-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Winlogbeat] Event IDs to add to Security Module #16334
Comments
Event ID 4776 - The domain controller attempted to validate the credentials for an account. This Event ID from Domain Controllers can be very useful for tracking down user account lockouts per system. Sometimes a user might have 2 or 3 systems and they change their password and try to change it on all devices but might miss that device or script that uses the bad credentials and locks them out. Then it is up to IT to figure out what keeps locking their account out. Would love to have this event processed! |
Looks like this is on the roadmap for 7.8 :) I can wait until then. |
Hi @andrewkroh I was thinking in order to enhance the set of events we already have to work with this ones:
I can also add the event.risk_score for all the events in the security module according to the table https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor What do you think? |
@janniten, Those improvements sound great! Especially the file audit events. I know I've heard requests for these events. The risk score sounds good too. And thanks for the reminder to update the list above. I will do that soon. |
Hi @andrewkroh , I'll start to work today with those events. https://discuss.elastic.co/t/event-outcome-and-winlog-keywords-possible-bug/242353 I do not understand why appears the winlog.keywords in spanish, in the winmeta.go code the mapping is like this
Maybe because it takes the mapping from the publisherMetaData?
Thank you! |
@andrewkroh I Have created a PR (#20684) taht adds support for auidt and authorization Policy Change Events |
Here are some other useful Security logs from Windows that would be helpful. Microsoft Windows Defender (2016 and newer) Microsoft Antimalware (Older Windows servers - 2012 R2) Sample events Channel - System Extensive Windows Defender Event list here: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide |
Hey everyone, just wanted to check in on the progress for these additions and more specifically the Windows Defender events I previously posted. Would it be better to spin up a separate FR/Issue to get Defender events parsed? Lots of good information in these events that would translate to excellent Kibana Detections. |
I think it's not sustainable to keep the table updated in this issue. My recommendation is to open specific issues (or PRs 😄 ) https://github.com/elastic/integrations for events that need handling. The logs-system.security pipeline is roughly what gets incorporated into Winlogbeat 8.x. |
Microsoft has a recommend list of event IDs to monitor. We want ensure we have coverage of each of these events in our modules. The table below tracks the current state.
Thanks to @magnuslarsen for putting together the data for the table.
The text was updated successfully, but these errors were encountered: