diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md
index 56f8c27db1..6d51af8e30 100644
--- a/windows/keep-secure/TOC.md
+++ b/windows/keep-secure/TOC.md
@@ -162,63 +162,326 @@
###### [Monitor claim types](monitor-claim-types.md)
##### [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
###### [Audit Credential Validation](audit-credential-validation.md)
-###### [Audit Kerberos Authentication Service ](audit-kerberos-authentication-service.md)
+####### [Event 4774 S: An account was mapped for logon.](event-4774.md)
+####### [Event 4775 F: An account could not be mapped for logon.](event-4775.md)
+####### [Event 4776 S, F: The computer attempted to validate the credentials for an account.](event-4776.md)
+####### [Event 4777 F: The domain controller failed to validate the credentials for an account.](event-4777.md)
+###### [Audit Kerberos Authentication Service](audit-kerberos-authentication-service.md)
+####### [Event 4768 S, F: A Kerberos authentication ticket, TGT, was requested.](event-4768.md)
+####### [Event 4771 F: Kerberos pre-authentication failed.](event-4771.md)
+####### [Event 4772 F: A Kerberos authentication ticket request failed.](event-4772.md)
###### [Audit Kerberos Service Ticket Operations](audit-kerberos-service-ticket-operations.md)
-###### [Audit Other Account Logon Events ](audit-other-account-logon-events.md)
+####### [Event 4769 S, F: A Kerberos service ticket was requested.](event-4769.md)
+####### [Event 4770 S: A Kerberos service ticket was renewed.](event-4770.md)
+####### [Event 4773 F: A Kerberos service ticket request failed.](event-4773.md)
+###### [Audit Other Account Logon Events](audit-other-account-logon-events.md)
###### [Audit Application Group Management](audit-application-group-management.md)
###### [Audit Computer Account Management](audit-computer-account-management.md)
+####### [Event 4741 S: A computer account was created.](event-4741.md)
+####### [Event 4742 S: A computer account was changed.](event-4742.md)
+####### [Event 4743 S: A computer account was deleted.](event-4743.md)
###### [Audit Distribution Group Management](audit-distribution-group-management.md)
+####### [Event 4749 S: A security-disabled global group was created.](event-4749.md)
+####### [Event 4750 S: A security-disabled global group was changed.](event-4750.md)
+####### [Event 4751 S: A member was added to a security-disabled global group.](event-4751.md)
+####### [Event 4752 S: A member was removed from a security-disabled global group.](event-4752.md)
+####### [Event 4753 S: A security-disabled global group was deleted.](event-4753.md)
###### [Audit Other Account Management Events](audit-other-account-management-events.md)
+####### [Event 4782 S: The password hash an account was accessed.](event-4782.md)
+####### [Event 4793 S: The Password Policy Checking API was called.](event-4793.md)
###### [Audit Security Group Management](audit-security-group-management.md)
+####### [Event 4731 S: A security-enabled local group was created.](event-4731.md)
+####### [Event 4732 S: A member was added to a security-enabled local group.](event-4732.md)
+####### [Event 4733 S: A member was removed from a security-enabled local group.](event-4733.md)
+####### [Event 4734 S: A security-enabled local group was deleted.](event-4734.md)
+####### [Event 4735 S: A security-enabled local group was changed.](event-4735.md)
+####### [Event 4764 S: A group’s type was changed.](event-4764.md)
+####### [Event 4799 S: A security-enabled local group membership was enumerated.](event-4799.md)
###### [Audit User Account Management](audit-user-account-management.md)
+####### [Event 4720 S: A user account was created.](event-4720.md)
+####### [Event 4722 S: A user account was enabled.](event-4722.md)
+####### [Event 4723 S, F: An attempt was made to change an account's password.](event-4723.md)
+####### [Event 4724 S, F: An attempt was made to reset an account's password.](event-4724.md)
+####### [Event 4725 S: A user account was disabled.](event-4725.md)
+####### [Event 4726 S: A user account was deleted.](event-4726.md)
+####### [Event 4738 S: A user account was changed.](event-4738.md)
+####### [Event 4740 S: A user account was locked out.](event-4740.md)
+####### [Event 4765 S: SID History was added to an account.](event-4765.md)
+####### [Event 4766 F: An attempt to add SID History to an account failed.](event-4766.md)
+####### [Event 4767 S: A user account was unlocked.](event-4767.md)
+####### [Event 4780 S: The ACL was set on accounts which are members of administrators groups.](event-4780.md)
+####### [Event 4781 S: The name of an account was changed.](event-4781.md)
+####### [Event 4794 S, F: An attempt was made to set the Directory Services Restore Mode administrator password.](event-4794.md)
+####### [Event 4798 S: A user's local group membership was enumerated.](event-4798.md)
+####### [Event 5376 S: Credential Manager credentials were backed up.](event-5376.md)
+####### [Event 5377 S: Credential Manager credentials were restored from a backup.](event-5377.md)
###### [Audit DPAPI Activity](audit-dpapi-activity.md)
+####### [Event 4692 S, F: Backup of data protection master key was attempted.](event-4692.md)
+####### [Event 4693 S, F: Recovery of data protection master key was attempted.](event-4693.md)
+####### [Event 4694 S, F: Protection of auditable protected data was attempted.](event-4694.md)
+####### [Event 4695 S, F: Unprotection of auditable protected data was attempted.](event-4695.md)
###### [Audit PNP Activity](audit-pnp-activity.md)
+####### [Event 6416 S: A new external device was recognized by the System.](event-6416.md)
+####### [Event 6419 S: A request was made to disable a device.](event-6419.md)
+####### [Event 6420 S: A device was disabled.](event-6420.md)
+####### [Event 6421 S: A request was made to enable a device.](event-6421.md)
+####### [Event 6422 S: A device was enabled.](event-6422.md)
+####### [Event 6423 S: The installation of this device is forbidden by system policy.](event-6423.md)
+####### [Event 6424 S: The installation of this device was allowed, after having previously been forbidden by policy.](event-6424.md)
###### [Audit Process Creation](audit-process-creation.md)
-###### [Audit Process Termination ](audit-process-termination.md)
+####### [Event 4688 S: A new process has been created.](event-4688.md)
+####### [Event 4696 S: A primary token was assigned to process.](event-4696.md)
+###### [Audit Process Termination](audit-process-termination.md)
+####### [Event 4689 S: A process has exited.](event-4689.md)
###### [Audit RPC Events](audit-rpc-events.md)
+####### [Event 5712 S: A Remote Procedure Call, RPC, was attempted.](event-5712.md)
###### [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+####### [Event 4928 S, F: An Active Directory replica source naming context was established.](event-4928.md)
+####### [Event 4929 S, F: An Active Directory replica source naming context was removed.](event-4929.md)
+####### [Event 4930 S, F: An Active Directory replica source naming context was modified.](event-4930.md)
+####### [Event 4931 S, F: An Active Directory replica destination naming context was modified.](event-4931.md)
+####### [Event 4934 S: Attributes of an Active Directory object were replicated.](event-4934.md)
+####### [Event 4935 F: Replication failure begins.](event-4935.md)
+####### [Event 4936 S: Replication failure ends.](event-4936.md)
+####### [Event 4937 S: A lingering object was removed from a replica.](event-4937.md)
###### [Audit Directory Service Access](audit-directory-service-access.md)
+####### [Event 4662 S, F: An operation was performed on an object.](event-4662.md)
+####### [Event 4661 S, F: A handle to an object was requested.](event-4661.md)
###### [Audit Directory Service Changes](audit-directory-service-changes.md)
+####### [Event 5136 S: A directory service object was modified.](event-5136.md)
+####### [Event 5137 S: A directory service object was created.](event-5137.md)
+####### [Event 5138 S: A directory service object was undeleted.](event-5138.md)
+####### [Event 5139 S: A directory service object was moved.](event-5139.md)
+####### [Event 5141 S: A directory service object was deleted.](event-5141.md)
###### [Audit Directory Service Replication](audit-directory-service-replication.md)
-###### [Audit Account Lockout ](audit-account-lockout.md)
+####### [Event 4932 S: Synchronization of a replica of an Active Directory naming context has begun.](event-4932.md)
+####### [Event 4933 S, F: Synchronization of a replica of an Active Directory naming context has ended.](event-4933.md)
+###### [Audit Account Lockout](audit-account-lockout.md)
+####### [Event 4625 F: An account failed to log on.](event-4625.md)
###### [Audit User/Device Claims](audit-user-device-claims.md)
+####### [Event 4626 S: User/Device claims information.](event-4626.md)
###### [Audit Group Membership](audit-group-membership.md)
+####### [Event 4627 S: Group membership information.](event-4627.md)
###### [Audit IPsec Extended Mode](audit-ipsec-extended-mode.md)
###### [Audit IPsec Main Mode](audit-ipsec-main-mode.md)
###### [Audit IPsec Quick Mode](audit-ipsec-quick-mode.md)
###### [Audit Logoff](audit-logoff.md)
+####### [Event 4634 S: An account was logged off.](event-4634.md)
+####### [Event 4647 S: User initiated logoff.](event-4647.md)
###### [Audit Logon](audit-logon.md)
+####### [Event 4624 S: An account was successfully logged on.](event-4624.md)
+####### [Event 4625 F: An account failed to log on.](event-4625.md)
+####### [Event 4648 S: A logon was attempted using explicit credentials.](event-4648.md)
+####### [Event 4675 S: SIDs were filtered.](event-4675.md)
###### [Audit Network Policy Server](audit-network-policy-server.md)
###### [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+####### [Event 4649 S: A replay attack was detected.](event-4649.md)
+####### [Event 4778 S: A session was reconnected to a Window Station.](event-4778.md)
+####### [Event 4779 S: A session was disconnected from a Window Station.](event-4779.md)
+####### [Event 4800 S: The workstation was locked.](event-4800.md)
+####### [Event 4801 S: The workstation was unlocked.](event-4801.md)
+####### [Event 4802 S: The screen saver was invoked.](event-4802.md)
+####### [Event 4803 S: The screen saver was dismissed.](event-4803.md)
+####### [Event 5378 F: The requested credentials delegation was disallowed by policy.](event-5378.md)
+####### [Event 5632 S, F: A request was made to authenticate to a wireless network.](event-5632.md)
+####### [Event 5633 S, F: A request was made to authenticate to a wired network.](event-5633.md)
###### [Audit Special Logon](audit-special-logon.md)
+####### [Event 4964 S: Special groups have been assigned to a new logon.](event-4964.md)
+####### [Event 4672 S: Special privileges assigned to new logon.](event-4672.md)
###### [Audit Application Generated](audit-application-generated.md)
###### [Audit Certification Services](audit-certification-services.md)
-###### [Audit Detailed File Share ](audit-detailed-file-share.md)
+###### [Audit Detailed File Share](audit-detailed-file-share.md)
+####### [Event 5145 S, F: A network share object was checked to see whether client can be granted desired access.](event-5145.md)
###### [Audit File Share](audit-file-share.md)
+####### [Event 5140 S, F: A network share object was accessed.](event-5140.md)
+####### [Event 5142 S: A network share object was added.](event-5142.md)
+####### [Event 5143 S: A network share object was modified.](event-5143.md)
+####### [Event 5144 S: A network share object was deleted.](event-5144.md)
+####### [Event 5168 F: SPN check for SMB/SMB2 failed.](event-5168.md)
###### [Audit File System](audit-file-system.md)
+####### [Event 4656 S, F: A handle to an object was requested.](event-4656.md)
+####### [Event 4658 S: The handle to an object was closed.](event-4658.md)
+####### [Event 4660 S: An object was deleted.](event-4660.md)
+####### [Event 4663 S: An attempt was made to access an object.](event-4663.md)
+####### [Event 4664 S: An attempt was made to create a hard link.](event-4664.md)
+####### [Event 4985 S: The state of a transaction has changed.](event-4985.md)
+####### [Event 5051: A file was virtualized.](event-5051.md)
+####### [Event 4670 S: Permissions on an object were changed.](event-4670.md)
###### [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
-###### [Audit Filtering Platform Packet Drop ](audit-filtering-platform-packet-drop.md)
+####### [Event 5031 F: The Windows Firewall Service blocked an application from accepting incoming connections on the network.](event-5031.md)
+####### [Event 5150: The Windows Filtering Platform blocked a packet.](event-5150.md)
+####### [Event 5151: A more restrictive Windows Filtering Platform filter has blocked a packet.](event-5151.md)
+####### [Event 5154 S: The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.](event-5154.md)
+####### [Event 5155 F: The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.](event-5155.md)
+####### [Event 5156 S: The Windows Filtering Platform has permitted a connection.](event-5156.md)
+####### [Event 5157 F: The Windows Filtering Platform has blocked a connection.](event-5157.md)
+####### [Event 5158 S: The Windows Filtering Platform has permitted a bind to a local port.](event-5158.md)
+####### [Event 5159 F: The Windows Filtering Platform has blocked a bind to a local port.](event-5159.md)
+###### [Audit Filtering Platform Packet Drop](audit-filtering-platform-packet-drop.md)
+####### [Event 5152 F: The Windows Filtering Platform blocked a packet.](event-5152.md)
+####### [Event 5153 S: A more restrictive Windows Filtering Platform filter has blocked a packet.](event-5153.md)
###### [Audit Handle Manipulation](audit-handle-manipulation.md)
-###### [Audit Kernel Object ](audit-kernel-object.md)
+####### [Event 4690 S: An attempt was made to duplicate a handle to an object.](event-4690.md)
+###### [Audit Kernel Object](audit-kernel-object.md)
+####### [Event 4656 S, F: A handle to an object was requested.](event-4656.md)
+####### [Event 4658 S: The handle to an object was closed.](event-4658.md)
+####### [Event 4660 S: An object was deleted.](event-4660.md)
+####### [Event 4663 S: An attempt was made to access an object.](event-4663.md)
###### [Audit Other Object Access Events](audit-other-object-access-events.md)
+####### [Event 4671: An application attempted to access a blocked ordinal through the TBS.](event-4671.md)
+####### [Event 4691 S: Indirect access to an object was requested.](event-4691.md)
+####### [Event 5148 F: The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.](event-5148.md)
+####### [Event 5149 F: The DoS attack has subsided and normal processing is being resumed.](event-5149.md)
+####### [Event 4698 S: A scheduled task was created.](event-4698.md)
+####### [Event 4699 S: A scheduled task was deleted.](event-4699.md)
+####### [Event 4700 S: A scheduled task was enabled.](event-4700.md)
+####### [Event 4701 S: A scheduled task was disabled.](event-4701.md)
+####### [Event 4702 S: A scheduled task was updated.](event-4702.md)
+####### [Event 5888 S: An object in the COM+ Catalog was modified.](event-5888.md)
+####### [Event 5889 S: An object was deleted from the COM+ Catalog.](event-5889.md)
+####### [Event 5890 S: An object was added to the COM+ Catalog.](event-5890.md)
###### [Audit Registry](audit-registry.md)
+####### [Event 4663 S: An attempt was made to access an object.](event-4663.md)
+####### [Event 4656 S, F: A handle to an object was requested.](event-4656.md)
+####### [Event 4658 S: The handle to an object was closed.](event-4658.md)
+####### [Event 4660 S: An object was deleted.](event-4660.md)
+####### [Event 4657 S: A registry value was modified.](event-4657.md)
+####### [Event 5039: A registry key was virtualized.](event-5039.md)
+####### [Event 4670 S: Permissions on an object were changed.](event-4670.md)
###### [Audit Removable Storage](audit-removable-storage.md)
-###### [Audit SAM ](audit-sam.md)
+###### [Audit SAM](audit-sam.md)
+####### [Event 4661 S, F: A handle to an object was requested.](event-4661.md)
###### [Audit Central Access Policy Staging](audit-central-access-policy-staging.md)
+####### [Event 4818 S: Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.](event-4818.md)
###### [Audit Audit Policy Change](audit-audit-policy-change.md)
+####### [Event 4670 S: Permissions on an object were changed.](event-4670.md)
+####### [Event 4715 S: The audit policy, SACL, on an object was changed.](event-4715.md)
+####### [Event 4719 S: System audit policy was changed.](event-4719.md)
+####### [Event 4817 S: Auditing settings on object were changed.](event-4817.md)
+####### [Event 4902 S: The Per-user audit policy table was created.](event-4902.md)
+####### [Event 4906 S: The CrashOnAuditFail value has changed.](event-4906.md)
+####### [Event 4907 S: Auditing settings on object were changed.](event-4907.md)
+####### [Event 4908 S: Special Groups Logon table modified.](event-4908.md)
+####### [Event 4912 S: Per User Audit Policy was changed.](event-4912.md)
+####### [Event 4904 S: An attempt was made to register a security event source.](event-4904.md)
+####### [Event 4905 S: An attempt was made to unregister a security event source.](event-4905.md)
###### [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+####### [Event 4706 S: A new trust was created to a domain.](event-4706.md)
+####### [Event 4707 S: A trust to a domain was removed.](event-4707.md)
+####### [Event 4716 S: Trusted domain information was modified.](event-4716.md)
+####### [Event 4713 S: Kerberos policy was changed.](event-4713.md)
+####### [Event 4717 S: System security access was granted to an account.](event-4717.md)
+####### [Event 4718 S: System security access was removed from an account.](event-4718.md)
+####### [Event 4739 S: Domain Policy was changed.](event-4739.md)
+####### [Event 4864 S: A namespace collision was detected.](event-4864.md)
+####### [Event 4865 S: A trusted forest information entry was added.](event-4865.md)
+####### [Event 4866 S: A trusted forest information entry was removed.](event-4866.md)
+####### [Event 4867 S: A trusted forest information entry was modified.](event-4867.md)
###### [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+####### [Event 4703 S: A user right was adjusted.](event-4703.md)
+####### [Event 4704 S: A user right was assigned.](event-4704.md)
+####### [Event 4705 S: A user right was removed.](event-4705.md)
+####### [Event 4670 S: Permissions on an object were changed.](event-4670.md)
+####### [Event 4911 S: Resource attributes of the object were changed.](event-4911.md)
+####### [Event 4913 S: Central Access Policy on the object was changed.](event-4913.md)
###### [Audit Filtering Platform Policy Change](audit-filtering-platform-policy-change.md)
###### [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+####### [Event 4944 S: The following policy was active when the Windows Firewall started.](event-4944.md)
+####### [Event 4945 S: A rule was listed when the Windows Firewall started.](event-4945.md)
+####### [Event 4946 S: A change has been made to Windows Firewall exception list. A rule was added.](event-4946.md)
+####### [Event 4947 S: A change has been made to Windows Firewall exception list. A rule was modified.](event-4947.md)
+####### [Event 4948 S: A change has been made to Windows Firewall exception list. A rule was deleted.](event-4948.md)
+####### [Event 4949 S: Windows Firewall settings were restored to the default values.](event-4949.md)
+####### [Event 4950 S: A Windows Firewall setting has changed.](event-4950.md)
+####### [Event 4951 F: A rule has been ignored because its major version number was not recognized by Windows Firewall.](event-4951.md)
+####### [Event 4952 F: Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.](event-4952.md)
+####### [Event 4953 F: Windows Firewall ignored a rule because it could not be parsed.](event-4953.md)
+####### [Event 4954 S: Windows Firewall Group Policy settings have changed. The new settings have been applied.](event-4954.md)
+####### [Event 4956 S: Windows Firewall has changed the active profile.](event-4956.md)
+####### [Event 4957 F: Windows Firewall did not apply the following rule.](event-4957.md)
+####### [Event 4958 F: Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.](event-4958.md)
###### [Audit Other Policy Change Events](audit-other-policy-change-events.md)
-###### [Audit Sensitive Privilege Use ](audit-sensitive-privilege-use.md)
-###### [Audit Non-Sensitive Privilege Use ](audit-non-sensitive-privilege-use.md)
-###### [Audit Other Privilege Use Events ](audit-other-privilege-use-events.md)
+####### [Event 4714 S: Encrypted data recovery policy was changed.](event-4714.md)
+####### [Event 4819 S: Central Access Policies on the machine have been changed.](event-4819.md)
+####### [Event 4826 S: Boot Configuration Data loaded.](event-4826.md)
+####### [Event 4909: The local policy settings for the TBS were changed.](event-4909.md)
+####### [Event 4910: The group policy settings for the TBS were changed.](event-4910.md)
+####### [Event 5063 S, F: A cryptographic provider operation was attempted.](event-5063.md)
+####### [Event 5064 S, F: A cryptographic context operation was attempted.](event-5064.md)
+####### [Event 5065 S, F: A cryptographic context modification was attempted.](event-5065.md)
+####### [Event 5066 S, F: A cryptographic function operation was attempted.](event-5066.md)
+####### [Event 5067 S, F: A cryptographic function modification was attempted.](event-5067.md)
+####### [Event 5068 S, F: A cryptographic function provider operation was attempted.](event-5068.md)
+####### [Event 5069 S, F: A cryptographic function property operation was attempted.](event-5069.md)
+####### [Event 5070 S, F: A cryptographic function property modification was attempted.](event-5070.md)
+####### [Event 5447 S: A Windows Filtering Platform filter has been changed.](event-5447.md)
+####### [Event 6144 S: Security policy in the group policy objects has been applied successfully.](event-6144.md)
+####### [Event 6145 F: One or more errors occurred while processing security policy in the group policy objects.](event-6145.md)
+###### [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md)
+####### [Event 4673 S, F: A privileged service was called.](event-4673.md)
+####### [Event 4674 S, F: An operation was attempted on a privileged object.](event-4674.md)
+####### [Event 4985 S: The state of a transaction has changed.](event-4985.md)
+###### [Audit Non Sensitive Privilege Use](audit-non-sensitive-privilege-use.md)
+####### [Event 4673 S, F: A privileged service was called.](event-4673.md)
+####### [Event 4674 S, F: An operation was attempted on a privileged object.](event-4674.md)
+####### [Event 4985 S: The state of a transaction has changed.](event-4985.md)
+###### [Audit Other Privilege Use Events](audit-other-privilege-use-events.md)
+####### [Event 4985 S: The state of a transaction has changed.](event-4985.md)
###### [Audit IPsec Driver](audit-ipsec-driver.md)
###### [Audit Other System Events](audit-other-system-events.md)
+####### [Event 5024 S: The Windows Firewall Service has started successfully.](event-5024.md)
+####### [Event 5025 S: The Windows Firewall Service has been stopped.](event-5025.md)
+####### [Event 5027 F: The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.](event-5027.md)
+####### [Event 5028 F: The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.](event-5028.md)
+####### [Event 5029 F: The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.](event-5029.md)
+####### [Event 5030 F: The Windows Firewall Service failed to start.](event-5030.md)
+####### [Event 5032 F: Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.](event-5032.md)
+####### [Event 5033 S: The Windows Firewall Driver has started successfully.](event-5033.md)
+####### [Event 5034 S: The Windows Firewall Driver was stopped.](event-5034.md)
+####### [Event 5035 F: The Windows Firewall Driver failed to start.](event-5035.md)
+####### [Event 5037 F: The Windows Firewall Driver detected critical runtime error. Terminating.](event-5037.md)
+####### [Event 5058 S, F: Key file operation.](event-5058.md)
+####### [Event 5059 S, F: Key migration operation.](event-5059.md)
+####### [Event 6400: BranchCache: Received an incorrectly formatted response while discovering availability of content.](event-6400.md)
+####### [Event 6401: BranchCache: Received invalid data from a peer. Data discarded.](event-6401.md)
+####### [Event 6402: BranchCache: The message to the hosted cache offering it data is incorrectly formatted.](event-6402.md)
+####### [Event 6403: BranchCache: The hosted cache sent an incorrectly formatted response to the client.](event-6403.md)
+####### [Event 6404: BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.](event-6404.md)
+####### [Event 6405: BranchCache: %2 instances of event id %1 occurred.](event-6405.md)
+####### [Event 6406: %1 registered to Windows Firewall to control filtering for the following: %2.](event-6406.md)
+####### [Event 6407: 1%.](event-6407.md)
+####### [Event 6408: Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.](event-6408.md)
+####### [Event 6409: BranchCache: A service connection point object could not be parsed.](event-6409.md)
###### [Audit Security State Change](audit-security-state-change.md)
+####### [Event 4608 S: Windows is starting up.](event-4608.md)
+####### [Event 4616 S: The system time was changed.](event-4616.md)
+####### [Event 4621 S: Administrator recovered system from CrashOnAuditFail.](event-4621.md)
###### [Audit Security System Extension](audit-security-system-extension.md)
+####### [Event 4610 S: An authentication package has been loaded by the Local Security Authority.](event-4610.md)
+####### [Event 4611 S: A trusted logon process has been registered with the Local Security Authority.](event-4611.md)
+####### [Event 4614 S: A notification package has been loaded by the Security Account Manager.](event-4614.md)
+####### [Event 4622 S: A security package has been loaded by the Local Security Authority.](event-4622.md)
+####### [Event 4697 S: A service was installed in the system.](event-4697.md)
###### [Audit System Integrity](audit-system-integrity.md)
+####### [Event 4612 S: Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.](event-4612.md)
+####### [Event 4615 S: Invalid use of LPC port.](event-4615.md)
+####### [Event 4618 S: A monitored security event pattern has occurred.](event-4618.md)
+####### [Event 4816 S: RPC detected an integrity violation while decrypting an incoming message.](event-4816.md)
+####### [Event 5038 F: Code integrity determined that the image hash of a file is not valid.](event-5038.md)
+####### [Event 5056 S: A cryptographic self-test was performed.](event-5056.md)
+####### [Event 5062 S: A kernel-mode cryptographic self-test was performed.](event-5062.md)
+####### [Event 5057 F: A cryptographic primitive operation failed.](event-5057.md)
+####### [Event 5060 F: Verification operation failed.](event-5060.md)
+####### [Event 5061 S, F: Cryptographic operation.](event-5061.md)
+####### [Event 6281 F: Code Integrity determined that the page hashes of an image file are not valid.](event-6281.md)
+####### [Event 6410 F: Code integrity determined that a file does not meet the security requirements to load into a process.](event-6410.md)
+###### [Other Events](other-events.md)
+####### [Event 1100 S: The event logging service has shut down.](event-1100.md)
+####### [Event 1102 S: The audit log was cleared.](event-1102.md)
+####### [Event 1104 S: The security log is now full.](event-1104.md)
+####### [Event 1105 S: Event log automatic backup.](event-1105.md)
+####### [Event 1108 S: The event logging service encountered an error while processing an incoming event published from %1.](event-1108.md)
+###### [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md)
###### [Registry (Global Object Access Auditing) ](registry-global-object-access-auditing.md)
###### [File System (Global Object Access Auditing) ](file-system-global-object-access-auditing.md)
### [Security policy settings](security-policy-settings.md)
diff --git a/windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md b/windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md
new file mode 100644
index 0000000000..626a7162a6
--- /dev/null
+++ b/windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md
@@ -0,0 +1,29 @@
+---
+title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
+description: Appendix A, Security monitoring recommendations for many audit events
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# Appendix A: Security monitoring recommendations for many audit events
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This document, the [Advanced security audit policy settings](advanced-security-audit-policy-settings.md) reference, provides information about individual audit events, and lists them within audit categories and subcategories. However, there are many events for which the following overall recommendations apply. There are links throughout this document from the “Recommendations” sections of the relevant events to this appendix.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor relevant events for the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor relevant events for the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | Monitor the relevant events for **“Subject\\Security ID”** accounts that are outside the whitelist of accounts. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | Identify events that correspond to the actions you want to monitor, and for those events, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor the specific events for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
diff --git a/windows/keep-secure/audit-account-lockout.md b/windows/keep-secure/audit-account-lockout.md
index be3326efee..4085b5a63b 100644
--- a/windows/keep-secure/audit-account-lockout.md
+++ b/windows/keep-secure/audit-account-lockout.md
@@ -2,35 +2,41 @@
title: Audit Account Lockout (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Account Lockout
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Account Lockout**, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
+
+Audit Account Lockout enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and failure audits record unsuccessful attempts.
Account lockout events are essential for understanding user activity and detecting potential attacks.
-Event volume: Low
+**Event volume**: Low.
-Default setting: Success
+This subcategory failure logon attempts, when account was already locked out.
-| Event ID | Event message |
-| - | - |
-| 4625 | An account failed to log on. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | Yes | No | Yes | We recommend tracking account lockouts, especially for high value domain or local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesn’t have Success events, so there is no recommendation to enable Success auditing for this subcategory. |
+| Member Server | No | Yes | No | Yes | We recommend tracking account lockouts, especially for high value domain or local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesn’t have Success events, so there is no recommendation to enable Success auditing for this subcategory. |
+| Workstation | No | Yes | No | Yes | We recommend tracking account lockouts, especially for high value domain or local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesn’t have Success events, so there is no recommendation to enable Success auditing for this subcategory. |
+
+**Events List:**
+
+- [4625](event-4625.md)(F): An account failed to log on.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-application-generated.md b/windows/keep-secure/audit-application-generated.md
index 3aa2716aa8..5ba97a5c15 100644
--- a/windows/keep-secure/audit-application-generated.md
+++ b/windows/keep-secure/audit-application-generated.md
@@ -2,39 +2,41 @@
title: Audit Application Generated (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Application Generated
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Application Generated**, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
-The following events can generate audit activity:
+Audit Application Generated generates events for actions related to Authorization Manager [applications](https://technet.microsoft.com/en-us/library/cc770563.aspx).
-- Creation, deletion, or initialization of an application client context
-- Application operations
+Audit Application Generated subcategory is out of scope of this document, because [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx) is very rarely in use and it is deprecated starting from Windows Server 2012.
-Applications that are designed to use the Windows Auditing APIs can use this subcategory to log auditing events that are related to those APIs. The level, volume, relevance, and importance of these audit events depend on the application that generates them. The operating system logs the events as they are generated by the application.
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF – if you use [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx) in your environment and you need to monitor events related to Authorization Manager [applications](https://technet.microsoft.com/en-us/library/cc770563.aspx), enable this subcategory. |
+| Member Server | IF | IF | IF | IF | IF – if you use [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx) in your environment and you need to monitor events related to Authorization Manager [applications](https://technet.microsoft.com/en-us/library/cc770563.aspx), enable this subcategory. |
+| Workstation | IF | IF | IF | IF | IF – if you use [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx) in your environment and you need to monitor events related to Authorization Manager [applications](https://technet.microsoft.com/en-us/library/cc770563.aspx), enable this subcategory. |
-Event volume: Depends on the installed app's use of the Windows Auditing APIs
+**Events List:**
-Default: Not configured
+## 4665: An attempt was made to create an application client context.
-| Event ID | Event message |
-| - | - |
-| 4665 | An attempt was made to create an application client context. |
-| 4666 | An application attempted an operation: |
-| 4667 | An application client context was deleted. |
-
-## Related topics
+## 4666: An application attempted an operation.
+
+## 4667: An application client context was deleted.
+
+## 4668: An application was initialized.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-application-group-management.md b/windows/keep-secure/audit-application-group-management.md
index 76cdabda54..0deb3d5319 100644
--- a/windows/keep-secure/audit-application-group-management.md
+++ b/windows/keep-secure/audit-application-group-management.md
@@ -2,42 +2,53 @@
title: Audit Application Group Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Application Group Management
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Application Group Management**, which determines whether the operating system generates audit events when application group management tasks are performed.
-Application group management tasks include:
+Audit Application Group Management generates events for actions related to [application groups](https://technet.microsoft.com/en-us/library/cc771579.aspx), such as group creation, modification, addition or removal of group member and some other actions.
-- An application group is created, changed, or deleted.
-- A member is added to or removed from an application group.
+[Application groups](https://technet.microsoft.com/en-us/library/cc771579.aspx) are used by [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx).
-Event volume: Low
+Audit Application Group Management subcategory is out of scope of this document, because [Authorization Manager](https://technet.microsoft.com/en-us/library/cc726036.aspx) is very rarely in use and it is deprecated starting from Windows Server 2012.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------|
+| Domain Controller | - | - | - | - | This subcategory is outside the scope of this document. |
+| Member Server | - | - | - | - | This subcategory is outside the scope of this document. |
+| Workstation | - | - | - | - | This subcategory is outside the scope of this document. |
-| Event ID | Event message |
-| - | - |
-| 4783 | A basic application group was created. |
-| 4784 | A basic application group was changed. |
-| 4785 | A member was added to a basic application group. |
-| 4786 | A member was removed from a basic application group. |
-| 4787 | A non-member was added to a basic application group. |
-| 4788 | A non-member was removed from a basic application group. |
-| 4789 | A basic application group was deleted. |
-| 4790 | An LDAP query group was created. |
-
-## Related topics
+## 4783(S): A basic application group was created.
+
+## 4784(S): A basic application group was changed.
+
+## 4785(S): A member was added to a basic application group.
+
+## 4786(S): A member was removed from a basic application group.
+
+## 4787(S): A non-member was added to a basic application group.
+
+## 4788(S): A non-member was removed from a basic application group.
+
+## 4789(S): A basic application group was deleted.
+
+## 4790(S): An LDAP query group was created.
+
+## 4791(S): An LDAP query group was changed.
+
+## 4792(S): An LDAP query group was deleted.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-audit-policy-change.md b/windows/keep-secure/audit-audit-policy-change.md
index de2aca1b0a..c29f789d2c 100644
--- a/windows/keep-secure/audit-audit-policy-change.md
+++ b/windows/keep-secure/audit-audit-policy-change.md
@@ -2,54 +2,83 @@
title: Audit Audit Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Audit Policy Change, which determines whether the operating system generates audit events when changes are made to audit policy.
ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Audit Policy Change
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Audit Policy Change**, which determines whether the operating system generates audit events when changes are made to audit policy.
+
+Audit Audit Policy Change determines whether the operating system generates audit events when changes are made to audit policy.
+
+**Event volume**: Low.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | Almost all events in this subcategory have security relevance and should be monitored.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | Almost all events in this subcategory have security relevance and should be monitored.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | Almost all events in this subcategory have security relevance and should be monitored.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
Changes to audit policy that are audited include:
-- Changing permissions and audit settings on the audit policy object (by using **auditpol /set /sd**).
-- Changing the system audit policy.
-- Registering and unregistering security event sources.
-- Changing per-user audit settings.
-- Changing the value of **CrashOnAuditFail**.
-- Changing audit settings on an object (for example, modifying the system access control list (SACL) for a file or registry key).
+- Changing permissions and audit settings on the audit policy object (by using “auditpol /set /sd” command).
+
+- Changing the system audit policy.
+
+- Registering and unregistering security event sources.
+
+- Changing per-user audit settings.
+
+- Changing the value of CrashOnAuditFail.
+
+- Changing audit settings on an object (for example, modifying the system access control list ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)) for a file or registry key).
+
+> **Note** [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) change auditing is performed when a SACL for an object has changed and the Policy Change category is configured. Discretionary access control list (DACL) and owner change auditing are performed when Object Access auditing is configured and the object's SACL is set for auditing of the DACL or owner change.
- > **Note:** SACL change auditing is performed when a SACL for an object has changed and the Policy Change category is configured. Discretionary access control list (DACL) and owner change auditing are performed when Object Access auditing is configured and the object's SACL is set for auditing of the DACL or owner change.
-
- Changing anything in the Special Groups list.
-> **Important:** Changes to the audit policy are critical security events.
-
-Event volume: Low
+The following events will be enabled with Success auditing in this subcategory:
-Default: Success
+- 4902(S): The Per-user audit policy table was created.
-| Event ID | Event message |
-| - | - |
-| 4715 | The audit policy (SACL) on an object was changed. |
-| 4719 | System audit policy was changed. |
-| 4817 | Auditing settings on an object were changed.
**Note: ** This event is logged only on computers running the supported versions of the Windows operating system. |
-| 4902 | The Per-user audit policy table was created. |
-| 4904 | An attempt was made to register a security event source. |
-| 4905 | An attempt was made to unregister a security event source. |
-| 4906 | The CrashOnAuditFail value has changed. |
-| 4907 | Auditing settings on object were changed. |
-| 4908 | Special Groups Logon table modified. |
-| 4912 | Per User Audit Policy was changed. |
-
-## Related topics
+- 4907(S): Auditing settings on object were changed.
+
+- 4904(S): An attempt was made to register a security event source.
+
+- 4905(S): An attempt was made to unregister a security event source.
+
+All other events in this subcategory will be logged regardless of the "Audit Policy Change" setting.
+
+**Events List:**
+
+- [4715](event-4715.md)(S): The audit policy (SACL) on an object was changed.
+
+- [4719](event-4719.md)(S): System audit policy was changed.
+
+- [4817](event-4817.md)(S): Auditing settings on object were changed.
+
+- [4902](event-4902.md)(S): The Per-user audit policy table was created.
+
+- [4906](event-4906.md)(S): The CrashOnAuditFail value has changed.
+
+- [4907](event-4907.md)(S): Auditing settings on object were changed.
+
+- [4908](event-4908.md)(S): Special Groups Logon table modified.
+
+- [4912](event-4912.md)(S): Per User Audit Policy was changed.
+
+- [4904](event-4904.md)(S): An attempt was made to register a security event source.
+
+- [4905](event-4905.md)(S): An attempt was made to unregister a security event source.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-authentication-policy-change.md b/windows/keep-secure/audit-authentication-policy-change.md
index 712e480800..2c23a6ded7 100644
--- a/windows/keep-secure/audit-authentication-policy-change.md
+++ b/windows/keep-secure/audit-authentication-policy-change.md
@@ -2,55 +2,79 @@
title: Audit Authentication Policy Change (Windows 10)
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Authentication Policy Change
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes this Advanced Security Audit policy setting, **Audit Authentication Policy Change**, which determines whether the operating system generates audit events when changes are made to authentication policy.
+
+Audit Authentication Policy Change determines whether the operating system generates audit events when changes are made to authentication policy.
Changes made to authentication policy include:
- Creation, modification, and removal of forest and domain trusts.
-- Changes to Kerberos policy under **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy**.
- > **Note:** The audit event is logged when the policy is applied, not when settings are modified by the administrator.
-
-- When any of the following user rights is granted to a user or group:
- - **Access this computer from the network**
- - **Allow logon locally**
- - **Allow logon through Remote Desktop**
- - **Logon as a batch job**
- - **Logon as a service**
+- Changes to Kerberos policy under Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy.
+
+- When any of the following user logon rights is granted to a user or group:
+
+ - Access this computer from the network
+
+ - Allow logon locally
+
+ - Allow logon through Remote Desktop
+
+ - Logon as a batch job
+
+ - Logon as a service
+
- Namespace collision, such as when an added trust collides with an existing namespace name.
This setting is useful for tracking changes in domain-level and forest-level trust and privileges that are granted to user accounts or groups.
-Event volume: Low
+**Event volume**: Low.
-Default: Success
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | On domain controllers, it is important to enable Success audit for this subcategory to be able to get information related to operations with domain and forest trusts, changes in Kerberos policy and some other events included in this subcategory.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | On member servers it is important to enable Success audit for this subcategory to be able to get information related to changes in user logon rights policies and password policy changes.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | On workstations it is important to enable Success audit for this subcategory to be able to get information related to changes in user logon rights policies and password policy changes.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4670](event-4670.md)(S): Permissions on an object were changed
+
+- [4706](event-4706.md)(S): A new trust was created to a domain.
+
+- [4707](event-4707.md)(S): A trust to a domain was removed.
+
+- [4716](event-4716.md)(S): Trusted domain information was modified.
+
+- [4713](event-4713.md)(S): Kerberos policy was changed.
+
+- [4717](event-4717.md)(S): System security access was granted to an account.
+
+- [4718](event-4718.md)(S): System security access was removed from an account.
+
+- [4739](event-4739.md)(S): Domain Policy was changed.
+
+- [4864](event-4864.md)(S): A namespace collision was detected.
+
+- [4865](event-4865.md)(S): A trusted forest information entry was added.
+
+- [4866](event-4866.md)(S): A trusted forest information entry was removed.
+
+- [4867](event-4867.md)(S): A trusted forest information entry was modified.
-| Event ID | Event message |
-| - | - |
-| 4713 | Kerberos policy was changed. |
-| 4716 | Trusted domain information was modified. |
-| 4717 | System security access was granted to an account. |
-| 4718 | System security access was removed from an account. |
-| 4739 | Domain Policy was changed. |
-| 4864 | A namespace collision was detected. |
-| 4865 | A trusted forest information entry was added. |
-| 4866 | A trusted forest information entry was removed. |
-| 4867 | A trusted forest information entry was modified. |
-
-## Related topics
-
- - [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-authorization-policy-change.md b/windows/keep-secure/audit-authorization-policy-change.md
index 7e426a2044..6b5711357a 100644
--- a/windows/keep-secure/audit-authorization-policy-change.md
+++ b/windows/keep-secure/audit-authorization-policy-change.md
@@ -2,39 +2,45 @@
title: Audit Authorization Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Authorization Policy Change
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Authorization Policy Change**, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
-Authorization policy changes that can be audited include:
+Audit Authorization Policy Change allows you to audit assignment and removal of user rights in user right policies, changes in security token object permission, resource attributes changes and Central Access Policy changes for file system objects.
-- Assigning or removing user rights (privileges) such as **SeCreateTokenPrivilege**, except for the system access rights that are audited by using the [Audit Authentication Policy Change](audit-authentication-policy-change.md) subcategory.
-- Changing the Encrypting File System (EFS) policy.
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | It is important to enable Success audit for this subcategory to be able to get information related to changes in user rights policies.
Enable Success audit for this subcategory also if you need to monitor changes of resource attributes or Central Access Policy applied to file system objects.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | It is important to enable Success audit for this subcategory to be able to get information related to changes in user rights policies.
Enable Success audit for this subcategory also if you need to monitor changes of resource attributes or Central Access Policy applied to file system objects.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | It is important to enable Success audit for this subcategory to be able to get information related to changes in user rights policies.
Enable Success audit for this subcategory also if you need to monitor changes of resource attributes or Central Access Policy applied to file system objects.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
-Event volume: Very high
+**Events List:**
-Default: Not configured
+- [4703](event-4703.md)(S): A user right was adjusted.
-| Event ID | Event message |
-| - | - |
-| 4704 | A user right was assigned. |
-| 4705 | A user right was removed. |
-| 4706 | A new trust was created to a domain. |
-| 4707 | A trust to a domain was removed. |
-| 4714 | Encrypted data recovery policy was changed. |
-
-## Related topics
+- [4704](event-4704.md)(S): A user right was assigned.
+
+- [4705](event-4705.md)(S): A user right was removed.
+
+- [4670](event-4670.md)(S): Permissions on an object were changed.
+
+- [4911](event-4911.md)(S): Resource attributes of the object were changed.
+
+- [4913](event-4913.md)(S): Central Access Policy on the object was changed.
+
+**Event volume**: Medium.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-central-access-policy-staging.md b/windows/keep-secure/audit-central-access-policy-staging.md
index 28539eb491..207c079556 100644
--- a/windows/keep-secure/audit-central-access-policy-staging.md
+++ b/windows/keep-secure/audit-central-access-policy-staging.md
@@ -2,30 +2,43 @@
title: Audit Central Access Policy Staging (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy.
ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Central Access Policy Staging
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Central Access Policy Staging**, which determines permissions on a Central Access Policy.
-Event volume: Medium
+Audit Central Access Policy Staging allows you to audit access requests where a permission granted or denied by a proposed policy differs from the current central access policy on an object.
-Default: Not configured
+If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event is generated as follows:
-| Event ID | Event message |
-| - | - |
-| 4818 | Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy |
-
-## Related topics
+- Success audits, when configured, record access attempts when the current central access policy grants access, but the proposed policy denies access.
+
+- Failure audits, when configured, record access attempts when:
+
+ - The current central access policy does not grant access, but the proposed policy grants access.
+
+ - A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | No | IF | No | IF - Enable this subcategory if you need to test or troubleshoot Dynamic Access Control Proposed [Central Access Policies](https://technet.microsoft.com/en-us/library/hh831425.aspx).
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | IF | No | IF | No | IF - Enable this subcategory if you need to test or troubleshoot Dynamic Access Control Proposed [Central Access Policies](https://technet.microsoft.com/en-us/library/hh831425.aspx).
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | IF | No | IF | No | IF - Enable this subcategory if you need to test or troubleshoot Dynamic Access Control Proposed [Central Access Policies](https://technet.microsoft.com/en-us/library/hh831425.aspx).
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4818](event-4818.md)(S): Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-certification-services.md b/windows/keep-secure/audit-certification-services.md
index f5aa0959d7..33ee066f97 100644
--- a/windows/keep-secure/audit-certification-services.md
+++ b/windows/keep-secure/audit-certification-services.md
@@ -1,77 +1,122 @@
---
title: Audit Certification Services (Windows 10)
-description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (AD CS) operations are performed.
+description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed.
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Certification Services
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Certification Services**, which determines whether the operating system generates events when Active Directory Certificate Services (AD CS) operations are performed.
-Examples of AD CS operations include:
+Audit Certification Services determines whether the operating system generates events when Active Directory Certificate Services (AD CS) operations are performed.
+
+Examples of AD CS operations include:
+
+- AD CS starts, shuts down, is backed up, or is restored.
-- AD CS starts, shuts down, is backed up, or is restored.
- Certificate revocation list (CRL)-related tasks are performed.
+
- Certificates are requested, issued, or revoked.
-- Certificate manager settings for AD CS are changed.
+
+- Certificate manager settings for AD CS are changed.
+
- The configuration and properties of the certification authority (CA) are changed.
-- AD CS templates are modified.
+
+- AD CS templates are modified.
+
- Certificates are imported.
+
- A CA certificate is published to Active Directory Domain Services.
+
- Security permissions for AD CS role services are modified.
+
- Keys are archived, imported, or retrieved.
+
- The OCSP Responder Service is started or stopped.
Monitoring these operational events is important to ensure that AD CS role services are functioning properly.
-Event volume: Low to medium on servers that host AD CS role services
+**Event volume: Low to medium on servers that provide AD CS role services.**
-Default: Not configured
+Role-specific subcategories are outside the scope of this document.
-| Event ID | Event message |
-| - | - |
-| 4868 | The certificate manager denied a pending certificate request. |
-| 4869 | Certificate Services received a resubmitted certificate request. |
-| 4870 | Certificate Services revoked a certificate. |
-| 4871 | Certificate Services received a request to publish the certificate revocation list (CRL). |
-| 4872 | Certificate Services published the certificate revocation list (CRL). |
-| 4873 | A certificate request extension changed. |
-| 4874 | One or more certificate request attributes changed. |
-| 4875 | Certificate Services received a request to shut down. |
-| 4876 | Certificate Services backup started. |
-| 4877 | Certificate Services backup completed. |
-| 4878 | Certificate Services restore started. |
-| 4879 | Certificate Services restore completed. |
-| 4880 | Certificate Services started. |
-| 4881 | Certificate Services stopped. |
-| 4882 | The security permissions for Certificate Services changed. |
-| 4883 | Certificate Services retrieved an archived key. |
-| 4884 | Certificate Services imported a certificate into its database. |
-| 4885 | The audit filter for Certificate Services changed. |
-| 4886 | Certificate Services received a certificate request. |
-| 4887 | Certificate Services approved a certificate request and issued a certificate. |
-| 4888 | Certificate Services denied a certificate request. |
-| 4889 | Certificate Services set the status of a certificate request to pending. |
-| 4890 | The certificate manager settings for Certificate Services changed. |
-| 4891 | A configuration entry changed in Certificate Services. |
-| 4892 | A property of Certificate Services changed. |
-| 4893 | Certificate Services archived a key. |
-| 4894 | Certificate Services imported and archived a key. |
-| 4895 | Certificate Services published the CA certificate to Active Directory Domain Services. |
-| 4896 | One or more rows have been deleted from the certificate database. |
-| 4897 | Role separation enabled: |
-| 4898 | Certificate Services loaded a template. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF – if a server has the [Active Directory Certificate Services](https://technet.microsoft.com/en-us/windowsserver/dd448615.aspx) (AD CS) role installed and you need to monitor AD CS related events, enable this subcategory. |
+| Member Server | IF | IF | IF | IF | IF – if a server has the [Active Directory Certificate Services](https://technet.microsoft.com/en-us/windowsserver/dd448615.aspx) (AD CS) role installed and you need to monitor AD CS related events, enable this subcategory. |
+| Workstation | No | No | No | No | [Active Directory Certificate Services](https://technet.microsoft.com/en-us/windowsserver/dd448615.aspx) (AD CS) role cannot be installed on client OS. |
+
+## 4868: The certificate manager denied a pending certificate request.
+
+## 4869: Certificate Services received a resubmitted certificate request.
+
+## 4870: Certificate Services revoked a certificate.
+
+## 4871: Certificate Services received a request to publish the certificate revocation list (CRL).
+
+## 4872: Certificate Services published the certificate revocation list (CRL).
+
+## 4873: A certificate request extension changed.
+
+## 4874: One or more certificate request attributes changed.
+
+## 4875: Certificate Services received a request to shut down.
+
+## 4876: Certificate Services backup started.
+
+## 4877: Certificate Services backup completed.
+
+## 4878: Certificate Services restore started.
+
+## 4879: Certificate Services restore completed.
+
+## 4880: Certificate Services started.
+
+## 4881: Certificate Services stopped.
+
+## 4882: The security permissions for Certificate Services changed.
+
+## 4883: Certificate Services retrieved an archived key.
+
+## 4884: Certificate Services imported a certificate into its database.
+
+## 4885: The audit filter for Certificate Services changed.
+
+## 4886: Certificate Services received a certificate request.
+
+## 4887: Certificate Services approved a certificate request and issued a certificate.
+
+## 4888: Certificate Services denied a certificate request.
+
+## 4889: Certificate Services set the status of a certificate request to pending.
+
+## 4890: The certificate manager settings for Certificate Services changed.
+
+## 4891: A configuration entry changed in Certificate Services.
+
+## 4892: A property of Certificate Services changed.
+
+## 4893: Certificate Services archived a key.
+
+## 4894: Certificate Services imported and archived a key.
+
+## 4895: Certificate Services published the CA certificate to Active Directory Domain Services.
+
+## 4896: One or more rows have been deleted from the certificate database.
+
+## 4897: Role separation enabled.
+
+## 4898: Certificate Services loaded a template.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-computer-account-management.md b/windows/keep-secure/audit-computer-account-management.md
index f336c85c74..c9daef323f 100644
--- a/windows/keep-secure/audit-computer-account-management.md
+++ b/windows/keep-secure/audit-computer-account-management.md
@@ -2,34 +2,43 @@
title: Audit Computer Account Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Computer Account Management
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Computer Account Management**, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
+
+Audit Computer Account Management determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
This policy setting is useful for tracking account-related changes to computers that are members of a domain.
-Event volume: Low
+**Event volume**: Low on domain controllers.
-Default: Not configured
+This subcategory allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted.
-| Event ID | Event message |
-| - | - |
-| 4741 | A computer account was created. |
-| 4742 | A computer account was changed. |
-| 4743 | A computer account was deleted. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | We recommend monitoring changes to critical computer objects in Active Directory, such as domain controllers, administrative workstations, and critical servers. It's especially important to be informed if any critical computer account objects are deleted.
Additionally, events in this subcategory will give you information about who deleted, created, or modified a computer object, and when the action was taken.
Typically volume of these events is low on domain controllers.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | No | No | This subcategory generates events only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory generates events only on domain controllers. |
+
+**Events List:**
+
+- [4741](event-4741.md)(S): A computer account was created.
+
+- [4742](event-4742.md)(S): A computer account was changed.
+
+- [4743](event-4743.md)(S): A computer account was deleted.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-credential-validation.md b/windows/keep-secure/audit-credential-validation.md
index fdacd0aa43..ea6a2314ca 100644
--- a/windows/keep-secure/audit-credential-validation.md
+++ b/windows/keep-secure/audit-credential-validation.md
@@ -2,42 +2,55 @@
title: Audit Credential Validation (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Credential Validation
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Credential Validation**, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
+
+Audit Credential Validation determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
These events occur on the computer that is authoritative for the credentials as follows:
- For domain accounts, the domain controller is authoritative.
+
- For local accounts, the local computer is authoritative.
-Event volume: High on domain controllers
+**Event volume**:
-Because domain accounts are used much more frequently than local accounts in enterprise environments, most of the Account Logon events in a domain environment occur on the domain controllers that are authoritative for the domain accounts. However, these events can occur on any computer, and they
-may occur in conjunction with or on separate computers from Logon and Logoff events.
+- High on domain controllers.
-Default: Not configured
+- Low on member servers and workstations.
-| Event ID | Event message |
-| - | - |
-| 4774 | An account was mapped for logon. |
-| 4775 | An account could not be mapped for logon. |
-| 4776 | The domain controller attempted to validate the credentials for an account. |
-| 4777 | The domain controller failed to validate the credentials for an account. |
-
-## Related topics
+Because domain accounts are used much more frequently than local accounts in enterprise environments, most of the Account Logon events in a domain environment occur on the domain controllers that are authoritative for the domain accounts. However, these events can occur on any computer, and they may occur in conjunction with or on separate computers from Logon and Logoff events.
+
+The main reason to enable this auditing subcategory is to handle local accounts authentication attempts and, for domain accounts, NTLM authentication in the domain. It is especially useful for monitoring unsuccessful attempts, to find brute-force attacks, account enumeration, and potential account compromise events on domain controllers.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | Yes | Yes | Yes | Expected volume of events is high for domain controllers, because this subcategory will generate events when an authentication attempt is made using any domain account and NTLM authentication.
IF – We recommend Success auditing to keep track of domain-account authentication events using the NTLM protocol. Expect a high volume of events. For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections. Just collecting Success auditing events in this subcategory for future use in case of a security incident is not very useful, because events in this subcategory are not always informative.
We recommend Failure auditing, to collect information about failed authentication attempts using domain accounts and the NTLM authentication protocol. |
+| Member Server | Yes | Yes | Yes | Yes | Expected volume of events is low for member servers, because this subcategory will generate events when an authentication attempt is made using a local account, which should not happen too often.
We recommend Success auditing, to keep track of authentication events by local accounts.
We recommend Failure auditing, to collect information about failed authentication attempts by local accounts. |
+| Workstation | Yes | Yes | Yes | Yes | Expected volume of events is low for workstations, because this subcategory will generate events when an authentication attempt is made using a local account, which should not happen too often.
We recommend Success auditing, to keep track of authentication events by local accounts.
We recommend Failure auditing, to collect information about failed authentication attempts by local accounts. |
+
+**Events List:**
+
+- [4774](event-4774.md)(S): An account was mapped for logon.
+
+- [4775](event-4775.md)(F): An account could not be mapped for logon.
+
+- [4776](event-4776.md)(S, F): The computer attempted to validate the credentials for an account.
+
+- [4777](event-4777.md)(F): The domain controller failed to validate the credentials for an account.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-detailed-directory-service-replication.md b/windows/keep-secure/audit-detailed-directory-service-replication.md
index 295527e35e..19aef271fa 100644
--- a/windows/keep-secure/audit-detailed-directory-service-replication.md
+++ b/windows/keep-secure/audit-detailed-directory-service-replication.md
@@ -6,35 +6,43 @@ ms.pagetype: security
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
-author: brianlic-msft
+author: Mir0sh
---
# Audit Detailed Directory Service Replication
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Detailed Directory Service Replication**, which determines whether the operating system generates audit events that contain detailed tracking information about data that is replicated between domain controllers.
+
+Audit Detailed Directory Service Replication determines whether the operating system generates audit events that contain detailed tracking information about data that is replicated between domain controllers.
This audit subcategory can be useful to diagnose replication issues.
-Event volume: These events can create a very high volume of event data.
+**Event volume**: These events can create a very high volume of event data on domain controllers.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | IF | IF | IF - Events in this subcategory typically have an informational purpose and it is difficult to detect any malicious activity using these events. It’s mainly used for Active Directory replication troubleshooting. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
-| Event ID | Event message |
-| - | - |
-| 4928 | An Active Directory replica source naming context was established. |
-| 4929 | An Active Directory replica source naming context was removed. |
-| 4930 | An Active Directory replica source naming context was modified. |
-| 4931 | An Active Directory replica destination naming context was modified. |
-| 4934 | Attributes of an Active Directory object were replicated. |
-| 4935 | Replication failure begins. |
-| 4936 | Replication failure ends. |
-| 4937 | A lingering object was removed from a replica. |
-
-## Related topics
+**Events List:**
+
+- [4928](event-4928.md)(S, F): An Active Directory replica source naming context was established.
+
+- [4929](event-4929.md)(S, F): An Active Directory replica source naming context was removed.
+
+- [4930](event-4930.md)(S, F): An Active Directory replica source naming context was modified.
+
+- [4931](event-4931.md)(S, F): An Active Directory replica destination naming context was modified.
+
+- [4934](event-4934.md)(S): Attributes of an Active Directory object were replicated.
+
+- [4935](event-4935.md)(F): Replication failure begins.
+
+- [4936](event-4936.md)(S): Replication failure ends.
+
+- [4937](event-4937.md)(S): A lingering object was removed from a replica.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-detailed-file-share.md b/windows/keep-secure/audit-detailed-file-share.md
index 4d0294c79c..bbdf44acb2 100644
--- a/windows/keep-secure/audit-detailed-file-share.md
+++ b/windows/keep-secure/audit-detailed-file-share.md
@@ -2,33 +2,45 @@
title: Audit Detailed File Share (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder.
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Detailed File Share
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Detailed File Share**, which allows you to audit attempts to access files and folders on a shared folder.
-The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client computer and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access.
-> **Note:** There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited.
-
-Event volume: High on a file server or domain controller because of SYSVOL network access required by Group Policy
+Audit Detailed File Share allows you to audit attempts to access files and folders on a shared folder.
-Default: Not configured
+The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access.
-| Event ID | Event message |
-| - | - |
-| 5145 | A network share object was checked to see whether the client can be granted desired access. |
-
-## Related topics
+There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited.
+
+**Event volume**:
+
+- High on file servers.
+
+- High on domain controllers because of SYSVOL network access required by Group Policy.
+
+- Low on member servers and workstations.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | Yes | No | Yes | Audit Success for this subcategory on domain controllers typically will lead to very high volume of events, especially for SYSVOL share.
We recommend monitoring Failure access attempts: the volume should not be very high. You will be able to see who was not able to get access to a file or folder on a network share on a computer. |
+| Member Server | IF | Yes | IF | Yes | IF – If a server has shared network folders which typically get many access requests (File Server, for example), the volume of events might be very high. If you really need to track all successful access events for every file or folder located on a shared folder, enable Success auditing or use the [Audit File System](audit-file-system.md) subcategory, although that subcategory excludes some information in Audit Detailed File Share, for example, the client’s IP address.
The volume of Failure events for member servers should not be very high (if they are not File Servers). With Failure auditing, you will be able to see who was not able to get access to a file or folder on a network share on this computer. |
+| Workstation | IF | Yes | IF | Yes | IF – If a workstation has shared network folders which typically get many access requests, the volume of events might be very high. If you really need to track all successful access events for every file or folder located on a shared folder, enable Success auditing or use Audit File System subcategory, although that subcategory excludes some information in Audit Detailed File Share, for example, the client’s IP address.
The volume of Failure events for workstations should not be very high. With Failure auditing, you will be able to see who was not able to get access to a file or folder on a network share on this computer. |
+
+**Events List:**
+
+- [5145](event-5145.md)(S, F): A network share object was checked to see whether client can be granted desired access.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-directory-service-access.md b/windows/keep-secure/audit-directory-service-access.md
index 2c88e66d93..e61d72c1ed 100644
--- a/windows/keep-secure/audit-directory-service-access.md
+++ b/windows/keep-secure/audit-directory-service-access.md
@@ -1,34 +1,40 @@
---
title: Audit Directory Service Access (Windows 10)
-description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (AD DS) object is accessed.
+description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (ADÂ DS) object is accessed.
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Directory Service Access
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Directory Service Access**, which determines whether the operating system generates audit events when an Active Directory Domain Services (AD DS) object is accessed.
-These events are similar to the Directory Service Access events in previous versions of the Windows Server operating systems.
-> **Important:** Audit events are generated only on objects with configured system access control lists (SACLs), and only when they are accessed in a manner that matches the SACL settings.
-
-Event volume: High on servers running AD DS role services; none on client computers
+Audit Directory Service Access determines whether the operating system generates audit events when an Active Directory Domain Services (AD DS) object is accessed.
-Default: Not configured
+**Event volume**: High on servers running AD DS role services.
-| Event ID | Event message |
-| - | - |
-| 4662 | An operation was performed on an object. |
-
-## Related topics
+This subcategory allows you to audit when an Active Directory Domain Services (AD DS) object is accessed. It also generates Failure events if access was not granted.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | Yes | No | Yes | It is better to track changes to Active Directory objects through the [Audit Directory Service Changes](audit-directory-service-changes.md) subcategory. However, [Audit Directory Service Changes](audit-directory-service-changes.md) doesn’t give you information about failed access attempts, so we recommend Failure auditing in this subcategory to track failed access attempts to Active Directory objects.
For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections. Also, develop an Active Directory auditing policy ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) design for specific classes, operation types which need to be monitored for specific Organizational Units, and so on) so you can audit only the access attempts that are made to specific important objects. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
+
+**Events List:**
+
+- [4662](event-4662.md)(S, F): An operation was performed on an object.
+
+- [4661](event-4661.md)(S, F): A handle to an object was requested.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-directory-service-changes.md b/windows/keep-secure/audit-directory-service-changes.md
index 18b22defe5..a0257170d5 100644
--- a/windows/keep-secure/audit-directory-service-changes.md
+++ b/windows/keep-secure/audit-directory-service-changes.md
@@ -1,49 +1,52 @@
---
title: Audit Directory Service Changes (Windows 10)
-description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (AD DS).
+description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (ADÂ DS).
ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Directory Service Changes
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Directory Service Changes**, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (AD DS).
-The types of changes that are reported are:
+Audit Directory Service Changes determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (AD DS).
-- Create
-- Delete
-- Modify
-- Move
-- Undelete
+Auditing of directory service objects can provide information about the old and new properties of the objects that were changed.
-Directory Service Changes auditing, where appropriate, indicates the old and new values of the changed properties of the objects that were changed.
+Audit events are generated only for objects with configured system access control lists ([SACLs](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)), and only when they are accessed in a manner that matches their [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) settings. Some objects and properties do not cause audit events to be generated due to settings on the object class in the schema.
-> **Important:** Audit events are generated only for objects with configured system access control lists (SACLs), and only when they are accessed in a manner that matches their SACL settings. Some objects and properties do not cause audit events to be generated due to settings on the object class in the schema.
-
-This subcategory only logs events on domain controllers. Changes to Active Directory objects are important events to track in order to understand the state of the network policy.
+This subcategory only logs events on domain controllers.
-Event volume: High on domain controllers; none on client computers
+**Event volume**: High on domain controllers.
-Default: Not configured
+This subcategory triggers events when an Active Directory object was modified, created, undeleted, moved, or deleted.
-| Event ID | Event message |
-| - | - |
-| 5136 | A directory service object was modified. |
-| 5137 | A directory service object was created. |
-| 5138 | A directory service object was undeleted. |
-| 5139 | A directory service object was moved. |
-| 5141 | A directory service object was deleted. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | It is important to track actions related to high value or critical Active Directory objects, for example, changes to [AdminSDHolder](https://technet.microsoft.com/en-us/magazine/2009.09.sdadminholder.aspx) container or Domain Admins group objects.
This subcategory shows you what actions were performed. If you want to track failed access attempts for Active Directory objects you need to take a look at [Audit Directory Service Access](audit-directory-service-access.md) subcategory.
For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections. Also, develop an Active Directory auditing policy ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) design for specific classes, operation types which need to be monitored for specific Organizational Units, and so on) so you can audit only the access attempts that are made to specific important objects.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
+
+**Events List:**
+
+- [5136](event-5136.md)(S): A directory service object was modified.
+
+- [5137](event-5137.md)(S): A directory service object was created.
+
+- [5138](event-5138.md)(S): A directory service object was undeleted.
+
+- [5139](event-5139.md)(S): A directory service object was moved.
+
+- [5141](event-5141.md)(S): A directory service object was deleted.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-directory-service-replication.md b/windows/keep-secure/audit-directory-service-replication.md
index 8dde61d22d..d84bf022c9 100644
--- a/windows/keep-secure/audit-directory-service-replication.md
+++ b/windows/keep-secure/audit-directory-service-replication.md
@@ -2,31 +2,37 @@
title: Audit Directory Service Replication (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Directory Service Replication
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Directory Service Replication**, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
-Event volume: Medium on domain controllers; none on client computers
+Audit Directory Service Replication determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
-Default: Not configured
+**Event volume**: Medium on domain controllers.
-| Event ID | Event Message |
-| - | - |
-| 4932 | Synchronization of a replica of an Active Directory naming context has begun. |
-| 4933 | Synchronization of a replica of an Active Directory naming context has ended. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | IF | IF | IF - Events in this subcategory typically have an informational purpose and it is difficult to detect any malicious activity using these events. It’s mainly used for Active Directory replication troubleshooting. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
+
+**Events List:**
+
+- [4932](event-4932.md)(S): Synchronization of a replica of an Active Directory naming context has begun.
+
+- [4933](event-4933.md)(S, F): Synchronization of a replica of an Active Directory naming context has ended.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-distribution-group-management.md b/windows/keep-secure/audit-distribution-group-management.md
index 80cfcea450..13404964d7 100644
--- a/windows/keep-secure/audit-distribution-group-management.md
+++ b/windows/keep-secure/audit-distribution-group-management.md
@@ -2,51 +2,73 @@
title: Audit Distribution Group Management (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Distribution Group Management, which determines whether the operating system generates audit events for specific distribution-group management tasks.
ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Distribution Group Management
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Distribution Group Management**, which determines whether the operating system generates audit events for specific distribution-group management tasks.
-Tasks for distribution-group management that can be audited include:
+Audit Distribution Group Management determines whether the operating system generates audit events for specific distribution-group management tasks.
-- A distribution group is created, changed, or deleted.
-- A member is added to or removed from a distribution group.
+This subcategory generates events only on domain controllers.
-This subcategory to which this policy belongs is logged only on domain controllers.
-> **Note:** Distribution groups cannot be used to manage access control permissions.
-
-Event volume: Low
+**Event volume**: Low on domain controllers.
-Default: Not configured
+This subcategory allows you to audit events generated by changes to distribution groups such as the following:
-| Event ID | Event message |
-| - | - |
-| 4744 | A security-disabled local group was created. |
-| 4745 | A security-disabled local group was changed. |
-| 4746 | A member was added to a security-disabled local group. |
-| 4747 | A member was removed from a security-disabled local group. |
-| 4748 | A security-disabled local group was deleted. |
-| 4749 | A security-disabled global group was created. |
-| 4750 | A security-disabled global group was changed. |
-| 4751 | A member was added to a security-disabled global group. |
-| 4752 | A member was removed from a security-disabled global group. |
-| 4753 | A security-disabled global group was deleted. |
-| 4759 | A security-disabled universal group was created. |
-| 4760 | A security-disabled universal group was changed. |
-| 4761 | A member was added to a security-disabled universal group. |
-| 4762 | A member was removed from a security-disabled universal group. |
+- Distribution group is created, changed, or deleted.
- ## Related topics
+- Member is added or removed from a distribution group.
+
+If you need to monitor for group type changes, you need to monitor for “[4764](event-4764.md): A group’s type was changed.” “Audit Security Group Management” subcategory success auditing must be enabled.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | No | IF | No | IF - Typically actions related to distribution groups have low security relevance, much more important to monitor Security Group changes. But if you want to monitor for critical distribution groups changes, such as member was added to internal critical distribution group (executives, administrative group, for example), you need to enable this subcategory for Success auditing.
Typically volume of these events is low on domain controllers.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | No | No | This subcategory generates events only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory generates events only on domain controllers. |
+
+**Events List:**
+
+- [4749](event-4749.md)(S): A security-disabled global group was created.
+
+- [4750](event-4750.md)(S): A security-disabled global group was changed.
+
+- [4751](event-4751.md)(S): A member was added to a security-disabled global group.
+
+- [4752](event-4752.md)(S): A member was removed from a security-disabled global group.
+
+- [4753](event-4753.md)(S): A security-disabled global group was deleted.
+
+**4759(S): A security-disabled universal group was created.** See event “[4749](event-4749.md): A security-disabled global group was created.” Event 4759 is the same, but it is generated for a **universal** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4760(S): A security-disabled universal group was changed.** See event “[4750](event-4750.md): A security-disabled global group was changed.” Event 4760 is the same, but it is generated for a **universal** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4761(S): A member was added to a security-disabled universal group.** See event “[4751](event-4751.md): A member was added to a security-disabled global group.” Event 4761 is the same, but it is generated for a **universal** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4762(S): A member was removed from a security-disabled universal group.** See event “[4752](event-4752.md): A member was removed from a security-disabled global group.” Event 4762 is the same, but it is generated for a **universal** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4763(S): A security-disabled universal group was deleted.** See event “[4753](event-4753.md): A security-disabled global group was deleted.” Event 4763 is the same, but it is generated for a **universal** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4744(S): A security-disabled local group was created.** See event “[4749](event-4749.md): A security-disabled global group was created.” Event 4744 is the same, but it is generated for a **local** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4745(S): A security-disabled local group was changed.** See event “[4750](event-4750.md): A security-disabled global group was changed.” Event 4745 is the same, but it is generated for a **local** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4746(S): A member was added to a security-disabled local group.** See event “[4751](event-4751.md): A member was added to a security-disabled global group.” Event 4746 is the same, but it is generated for a **local** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4747(S): A member was removed from a security-disabled local group.** See event “[4752](event-4752.md): A member was removed from a security-disabled global group.” Event 4747 is the same, but it is generated for a **local** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**4748(S): A security-disabled local group was deleted.** See event “[4753](event-4753.md): A security-disabled global group was deleted.” Event 4748 is the same, but it is generated for a **local** distribution group instead of a **global** distribution group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-dpapi-activity.md b/windows/keep-secure/audit-dpapi-activity.md
index 30db4c39a8..4c66459ce0 100644
--- a/windows/keep-secure/audit-dpapi-activity.md
+++ b/windows/keep-secure/audit-dpapi-activity.md
@@ -2,37 +2,41 @@
title: Audit DPAPI Activity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit DPAPI Activity
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit DPAPI Activity**, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
-DPAPI is used to protect secret information such as stored passwords and key information. For more information about DPAPI, see [Windows Data Protection](http://go.microsoft.com/fwlink/p/?linkid=121720) (http://go.microsoft.com/fwlink/p/?linkid=121720).
-Event volume: Low
+Audit [DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx) Activity determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface ([DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx)).
-Default: Not configured
+**Event volume**: Low.
-If this policy setting is configured, the following events appear on computers running the supported versions of the Windows operating system as designated in the **Applies To** list at the beginning of this topic, in addition to Windows Server 2008 and Windows Vista.
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF – Events in this subcategory typically have an informational purpose and it is difficult to detect any malicious activity using these events. It’s mainly used for DPAPI troubleshooting. |
+| Member Server | IF | IF | IF | IF | IF – Events in this subcategory typically have an informational purpose and it is difficult to detect any malicious activity using these events. It’s mainly used for DPAPI troubleshooting. |
+| Workstation | IF | IF | IF | IF | IF – Events in this subcategory typically have an informational purpose and it is difficult to detect any malicious activity using these events. It’s mainly used for DPAPI troubleshooting. |
-| Event ID | Event message |
-| - | - |
-| 4692 | Backup of data protection master key was attempted. |
-| 4693 | Recovery of data protection master key was attempted. |
-| 4694 | Protection of auditable protected data was attempted. |
-| 4695 | Unprotection of auditable protected data was attempted. |
-
-## Related resource
+**Events List:**
+
+- [4692](event-4692.md)(S, F): Backup of data protection master key was attempted.
+
+- [4693](event-4693.md)(S, F): Recovery of data protection master key was attempted.
+
+- [4694](event-4694.md)(S, F): Protection of auditable protected data was attempted.
+
+- [4695](event-4695.md)(S, F): Unprotection of auditable protected data was attempted.
-- [Advanced Security Audit Policy Settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-file-share.md b/windows/keep-secure/audit-file-share.md
index af74a0b2a8..6005f92a3e 100644
--- a/windows/keep-secure/audit-file-share.md
+++ b/windows/keep-secure/audit-file-share.md
@@ -2,39 +2,53 @@
title: Audit File Share (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed.
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit File Share
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit File Share**, which determines whether the operating system generates audit events when a file share is accessed.
-Audit events are not generated when shares are created, deleted, or when share permissions change.
-> **Note:** There are no system access control lists (SACLs) for shares; therefore, after this setting is enabled, access to all shares on the system will be audited.
-
+Audit File Share allows you to audit events related to file shares: creation, deletion, modification, and access attempts. Also, it shows failed SMB SPN checks.
+
+There are no system access control lists (SACLs) for shares; therefore, after this setting is enabled, access to all shares on the system will be audited.
+
Combined with File System auditing, File Share auditing enables you to track what content was accessed, the source (IP address and port) of the request, and the user account that was used for the access.
-Event volume: High on a file server or domain controller (due to SYSVOL access by client computers for policy processing)
+**Event volume**:
-Default: Not configured
+- High on file servers.
-| Event ID | Event message |
-| - |- |
-| 5140 | A network share object was accessed.
**Note:** This event is logged on computers running Windows 10, Windows Server 2016 Technical Preview, Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista. |
-| 5142 | A network share object was added. |
-| 5143 | A network share object was modified. |
-| 5144 | A network share object was deleted. |
-| 5168 | SPN check for SMB/SMB2 failed. |
-
-## Related topics
+- High on domain controllers because of SYSVOL network access required by Group Policy.
+
+- Low on member servers and workstations.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend Success auditing for domain controllers, because it’s important to track deletion, creation, and modification events for network shares.
We recommend Failure auditing to track failed SMB SPN checks and failed access attempts to network shares. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend Success auditing to track deletion, creation, modification, and access attempts to network share objects.
We recommend Failure auditing to track failed SMB SPN checks and failed access attempts to network shares. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend Success auditing to track deletion, creation, modification and access attempts to network share objects.
We recommend Failure auditing to track failed SMB SPN checks and failed access attempts to network shares. |
+
+**Events List:**
+
+- [5140](event-5140.md)(S, F): A network share object was accessed.
+
+- [5142](event-5142.md)(S): A network share object was added.
+
+- [5143](event-5143.md)(S): A network share object was modified.
+
+- [5144](event-5144.md)(S): A network share object was deleted.
+
+- [5168](event-5168.md)(F): SPN check for SMB/SMB2 failed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-file-system.md b/windows/keep-secure/audit-file-system.md
index 1ddb1c3d49..55cac2e347 100644
--- a/windows/keep-secure/audit-file-system.md
+++ b/windows/keep-secure/audit-file-system.md
@@ -2,39 +2,61 @@
title: Audit File System (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects.
ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f
+<<<<<<< HEAD
ms.prod: w10
-ms.mktglfcycl: deploy
+=======
ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
+ms.mktglfcycl: deploy
ms.sitesec: library
-author: brianlic-msft
+author: Mir0sh
---
# Audit File System
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
+
+
+Audit File System determines whether the operating system generates audit events when users attempt to access file system objects.
+
+Audit events are generated only for objects that have configured system access control lists ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s), and only if the type of access requested (such as Write, Read, or Modify) and the account making the request match the settings in the [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx).
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit File System**, which determines whether the operating system generates audit events when users attempt to access file system objects.
-Audit events are generated only for objects that have configured system access control lists (SACLs), and only if the type of access requested (such as Write, Read, or Modify) and the account making the request match the settings in the SACL.
If success auditing is enabled, an audit entry is generated each time any account successfully accesses a file system object that has a matching SACL. If failure auditing is enabled, an audit entry is generated each time any user unsuccessfully attempts to access a file system object that has a matching SACL.
These events are essential for tracking activity for file objects that are sensitive or valuable and require extra monitoring.
-Event volume: Varies, depending on how file system SACLs are configured
+**Event volume**: Varies, depending on how file system [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s are configured.
-No audit events are generated for the default file system SACLs.
+No audit events are generated for the default file system [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s.
-Default: Not configured
+This subcategory allows you to audit user attempts to access file system objects, file system object deletion and permissions change operations and hard link creation actions.
-| Event ID | Event message |
-| - | - |
-| 4664 | An attempt was made to create a hard link. |
-| 4985 | The state of a transaction has changed. |
-| 5051 | A file was virtualized. |
-
-## Related topics
+Only one event, “[4658](event-4658.md): The handle to an object was closed,” depends on the [Audit Handle Manipulation](audit-handle-manipulation.md) subcategory (Success auditing must be enabled). All other events generate without any additional configuration.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | We strongly recommend that you develop a File System Security Monitoring policy and define appropriate [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s for file system objects for different operating system templates and roles. Do not enable this subcategory if you have not planned how to use and analyze the collected information. It is also important to delete non-effective, excess [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s. Otherwise the auditing log will be overloaded with useless information.
Failure events can show you unsuccessful attempts to access specific file system objects.
Consider enabling this subcategory for critical computers first, after you develop a File System Security Monitoring policy for them. |
+| Member Server | IF | IF | IF | IF | |
+| Workstation | IF | IF | IF | IF | |
+
+**Events List:**
+
+- [4656](event-4656.md)(S, F): A handle to an object was requested.
+
+- [4658](event-4658.md)(S): The handle to an object was closed.
+
+- [4660](event-4660.md)(S): An object was deleted.
+
+- [4663](event-4663.md)(S): An attempt was made to access an object.
+
+- [4664](event-4664.md)(S): An attempt was made to create a hard link.
+
+- [4985](event-4985.md)(S): The state of a transaction has changed.
+
+- [5051](event-5051.md)(-): A file was virtualized.
+
+- [4670](event-4670.md)(S): Permissions on an object were changed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-filtering-platform-connection.md b/windows/keep-secure/audit-filtering-platform-connection.md
index 4b8c95c652..d284284a07 100644
--- a/windows/keep-secure/audit-filtering-platform-connection.md
+++ b/windows/keep-secure/audit-filtering-platform-connection.md
@@ -2,48 +2,55 @@
title: Audit Filtering Platform Connection (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Filtering Platform Connection
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Filtering Platform Connection**, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
+
+Audit Filtering Platform Connection determines whether the operating system generates audit events when connections are allowed or blocked by the [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx).
Windows Filtering Platform (WFP) enables independent software vendors (ISVs) to filter and modify TCP/IP packets, monitor or authorize connections, filter Internet Protocol security (IPsec)-protected traffic, and filter remote procedure calls (RPCs).
-This security policy enables you to audit the following types of actions:
+This subcategory contains Windows Filtering Platform events about blocked and allowed connections, blocked and allowed port bindings, blocked and allowed port listening actions, and blocked to accept incoming connections applications.
-- The Windows Firewall service blocks an application from accepting incoming connections on the network.
-- The Windows Filtering Platform allows or blocks a connection.
-- The Windows Filtering Platform permits or blocks a bind to a local port.
-- The Windows Filtering Platform permits or blocks an application or service from listening for incoming connections on a port.
+**Event volume**: High.
