_labels.value
PackageLength
additional.fields.key
additional.fields.value_string
Package
additional.fields.key
additional.fields.value_string
FqbnLength
additional.fields.key
additional.fields.value_string
Event ID 8027
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8030
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 8033
Provider: Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
DnsServerList
intermediary.ip
Ipaddress
target.ip
ErrorCode
Data/ErrorCode
security_result.summary
security_result.summary set to ErrorCode - %{ErrorCode}
AdapterName
security_result.detection_fields.key
security_result.detection_fields.value
HostName
security_result.detection_fields.key
security_result.detection_fields.value
AdapterSuffixName
security_result.detection_fields.key
security_result.detection_fields.value
Sent UpdateServer
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 8191
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = UNKNOWN_ACTION
Event ID 8193
Provider: VSS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.application = %{SourceName}
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data_1
Data/Data_1
additional.fields.key
additional.fields.value_string
Data_2
Data/Data_2
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Powershell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
target.resource.product_object_id
Event ID 8198
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 8222
Provider: VSSAudit
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
principal.administrative_domain
AccountType
principal.user.attribute.roles.name
Data_3
target.process.file.full_path
Data_8
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_9
target.resource.name
Data
additional.fields.key
additional.fields.value_string
Data_1
additional.fields.key
additional.fields.value_string
Data_2
target.process.pid
Data_4
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_5
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_6
additional.fields.key
additional.fields.value_string
Data_7
additional.fields.key
additional.fields.value_string
Event ID 8223
Provider: VSSAudit
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
Data_7
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_8
target.resource.name
Data
principal.user.windows_sid
Data_1
principal.user.attribute.labels.key
principal.user.attribute.labels.value
Data_2
principal.user.attribute.labels.key
principal.user.attribute.labels.value
Data_3
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_4
target.resource.product_object_id
Data_5
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Data_6
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 8224
Provider: VSS
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
Not available
target.application
Event ID 8225
Provider: VSS
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
SourceName
Not available
target.application
Event ID 8230
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Event ID 9007
Provider: nhi
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 9008
Provider: nhi
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 9027
Provider: Desktop Window Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Event ID 10000
Windows Server 2019 / Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.process.command_line
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
AccountType
System/AccountType
principal.user.attribute.roles.name
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target.resource.id
Event ID 10001
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.process.command_line
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
target.application
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
param5
Data/param5
additional.fields.key
additional.fields.value.string_value
AccountType
System/AccountType
principal.user.attribute.roles.name
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ExtensibleModulePath
Data/ExtensibleModulePath
target.process.file.full_path
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
ServiceName
target.application
CLSID
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
MinimumFxVersion
additional.fields.key
additional.fields.value_string
Upgrade
additional.fields.key
additional.fields.value_string
Event ID 10002
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ExtensibleModulePath
Data/ExtensibleModulePath
target.process.file.full_path
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
ServiceName
target.application
CLSID
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
MinimumFxVersion
additional.fields.key
additional.fields.value_string
Upgrade
additional.fields.key
additional.fields.value_string
Event ID 10004
Provider: Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ExtensibleModulePath
target.process.file.full_path
Event ID 10005
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
Data/param2
target.application
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 10010
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 10016
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type set to SETTING
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param7
Data/param7
target.administrative_domain
param10
Data/param10
target.application
param1
Data/param1
target.resource.attribute.permissions.name
param2
Data/param2
additional.fields.key
additional.fields.value.string_value
param3
Data/param3
additional.fields.key
additional.fields.value.string_value
param4
Data/param4
additional.fields.key
additional.fields.value.string_value
param5
Data/param5
target.resource.product_object_id
param6
Data/param6
target.user.userid
param8
Data/param8
target.user.windows_sid
param9
Data/param9
additional.fields.key
additional.fields.value_string
param11
Data/param11
additional.fields.key
additional.fields.value_string
Event ID 10100
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 10111
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
InstanceId
target.resource.id
LifetimeId
additional.fields.key
additional.fields.value_string
FriendlyName
target.resource.name
Location
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RestartCount
additional.fields.key
additional.fields.value_string
Event ID 10118
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_AUDIT_LOG_UNCATEGORIZED
Event ID 10020
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
Data/param1
additional.fields.key
additional.fields.value.string_value
param2
security_result.summary
Event ID 10028
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
param3
Data/param3
principal.process.file.full_path
param2
Data/param2
principal.process.pid
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
param1
Data/param1
target.ip
param4
Data/param4
additional.fields.key
additional.fields.valuestring
binLength
Data/_binLength
additional.fields.key
additional.fields.value_string
binary
Data/binary
additional.fields.key
additional.fields.value_string
Event ID 10036
Provider: Microsoft-Windows-DistributedCOM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Domain Name
Data/Domain Name
target.administrative_domain
Client IP Address
Data/Client IP Address
target.ip
User Name
Data/User Name
target.user.user_display_name
SID
Data/SID
target.user.windows_sid
Event ID 10110
Provider: Microsoft-Windows-DriverFrameworks-UserMode
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Status
security_result.summary
LifetimeId
additional.fields.key
additional.fields.value_string
Problem
additional.fields.key
additional.fields.value_string
DetectedBy
additional.fields.key
additional.fields.value_string
ActiveOperation
additional.fields.key
additional.fields.value_string
ExitCode
additional.fields.key
additional.fields.value_string
Message
additional.fields.key
additional.fields.value_string
Event ID 10148
Windows 10 client / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Windows Server 2019 / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 10149
Windows 10 client / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Windows Server 2019 / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 10154
Windows 10 client / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Windows Server 2019 / Provider: Microsoft-Windows-WinRM
NXLog field
Event Viewer field
UDM field
spn1
Data/spn1
additional.fields.key
additional.fields.value_string
spn2
Data/spn2
additional.fields.key
additional.fields.value_string
error
Data/error
security_result.summary
Event ID 10317
Provider: Microsoft-Windows-NDIS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AdapterName
target.resource.name
UserID
principal.user.windows_sid
IfGuid
target.resource.product_object_id
IfIndex
target.resource.attribute.labels.key
target.resource.attribute.labels.value
IfLuid
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ResetReason
additional.fields.key
additional.fields.value_string
ResetCount
additional.fields.key
additional.fields.value_string
Event ID 10400
Provider: Microsoft-Windows-NDIS
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
AdapterName
target.resource.name
IfGuid
target.resource.product_object_id
IfIndex
target.resource.attribute.labels.key
target.resource.attribute.labels.value
IfLuid
target.resource.attribute.labels.key
target.resource.attribute.labels.value
ResetReason
additional.fields.key
additional.fields.value_string
ResetCount
additional.fields.key
additional.fields.value_string
Event ID 11707
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Message
target.application
Extract product_name from Message field and map it to target.application
AccountType
principal.user.attribute.roles.name
Event ID 12294
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
UserName
target.user.userid
Event ID 14204
Provider: Microsoft-Windows-WMPNSS-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
ServiceName
target.application
Event ID 14205
Provider: Microsoft-Windows-WMPNSS-Service
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_STOP
ServiceName
target.application
Event ID 14531
Provider: Microsoft-Windows-DfsSvc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 14533
Provider: Microsoft-Windows-DfsSvc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 14554
Provider: Microsoft-Windows-DfsSvc
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 15007
Provider: Microsoft-Windows-HttpEvent
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Url
Data/Url
target.url
Event ID 15008
Provider: Microsoft-Windows-HttpEvent
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Url
Data/Url
target.url
Event ID 15021
Provider: Microsoft-Windows-HttpEvent
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Endpoint
target.ip and target.port
DeviceObject
target.resource.name
Event ID 15301
Provider: Microsoft-Windows-HttpEvent
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_CREATION
Endpoint
Data/Endpoint
target.ip and target.port
Event ID 16384
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = SERVICE_START
target.application = "Software Protection"
version 0 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Title
Data/Title
security_result.summary
User
Data/User
target.user.userid
Id
Data/Id
additional.fields.key
additional.fields.value_string
Owner
Data/Owner
additional.fields.key
additional.fields.value_string
Event ID 16385
version 0 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Id
Data/Id
target.resource.product_object_id
Title
Data/Title
target.resource.name
User
Data/User
target.user.userid
FileList
Data/FileList
target.file.full_path
Owner
Data/Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16388
version 0 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Title
Data/Title
security_result.summary
User
Data/User
target.user.userid
Id
Data/Id
additional.fields.key
additional.fields.value_string
Owner
Data/Owner
additional.fields.key
additional.fields.value_string
Event ID 16392
version 0 / Provider: Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
ErrorCode
Data/ErrorCode
security_result.summary is set to "ErrorCode: %{ErrorCode}"
Event ID 16394
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
Not available
metadata.event_type = STATUS_UPDATE
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 16401
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorMessage
Data/ErrorMessage
security_result.description
GroupName
Data/GroupName
target.group.group_display_name
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
entityName
security_result.rule_labels.key
security_result.rule_labels.value
currentSize
security_result.rule_labels.key
security_result.rule_labels.value
currentLimit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 16413
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = GROUP_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorString
Data/ErrorString
security_result.description
GroupName
Data/GroupName
target.group.group_display_name
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 16647
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 16648
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
EventData.Name
EventData.Name
security_result.detection_fields.key
security_result.detection_fields.value
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 16962
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
Default SD String:
Data/Default SD String:
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 16963
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Registry SD String
Data/Registry SD String
target.registry.registry_value_name
AccountType
System/AccountType
principal.user.attribute.roles.name
Event ID 16966
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
UserID
System/UserID
principal.user.windows_sid
Event ID 16969
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Throttle window
additional.fields.key
additional.fields.value_string
Suppressed Message Count:
additional.fields.key
additional.fields.value_string
Event ID 16977
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AccountType
System/AccountType
principal.user.attribute.roles.name
MinimumPasswordLength
Data/MinimumPasswordLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RelaxMinimumPasswordLengthLimits
Data/RelaxMinimumPasswordLengthLimits
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MinimumPasswordLengthAudit
Data/MinimumPasswordLengthAudit
target.resource.attribute.labels.key
target.resource.attribute.labels.value
version 0 / Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
MinimumPasswordLength
Data/MinimumPasswordLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RelaxMinimumPasswordLengthLimits
Data/RelaxMinimumPasswordLengthLimits
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MinimumPasswordLengthAudit
Data/MinimumPasswordLengthAudit
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16978
version 0 / Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
AccountName
Data/AccountName
target.user.userid
MinimumPasswordLength
Data/MinimumPasswordLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
MinimumPasswordLengthAudit
Data/MinimumPasswordLengthAudit
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16979
version 0 / Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type = SETTING
MinimumPasswordLength
Data/MinimumPasswordLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16982
version 0 / Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Event ID 16983
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
version 0 / Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 16984
Provider: Microsoft-Windows-Directory-Services-SAM
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Number of RPC methods:
additional.fields.key
additional.fields.value_string
Throttle Window:
additional.fields.key
additional.fields.value_string
Number of RPC methods:
additional.fields.key
additional.fields.value_string
Throttle Window:
additional.fields.key
additional.fields.value_string
Event ID 18452
Provider: MSSQL$ENTERPRISE191
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN, If complete_username or database_name is not empty, otherwise metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
Message
System/Message
client_ip set to principal.ip
database_name set to target.hostname
SourceName
System/SourceName
principal.application
Event ID 18456
Provider: MSSQL$ENTERPRISE100
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN, if complete_username or database_name is not empty, otherwise metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
Message
System/Message
client_ip set to principal.ip
database_name set to target.hostname
complete_username set to target.user.userid (if UserID is empty)
SourceName
System/SourceName
principal.application
Provider: MSSQLSERVER
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN, if complete_username or database_name is not empty, otherwise metadata.event_type = USER_UNCATEGORIZED
security_result.category = AUTH_VIOLATION
Message
System/Message
client_ip set to principal.ip
database_name set to target.hostname
complete_username set to target.user.userid (if UserID is empty)
SourceName
System/SourceName
principal.application
Event ID 20001
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
target_resource_name set to target.resource.name
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
Event ID 20003
Provider: Microsoft-Windows-UserPnp
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Category set to security_result.category_details
Message set to metadata.description
target_resource_name set to target.resource.name
metadata.event_type = STATUS_UPDATE
target_resource_name set to target.resource.name
Event ID 20063
Provider: RemoteAccess
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data_1
Data/Data_1
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 20171
Provider: RemoteAccess
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Data
Data/Data
additional.fields.key
additional.fields.value_string
Data_1
Data/Data_1
additional.fields.key
additional.fields.value_string
EventData.Binary
EventData.Binary
additional.fields.key
additional.fields.value_string
Event ID 20192
Provider: RemoteAccess
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 28680
Provider: PRIVMAN
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 28701
Provider: PRIVMAN
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_HEARTBEAT
target_hostname set to target.hostname
target_ip set to target.ip
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 33205
Provider: MSSQL$LABX2010$AUDIT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: MSSQL$SQL16$AUDIT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
target_resource_name set to target.resource.name
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: MSSQL$SYNEL$AUDIT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: MSSQLSERVER$AUDIT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Provider: MSSQL
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
EventData/Data/audit_schema_version
security_result.detection_fields.key/value
EventData/Data/audit_event
security_result.detection_fields.key/value
EventData/Data/event_time
security_result.detection_fields.key/value
EventData/Data/sequence_number
security_result.detection_fields.key/value
EventData/Data/action_id
security_result.detection_fields.key/value
EventData/Data/succeeded
security_result.detection_fields.key/value
EventData/Data/is_column_permission
security_result.detection_fields.key/value
EventData/Data/session_id
security_result.detection_fields.key/value
EventData/Data/server_principal_id
security_result.detection_fields.key/value
EventData/Data/database_principal_id
security_result.detection_fields.key/value
EventData/Data/target_server_principal_id
security_result.detection_fields.key/value
EventData/Data/target_database_principal_id
security_result.detection_fields.key/value
EventData/Data/object_id
security_result.detection_fields.key/value
EventData/Data/user_defined_event_id
security_result.detection_fields.key/value
EventData/Data/transaction_id
security_result.detection_fields.key/value
EventData/Data/class_type
security_result.detection_fields.key/value
EventData/Data/duration_milliseconds
security_result.detection_fields.key/value
EventData/Data/response_rows
security_result.detection_fields.key/value
EventData/Data/affected_rows
security_result.detection_fields.key/value
EventData/Data/client_tls_version
security_result.detection_fields.key/value
EventData/Data/database_transaction_id
security_result.detection_fields.key/value
EventData/Data/ledger_start_sequence_number
security_result.detection_fields.key/value
EventData/Data/is_local_secondary_replica
security_result.detection_fields.key/value
EventData/Data/client_ip
security_result.detection_fields.key/value
EventData/Data/permission_bitmask
security_result.detection_fields.key/value
EventData/Data/session_server_principal_name
security_result.detection_fields.key/value
EventData/Data/server_principal_name
security_result.detection_fields.key/value
EventData/Data/sequence_group_id
security_result.detection_fields.key/value
EventData/Data/server_principal_sid
security_result.detection_fields.key/value
EventData/Data/database_principal_name
security_result.detection_fields.key/value
EventData/Data/target_server_principal_name
security_result.detection_fields.key/value
EventData/Data/target_server_principal_sid
security_result.detection_fields.key/value
EventData/Data/target_database_principal_name
security_result.detection_fields.key/value
EventData/Data/server_instance_name
security_result.detection_fields.key/value
EventData/Data/database_name
security_result.detection_fields.key/value
EventData/Data/schema_name
security_result.detection_fields.key/value
EventData/Data/object_name
security_result.detection_fields.key/value
EventData/Data/statement
security_result.detection_fields.key/value
EventData/Data/network_protocol
security_result.detection_fields.key/value
EventData/Data/additional_information/connection_id
security_result.detection_fields.key/value
EventData/Data/additional_information/host_name
security_result.detection_fields.key/value
EventData/Data/additional_information/user_defined_information
security_result.detection_fields.key/value
EventData/Data/additional_information/application_name
security_result.detection_fields.key/value
EventData/Data/additional_information/client_tls_version_name
security_result.detection_fields.key/value
EventData/Data/additional_information/external_policy_permissions_checked
security_result.detection_fields.key/value
EventData/Data/additional_information/obo_middle_tier_app_id
security_result.detection_fields.key/value
Event ID 36867
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Type
Data/Type
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 36868
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
CSPName
target.resource.name
KeyName
target.resource.product_object_id
Type
security_result.detection_fields.key
security_result.detection_fields.value
CSPType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
KeyType
target.resource.attribute.labels.key
target.resource.attribute.labels.value
KeyFlags
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 36870
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Type
security_result.detection_fields.key
security_result.detection_fields.value
ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
ErrorStatus
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 36871
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Type
Data/Type
security_result.detection_fields.key
security_result.detection_fields.value
ErrorState
Data/ErrorState
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 36874
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Protocol
network.application_protocol
Event ID 36877
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
ErrorCode
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 36880
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 36881
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 36882
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
metadata.event_type = STATUS_UNCATEGORIZED
Message set to security_result.summary
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 36886
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Event ID 36887
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AlertDesc
security_result.summary
Format:
AlertDesc - %{AlertDesc}
Event ID 36888
Provider: Schannel
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountType
System/AccountType
principal.user.attribute.roles.name
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
AlertDesc
security_result.summary
Format:
AlertDesc - %{AlertDesc}
ErrorState
security_result.detection_fields.key
security_result.detection_fields.value
Event ID 40960
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = SYSTEM_AUDIT_LOG_UNCATEGORIZED
Domain
System/Domain
principal.administrative_domain
AccountName
System/AccountName
principal.user.userid
UserID
System/UserID
principal.user.windows_sid
Error
security_result.summary
Target
target.hostname
Protocol
network.application_protocol
Event ID 40970
Provider: LsaSrv
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Target
Data/Target
network.application_protocol/target.hostname/target.administrative_domain
Error
Data/Error
security_result.summary
Event ID 2147487656
version 0 / Provider: Microsoft-Windows-Winlogon
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 3221228478
Provider: Microsoft-Windows-Wininit
NXLog field
Event Viewer field
UDM field
metadata.event_type = metadata.event_type = STATUS_SHUTDOWN
security_result.description" set to "ErrorCode - %{error_code}"
Event ID 5447
Provider: Microsoft Corporation
NXLog field
Event Viewer field
UDM field
metadata.event_type = SETTING_MODIFICATION
target.resource.resource_type set to SETTING
ProviderKey
Data/ProviderKey
about.resource.attribute.labels.key/value
ProviderName
Data/ProviderName
about.resource.attribute.labels.key/value
ChangeType
Data/ChangeType
about.resource.attribute.labels.key/value
FilterKey
Data/FilterKey
about.resource.attribute.labels.key/value
FilterType
Data/FilterType
about.resource.attribute.labels.key/value
LayerKey
Data/LayerKey
about.resource.attribute.labels.key/value
LayerName
Data/LayerName
about.resource.attribute.labels.key/value
LayerId
Data/LayerId
about.resource.attribute.labels.key/value
Weight
Data/Weight
about.resource.attribute.labels.key/value
Conditions
Data/Conditions
about.resource.attribute.labels.key/value
Action
Data/Action
about.resource.attribute.labels.key/value
Data/ProcessId
principal.process.pid
UserName
Data/UserName
principal.user.userid
UserSid
Data/UserSid
principal.user.windows_sid
FilterName
Data/FilterName
target.resource.name
FilterId
Data/FilterId
target.resource.product_object_id
Event ID 403
Provider: PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
NewEngineState is set to target.labels.key/value
PreviousEngineState is set to target.labels.key/value
HostName is set to additional.fields.key/value.string_value
HostVersion is set to target.labels.key/value
HostId is set to target.labels.key/value
HostApplication is set to principal.process.command_line
EngineVersion is set to target.labels.key/value
RunspaceId is set to target.labels.key/value
PipelineId is set to target.labels.key/value
CommandName is set to target.labels.key/value
CommandType is set to target.labels.key/value
ScriptName is set to target.file.names
CommandPath is set to target.process.file.full_path
CommandLine is set to target.process.command_line
NewEngineState is set to additional.fields.key and additional.fields.value.string_value
PreviousEngineState is set to additional.fields.key and additional.fields.value.string_value
HostVersion is set to additional.fields.key and additional.fields.value.string_value
HostId is set to additional.fields.key and additional.fields.value.string_value
EngineVersion is set to additional.fields.key and additional.fields.value.string_value
RunspaceId is set to additional.fields.key and additional.fields.value.string_value
PipelineId is set to additional.fields.key and additional.fields.value.string_value
CommandName is set to additional.fields.key and additional.fields.value.string_value
CommandType is set to additional.fields.key and additional.fields.value.string_value
Event ID 4105
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
UserID
principal.user.windows_sid
Domain
principal.administrative_domain
ScriptBlockId
principal.resource.product_object_id
SourceName
target.application
Category
security_result.summary
Message
security_result.description
ProcessID
principal.process.pid
AccountType
principal.user.userid
RunspaceId
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 105
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
pid is set to target.process.pid
additional_data is set to about.labels.key/value
additional_data is set to additional.fields.key and additional.fields.value.string_value
Event ID 4440
Provider: Microsoft-Windows-Complus
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
param1
target.labels.key/value
additional.fields.key
additional.fields.value.string_value
Event ID 8200
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
Event ID 1004
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
Event ID 1014
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
Event ID 8197
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
RuleId is set to security_result.rule_id
Action is set to security_result.action_details
app_name is set to target.application
AppId is set to target.labels.key/value
SkuId is set to target.labels.key/value
NotificationInterval is set to target.labels.key/value
Trigger is set to target.labels.key/value
AppId is set to additional.fields.key and additional.fields.value.string_value
SkuId is set to additional.fields.key and additional.fields.value.string_value
NotificationInterval is set to additional.fields.key and additional.fields.value.string_value
Trigger is set to additional.fields.key and additional.fields.value.string_value
Provider : Microsoft-Windows-Powershell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
additional.fields.key
additional.fields.value_string
Event ID 20482
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 1033
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
DirectiveName is set to target.labels.key/value
AppId is set to target.labels.key/value
SkuId is set to target.labels.key/value
DirectiveName is set to additional.fields.key and additional.fields.value.string_value
AppId is set to additional.fields.key and additional.fields.value.string_value
SkuId is set to additional.fields.key and additional.fields.value.string_value
Event ID 1013
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
SkuId is set to target.labels.key/value
SkuId is set to additional.fields.key and additional.fields.value.string_value
Event ID 1067
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 12304
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 1036
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 20489
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 20481
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 1025
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
product_name is set to target.application
ProcessPath is set to target.process.file.full_path
ProcessName is set to target.process.command_line
ProcessId is set to target.process.pid
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 12305
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 12311
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 20488
Provider: Microsoft-Windows-Security-SPP
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 1281
Provider: Microsoft-Windows-TPM-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 63
Provider: Microsoft-Windows-WMI
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Job
target.resource.name
Url
target.url
Pgm
target.application
hr
security_result.summary
Format:
hr - %{hr}
Event ID 1025
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
product_name is set to target.application
ProcessPath is set to target.process.file.full_path
ProcessName is set to target.process.command_line
