Raging Rooster REM

A DFIR Blog

Windows Logs:

Log Locations:

Evidence of:

Log Description
Application Software installation, antivirus alerts, exploit attempts
Security user authentication & logons (failures/successes), user behavior and actions, file, folder, & share access, policy changes / modifications to security settings, AD/object access, process tracking (proccess start, exit, handles, object access, etc.), system events affecting security
System Windows services, system compontents, drivers, etc. Services stopped/started, System reboots

Logon Type codes:

Code Description Notes
Type 2 Interactive Logon via console (keyboard, server HKVM, virtual client)
Type 3 Network SMB, shared folders, printers, etc.
Type 4 Batch Scheduled Task, tied to specified user account
Type 5 Service Service started, tied to specified user account
Type 7 Unlock Unlocking from password protected screen saver mode, but could also be generated from RDP
Type 8 NetworkCleartext Network logon where password was sent in cleartext, scripted or IIS Basic Auth
Type 9 NewCredentials RunAS cmd to start program under diff user account with /netonly switch
Type 10 RemoteInteractive Terminal Services, RDP, Remote Assistance (prior to Win10 were type 2)
Type 11 CachedInteractive Cached creds used when not in contact with DC (facilitates mobile users), bad on servers
Type 12 CachedRemoteInteractive Cached creds used for remote interactive logon (RDP), MS live accts on stdalone wrkstations
Type 13 Cached Unlock Cached creds used for unlock operations, like Type 7

Account Usage:

Network Connection » Authentication » Logon » Session Disconnect/Reconnect » Logoff

Windows Processes:

Windows Services:

Scheduled Tasks:

Refs:

back