Updated: 2020-08-04 - EventID 4661
The Windows Security Event Log is a valuable source for identifying attackers as well as monitoring anomalies within a Windows domain.
Again and again I find that there is no clear recommendation as to which events should actually be monitored, or which events can be avoided. In the following I will try to shed some light on the subject and summarize various recommendations from different sources and personal experience.
From the role of the security analyst it is always a demand to see as much as possible in a log. However, the balancing act to the resources that are available must be formed. Especially a detailed Windows Security Event Log quickly breaks any available license volume.
In this context it should also be pointed out again that for a complete monitoring not only the Windows Security Event Logs of the servers (Domain Controller) are required, but also those of the clients. For example to investigate attacks like “Golden Ticket” or different lateral movement scenarios.
Please note, the following recommendations are based on personal experience. Always evaluate first on the basis of your individual Threat Model whether you need events after all.
If you do not know which events are necessary, it is a good idea to exclude the events you do not want at all.
A comprehensive guide to blacklisting, including removing the Windows Event Description, can be found at Hurrican Labs - Hurrican Labs - Leveraging Windows Event Log Filtering and Design Techniques in Splunk. The blog is a general inspiration for logging best practices.
Furthermore it is possible to filter events of certain high volume accounts. But you should always take care to filter as explicit as possible. For example the logon type or the error code should be taken into consideration.
As a rule, these events should not occur at all. It is therefore all the more important to monitor them and to alert if they do occur.
To make the search even more detailed, machine accounts (AccountName=*$) can be excluded.
Source: Microsoft
The following events give an insight into each Windows domain. Again, it is recommended to deal with the particular event, especially since each event can have different attributes.
Especially with regard to the events for the Windows Firewall, it is important to decide individually.
Source:
The article does not claim to be complete. Also I will try to make regular updates. I already know that I have not yet considered some valuable sources.
If you’re wondering what to do with all these events, the Malware Archaeology Cheat Sheets and the Splunk Security Essentials App provide you with some starting points. I can also highly recommend watching the Splunk Blogs.