ProcessId is set to target.process.pid
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 11724
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Message
metadata.description
Product is set to target.application
Event ID 1005
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 1038
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 1029
Provider: MsiInstaller
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Domain
principal.administrative_domain
AccountName
principal.user.userid
UserID
principal.user.windows_sid
AccountType
principal.user.attribute.roles.name
Event ID 7030
Provider: Service Control Manager
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.appliaction is set to Printer Extensions and Notifications service
Message
metadata.description
Event ID 202
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
ActionName
security_result.action_details
TaskInstanceId
target.resource.product_object_id
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Event ID 103
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
TaskInstanceId
target.resource.product_object_id
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Event ID 119
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
InstanceId
target.resource.product_object_id
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
UserName
target.user.user_display_name
Event ID 141
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_DELETION
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
UserName
principal.user.user_display_name
Event ID 106
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
UserContext
target.user.user_display_name
Event ID 108
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
InstanceId
target.resource.product_object_id
Event ID 110
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
InstanceId
target.resource.product_object_id
UserContext
principal.user.user_display_name
Event ID 118
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_UNCATEGORIZED
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
InstanceId
target.resource.product_object_id
Event ID 142
Provider: Microsoft-Windows-TaskScheduler
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCHEDULED_TASK_DISABLE
target.resource.resource_type = TASK
TaskName
target.resource.name
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
UserName
principal.user.user_display_name
Event ID 2006
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 2001
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 216
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 2003
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 2005
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 637
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Event ID 327
Provider: ESENT
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
Message
metadata.description
Extract PID and map it to UDM field target.process.pid
Extract src_path and map it to UDM field src.file.full_path
Extract target_path and map it to UDM field target.file.full_path
Event ID 17063
Provider: MSSQLSERVER
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
security_result.description
Event ID 17137
Provider: MSSQLSERVER
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Message
metadata.description
Extract database_name and map it to UDM field target.application
Event ID 49930
Provider: MSSQLSERVER
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 852
Provider: MSSQLSERVER
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Message
metadata.description
Event ID 53504
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
target.application = IPC
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Message
metadata.description
param2
target.domain.name
Event ID 40962
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Message
metadata.description
Event ID 40961
Provider: Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_START
Domain
principal.administrative_domain
AccountName
principal.user.attribute.roles.name
UserID
principal.user.windows_sid
AccountType
principal.user.roles.description
Message
metadata.description
Event ID 530
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 531
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 532
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 533
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 534
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 535
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 536
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 537
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 539
Provider: Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = USER_LOGIN
security_result.action = FAIL
Event ID 1116
Provider: Microsoft-Windows-Windows Defender
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
security_result.action = UNKNOWN_ACTION
FWLink
additional.fields.key
additional.fields.value.string_value
ThreatName
security_result.threat_name
ThreatID
security_result.threat_id
SeverityName
security_result.detection_fields.key/value
CategoryName
security_result.category = SOFTWARE_PUA
security_result.category_details
Path
target.file.full_path
DetectionOrigin
security_result.detection_fields.key/value
DetectionType
security_result.detection_fields.key/value
DetectionSource
security_result.detection_fields.key/value
DetectionUser
target.user.userid
ProcessName
target.process.file.full_path
SecurityintelligenceVersion
security_result.detection_fields.key/value
EngineVersion
security_result.detection_fields.key/value
Product Name
additional.fields.key
additional.fields.value.string_value
Product Version
additional.fields.key
additional.fields.value.string_value
Detection ID
security_result.detection_fields.key/value
Detection Time
security_result.first_discovered_time
Severity ID
security_result.detection_fields.key/value
Category ID
security_result.detection_fields.key/value
Status Code
security_result.detection_fields.key/value
State
security_result.detection_fields.key/value
Source ID
security_result.detection_fields.key/value
Origin ID
security_result.detection_fields.key/value
Execution ID
security_result.detection_fields.key/value
Execution Name
security_result.detection_fields.key/value
Type ID
security_result.detection_fields.key/value
Pre Execution Status
security_result.detection_fields.key/value
Action ID
security_result.detection_fields.key/value
Action Name
security_result.action_details
Error Code
