Windows Event Logs

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

flashcard set

Earn XP

Description and Tags

Security event logs

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

4624

Successful logon - Tracks user/service logins, detect lateral movement.

2
New cards

4625

Failed logon - Indicates brute-force or credential stuffing.

3
New cards

4648

Explicit credential use - Flags privilege escalation attempts.

4
New cards

4672

Privileges assigned - Detects malware or admin abuse.

5
New cards

4688

Process creation - Identifies malicious executables/scripts.

6
New cards

4698

Scheduled task created - Spots malware persistence.

7
New cards

4702

Scheduled task updated - Tracks persistence/evasion.

8
New cards

4720

User account created - Detects insider threats/attacker persistence.

9
New cards

4740

Account lockout - Signals brute-force attacks.

10
New cards

5140

Network share accessed - Monitors data exfiltration/lateral movement.

11
New cards

1102

Windows Security Audit Log is cleared

  • Indicates potential tampering or evasion of security monitoring.