security_result.detection_fields.key/value
Error Description
security_result.description
Post Clean Status
security_result.detection_fields.key/value
Additional Actions ID
security_result.detection_fields.key/value
Additional Actions String
security_result.detection_fields.key/value
Event ID 10025
Provider: Microsoft-AzureADPasswordProtection-DCAgent
NXLog field
Event Viewer field
UDM field
Message
Extracted UserName field from the Message log field and mapped it to target.user.userid
Message
Extracted FullName field from the Message log field and mapped it to target.user.user_display_name
Event ID 32850
Provider : Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
param1
additional.fields.key
additional.fields.value_string
param2
principal.user.user_display_name
param3
additional.fields.key
additional.fields.value_string
Event ID 32867
Provider : Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ObjectId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
FragmentId
target.resource.product_object_id
sFlag
additional.fields.key
additional.fields.value_string
eFlag
additional.fields.key
additional.fields.value_string
FragmentLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
FragmentPayload
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 32868
Provider : Microsoft-Windows-PowerShell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ObjectId
target.resource.attribute.labels.key
target.resource.attribute.labels.value
FragmentId
target.resource.product_object_id
sFlag
additional.fields.key
additional.fields.value_string
eFlag
additional.fields.key
additional.fields.value_string
FragmentLength
target.resource.attribute.labels.key
target.resource.attribute.labels.value
FragmentPayload
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 24577
Provider : Microsoft-Windows-Powershell
NXLog field
Event Viewer field
UDM field
metadata.event_type = PROCESS_LAUNCH
FileName
target.process.file.full_path
Event ID 8194
Provider : Microsoft-Windows-Powershell
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
InstanceId
target.resource.product_object_id
MaxRunspaces
additional.fields.key
additional.fields.value_string
MinRunspaces
additional.fields.key
additional.fields.value_string
Event ID 4802
Provider : Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
TargetUserSid
principal.user.windows_sid
TargetUserName
principal.user.userid
TargetDomainName
principal.administrative_domain
TargetLogonId
additional.fields.key
additional.fields.value_string
SessionId
network.session_id
Event ID 4803
Provider : Microsoft-Windows-Security-Auditing
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
security_result.action = ALLOW
TargetUserSid
principal.user.windows_sid
TargetUserName
principal.user.userid
TargetDomainName
principal.administrative_domain
TargetLogonId
additional.fields.key
additional.fields.value_string
SessionId
network.session_id
Event ID 8001
Provider : Microsoft-Windows-WLAN-AutoConfig
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_CONNECTION
InterfaceGuid
additional.fields.key
additional.fields.value_string
InterfaceDescription
additional.fields.key
additional.fields.value_string
ConnectionMode
additional.fields.key
additional.fields.value_string
ProfileName
target.hostname
ProfileName
target.asset.hostname
SSID
target.asset.attribute.labels.key
target.asset.attribute.labels.value
BSSType
additional.fields.key
additional.fields.value_string
PHYType
additional.fields.key
additional.fields.value_string
AuthenticationAlgorithm
additional.fields.key
additional.fields.value_string
CipherAlgorithm
additional.fields.key
additional.fields.value_string
OnexEnabled
additional.fields.key
additional.fields.value_string
ConnectionId
additional.fields.key
additional.fields.value_string
NonBroadcast
additional.fields.key
additional.fields.value_string
Event ID 62
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Title
target.resource.name
Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Url
target.url
Id
target.resource.product_object_id
Event ID 70
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
clientAddress
principal.ip
Event ID 71
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
url
target.url
timestamp
additional.fields.key
additional.fields.value_string
Event ID 72
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
id
target.resource.product_object_id
url
target.url
rangecount
additional.fields.key
additional.fields.value_string
Range.offset
additional.fields.key
additional.fields.value_string
Range.length
additional.fields.key
additional.fields.value_string
Event ID 73
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 74
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
status
security_result.description
Event ID 76
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 78
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 79
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 82
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Title, PolicyValue
Title set to security_results.rule_labels.key
PolicyValue set to security_results.rule_labels.value
Event ID 83
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Title,PolicyValue
Title set to security_results.rule_labels.key
PolicyValue set to security_results.rule_labels.value
Event ID 206
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
url
target.url
Event ID 207
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
url
target.url
Event ID 208
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
jobName
target.resource.name
url
target.url
Event ID 209
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
jobId
target.resource.product_object_id
isRoaming
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 210
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
jobName
target.resource.name
url
target.url
Event ID 211
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
JobGuid
additional.fields.key
additional.fields.value_string
Title
target.resource.name
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Message
additional.fields.key
additional.fields.value_string
Event ID 212
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
SystemEvent
security_result.detection_fields
Event ID 213
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
jobName
target.resource.name
jobId
target.resource.product_object_id
FileCount
additional.fields.key
additional.fields.value_string
BlockReasonErrorCode
security_result.summary
Format:
BlockReasonErrorCode - %{BlockReasonErrorCode}
Event ID 281
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 282
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 283
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 284
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 285
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 286
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 287
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 288
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 289
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 290
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 291
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 303
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 305
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 306
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
Event ID 307
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
number
additional.fields.key
additional.fields.value_string
Event ID 308
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
number
additional.fields.key
additional.fields.value_string
Event ID 309
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 310
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 311
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
JobId
target.resource.product_object_id
JobName
target.resource.name
url
target.url
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
ErrorContext
security_result.description
bytesTransferredFromPeer
additional.fields.key
additional.fields.value_string
PeerProtocolFlags
additional.fields.key
additional.fields.value_string
Event ID 312
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 16386
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Id
target.resource.product_object_id
Title
target.resource.name
FileList
additional.fields.key
additional.fields.value_string
Event ID 16387
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Id
target.resource.product_object_id
Title
target.resource.name
Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
PropertyName
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16389
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Id
target.resource.product_object_id
Title
target.resource.name
Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
DayCount
target.resource.attribute.labels.key
target.resource.attribute.labels.value
Event ID 16390
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Id
target.resource.product_object_id
Title
target.resource.name
Owner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
RetryWaitTime
additional.fields.key
additional.fields.value_string
Event ID 16391
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 16393
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
Event ID 16395
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Event ID 16396
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
rule
security_result.rule_labels.key
security_result.rule_labels.value
enabled
security_result.rule_labels.key
security_result.rule_labels.value
status
security_result.summary
Format:
status - %{status}
Event ID 16397
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
entityName
security_result.rule_labels.key
security_result.rule_labels.value
currentSize
security_result.rule_labels.key
security_result.rule_labels.value
currentLimit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 16398
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
entityName
target.user.userid
currentSize
security_result.rule_labels.key
security_result.rule_labels.value
currentLimit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 16400
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
entityName
target.hostname
currentSize
security_result.rule_labels.key
security_result.rule_labels.value
currentLimit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 16402
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
entityName
security_result.rule_labels.key
security_result.rule_labels.value
currentSize
security_result.rule_labels.key
security_result.rule_labels.value
currentLimit
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 16403
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
User
principal.user.userid
jobTitle
target.resource.name
jobId
target.resource.product_object_id
jobOwner
target.resource.attribute.labels.key
target.resource.attribute.labels.value
fileCount
additional.fields.key
additional.fields.value_string
RemoteName
additional.fields.key
additional.fields.value_string
LocalName
additional.fields.key
additional.fields.value_string
processId
target.process.pid
ClientProcessStartKey
additional.fields.key
additional.fields.value_string
Event ID 16404
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SCAN_UNCATEGORIZED
function
security_result.detection_fields
line
security_result.detection_fields
hr
security_result.summary
Format:
hr - %{hr}
Event ID 16405
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
Key
security_result.rule_labels.key
security_result.rule_labels.value
SubKeyOrValueName
security_result.rule_labels.key
security_result.rule_labels.value
Event ID 17005
Provider : Microsoft-Windows-Bits-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = SERVICE_UNSPECIFIED
target.application = BITS
string
additional.fields.key
additional.fields.value_string
string2
additional.fields.key
additional.fields.value_string
string3
additional.fields.key
additional.fields.value_string
Event ID 1125
Provider : Microsoft-Windows-GroupPolicy
NXLog field
Event Viewer field
UDM field
metadata.event_type = STATUS_UPDATE
SupportInfo1
additional.fields.key
additional.fields.value_string
SupportInfo2
additional.fields.key
additional.fields.value_string
ProcessingMode
additional.fields.key
additional.fields.value_string
ProcessingTimeInMilliseconds
additional.fields.key
additional.fields.value_string
ErrorCode
security_result.summary
Format:
ErroCode - %{ErrorCode}
ErrorDescription
security_result.description
Event ID 3008
Provider : Microsoft-Windows-DNS-Client
NXLog field
Event Viewer field
UDM field
metadata.event_type = NETWORK_DNS
network.ip_protocol = DNS
QueryName
network.dns.questions.name
QueryType
network.dns.questions.type
QueryOptions
security_result.detection_fields
QueryStatus
security_result.detection_fields
QueryResults
security_result.summary
Format:
QueryResults - %{QueryResults}
Need more help? Get answers from Community members and Google SecOps professionals.