-Event volume: High
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | Yes | IF | Yes | Success auditing for this subcategory typically generates a very high volume of events, for example, one event for every connection that was made to the system. It is much more important to audit Failure events (blocked connections, for example). For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
IF - Enable Success audit in case you need to monitor successful outbound or inbound connections to and from untrusted IP addresses on high value computers or devices. |
+| Member Server | No | Yes | IF | Yes | Success auditing for this subcategory typically generates a very high volume of events, for example, one event for every connection that was made to the system. It is much more important to audit Failure events (blocked connections, for example). For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
IF - Enable Success audit in case you need to monitor successful outbound or inbound connections to and from untrusted IP addresses on high value computers or devices. |
+| Workstation | No | Yes | IF | Yes | Success auditing for this subcategory typically generates a very high volume of events, for example, one event for every connection that was made to the system. It is much more important to audit Failure events (blocked connections, for example). For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
IF - Enable Success audit in case you need to monitor successful outbound or inbound connections to and from untrusted IP addresses on high value computers or devices. |
-Default: Not configured
+**Events List:**
-| Event ID | Event message |
-| - | - |
-| 5031 | The Windows Firewall Service blocked an application from accepting incoming connections on the network. |
-| 5140 | A network share object was accessed. |
-| 5150 | The Windows Filtering Platform blocked a packet. |
-| 5151 | A more restrictive Windows Filtering Platform filter has blocked a packet. |
-| 5154 | The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. |
-| 5155 | The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. |
-| 5156 | The Windows Filtering Platform has allowed a connection. |
-| 5157 | The Windows Filtering Platform has blocked a connection. |
-| 5158 | The Windows Filtering Platform has permitted a bind to a local port. |
-| 5159 | The Windows Filtering Platform has blocked a bind to a local port. |
-
-## Related topics
+- [5031](event-5031.md)(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network.
+
+- [5150](event-5150.md)(-): The Windows Filtering Platform blocked a packet.
+
+- [5151](event-5151.md)(-): A more restrictive Windows Filtering Platform filter has blocked a packet.
+
+- [5154](event-5154.md)(S): The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.
+
+- [5155](event-5155.md)(F): The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.
+
+- [5156](event-5156.md)(S): The Windows Filtering Platform has permitted a connection.
+
+- [5157](event-5157.md)(F): The Windows Filtering Platform has blocked a connection.
+
+- [5158](event-5158.md)(S): The Windows Filtering Platform has permitted a bind to a local port.
+
+- [5159](event-5159.md)(F): The Windows Filtering Platform has blocked a bind to a local port.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-filtering-platform-packet-drop.md b/windows/keep-secure/audit-filtering-platform-packet-drop.md
index 96935fa8b7..033b1048e4 100644
--- a/windows/keep-secure/audit-filtering-platform-packet-drop.md
+++ b/windows/keep-secure/audit-filtering-platform-packet-drop.md
@@ -2,35 +2,41 @@
title: Audit Filtering Platform Packet Drop (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Packet Drop, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform.
ms.assetid: 95457601-68d1-4385-af20-87916ddab906
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Filtering Platform Packet Drop
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Filtering Platform Packet Drop**, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform.
+
+Audit Filtering Platform Packet Drop determines whether the operating system generates audit events when packets are dropped by the [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx).
Windows Filtering Platform (WFP) enables independent software vendors (ISVs) to filter and modify TCP/IP packets, monitor or authorize connections, filter Internet Protocol security (IPsec)-protected traffic, and filter remote procedure calls (RPCs).
-A high rate of dropped packets may indicate that there have been attempts to gain unauthorized access to computers on your network.
+A high rate of dropped packets *may* indicate that there have been attempts to gain unauthorized access to computers on your network.
-Event volume: High
+**Event volume**: High.
-Default setting: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | No | No | Failure events volume typically is very high for this subcategory and typically used for troubleshooting. If you need to monitor blocked connections, it is better to use “[5157](event-5157.md)(F): The Windows Filtering Platform has blocked a connection,” because it contains almost the same information and generates per-connection, not per-packet.
There is no recommendation to enable Success auditing, because Success events in this subcategory rarely occur. |
+| Member Server | No | No | No | No | Failure events volume typically is very high for this subcategory and typically used for troubleshooting. If you need to monitor blocked connections, it is better to use “[5157](event-5157.md)(F): The Windows Filtering Platform has blocked a connection,” because it contains almost the same information and generates per-connection, not per-packet.
There is no recommendation to enable Success auditing, because Success events in this subcategory rarely occur. |
+| Workstation | No | No | No | No | Failure events volume typically is very high for this subcategory and typically used for troubleshooting. If you need to monitor blocked connections, it is better to use “[5157](event-5157.md)(F): The Windows Filtering Platform has blocked a connection,” because it contains almost the same information and generates per-connection, not per-packet.
There is no recommendation to enable Success auditing, because Success events in this subcategory rarely occur. |
-| Event ID | Event message |
-| - | - |
-| 5152 | The Windows Filtering Platform blocked a packet. |
-| 5153 | A more restrictive Windows Filtering Platform filter has blocked a packet. |
-
-## Related topics
+**Events List:**
+
+- [5152](event-5152.md)(F): The Windows Filtering Platform blocked a packet.
+
+- [5153](event-5153.md)(S): A more restrictive Windows Filtering Platform filter has blocked a packet.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-filtering-platform-policy-change.md b/windows/keep-secure/audit-filtering-platform-policy-change.md
index 10c8a9459b..8035115b4a 100644
--- a/windows/keep-secure/audit-filtering-platform-policy-change.md
+++ b/windows/keep-secure/audit-filtering-platform-policy-change.md
@@ -2,224 +2,121 @@
title: Audit Filtering Platform Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Policy Change, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions.
ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Filtering Platform Policy Change
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Filtering Platform Policy Change**, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions.
+
+Audit Filtering Platform Policy Change allows you to audit events generated by changes to the [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) (WFP), such as the following:
+
+- IPsec services status.
+
+- Changes to IPsec policy settings.
+
+- Changes to Windows Filtering Platform Base Filtering Engine policy settings.
+
+- Changes to WFP providers and engine.
Windows Filtering Platform (WFP) enables independent software vendors (ISVs) to filter and modify TCP/IP packets, monitor or authorize connections, filter Internet Protocol security (IPsec)-protected traffic, and filter remote procedure calls (RPCs).
-This security policy setting determines whether the operating system generates audit events for:
+This subcategory is outside the scope of this document.
-- IPsec services status.
-- Changes to IPsec settings.
-- Status and changes to the Windows Filtering Platform engine and providers.
-- IPsec Policy Agent service activities.
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------|
+| Domain Controller | - | - | - | - | This subcategory is outside the scope of this document. |
+| Member Server | - | - | - | - | This subcategory is outside the scope of this document. |
+| Workstation | - | - | - | - | This subcategory is outside the scope of this document. |
-Event volume: Low
+## 4709(S): IPsec Services was started.
-Default: Not configured
+## 4710(S): IPsec Services was disabled.
-
-
-
-
-
-
-
-
-
-
-4709 |
-IPsec Services was started. |
-
-
-4710 |
-IPsec Services was disabled. |
-
-
-4711 |
-May contain any one of the following:
-
-PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.
-PAStore Engine applied Active Directory storage IPsec policy on the computer.
-PAStore Engine applied local registry storage IPsec policy on the computer.
-PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.
-PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.
-PAStore Engine failed to apply local registry storage IPsec policy on the computer.
-PAStore Engine failed to apply some rules of the active IPsec policy on the computer.
-PAStore Engine failed to load directory storage IPsec policy on the computer.
-PAStore Engine loaded directory storage IPsec policy on the computer.
-PAStore Engine failed to load local storage IPsec policy on the computer.
-PAStore Engine loaded local storage IPsec policy on the computer.
-PAStore Engine polled for changes to the active IPsec policy and detected no changes.
- |
-
-
-4712 |
-IPsec Services encountered a potentially serious failure. |
-
-
-5040 |
-A change has been made to IPsec settings. An Authentication Set was added. |
-
-
-5041 |
-A change has been made to IPsec settings. An Authentication Set was modified. |
-
-
-5042 |
-A change has been made to IPsec settings. An Authentication Set was deleted. |
-
-
-5043 |
-A change has been made to IPsec settings. A Connection Security Rule was added. |
-
-
-5044 |
-A change has been made to IPsec settings. A Connection Security Rule was modified. |
-
-
-5045 |
-A change has been made to IPsec settings. A Connection Security Rule was deleted. |
-
-
-5046 |
-A change has been made to IPsec settings. A Crypto Set was added. |
-
-
-5047 |
-A change has been made to IPsec settings. A Crypto Set was modified. |
-
-
-5048 |
-A change has been made to IPsec settings. A Crypto Set was deleted. |
-
-
-5440 |
-The following callout was present when the Windows Filtering Platform Base Filtering Engine started. |
-
-
-5441 |
-The following filter was present when the Windows Filtering Platform Base Filtering Engine started. |
-
-
-5442 |
-The following provider was present when the Windows Filtering Platform Base Filtering Engine started. |
-
-
-5443 |
-The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. |
-
-
-5444 |
-The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started. |
-
-
-5446 |
-A Windows Filtering Platform callout has been changed. |
-
-
-5448 |
-A Windows Filtering Platform provider has been changed. |
-
-
-5449 |
-A Windows Filtering Platform provider context has been changed. |
-
-
-5450 |
-A Windows Filtering Platform sub-layer has been changed. |
-
-
-5456 |
-PAStore Engine applied Active Directory storage IPsec policy on the computer. |
-
-
-5457 |
-PAStore Engine failed to apply Active Directory storage IPsec policy on the computer. |
-
-
-5458 |
-PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. |
-
-
-5459 |
-PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. |
-
-
-5460 |
-PAStore Engine applied local registry storage IPsec policy on the computer. |
-
-
-5461 |
-PAStore Engine failed to apply local registry storage IPsec policy on the computer. |
-
-
-5462 |
-PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem. |
-
-
-5463 |
-PAStore Engine polled for changes to the active IPsec policy and detected no changes. |
-
-
-5464 |
-PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services. |
-
-
-5465 |
-PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully. |
-
-
-5466 |
-PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied. |
-
-
-5467 |
-PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used. |
-
-
-5468 |
-PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used. |
-
-
-5471 |
-PAStore Engine loaded local storage IPsec policy on the computer. |
-
-
-5472 |
-PAStore Engine failed to load local storage IPsec policy on the computer. |
-
-
-5473 |
-PAStore Engine loaded directory storage IPsec policy on the computer. |
-
-
-5474 |
-PAStore Engine failed to load directory storage IPsec policy on the computer. |
-
-
-5477 |
-PAStore Engine failed to add quick mode filter. |
-
-
-
-
-## Related topics
+## 4711(S): May contain any one of the following:
+
+## 4712(F): IPsec Services encountered a potentially serious failure.
+
+## 5040(S): A change has been made to IPsec settings. An Authentication Set was added.
+
+## 5041(S): A change has been made to IPsec settings. An Authentication Set was modified.
+
+## 5042(S): A change has been made to IPsec settings. An Authentication Set was deleted.
+
+## 5043(S): A change has been made to IPsec settings. A Connection Security Rule was added.
+
+## 5044(S): A change has been made to IPsec settings. A Connection Security Rule was modified.
+
+## 5045(S): A change has been made to IPsec settings. A Connection Security Rule was deleted.
+
+## 5046(S): A change has been made to IPsec settings. A Crypto Set was added.
+
+## 5047(S): A change has been made to IPsec settings. A Crypto Set was modified.
+
+## 5048(S): A change has been made to IPsec settings. A Crypto Set was deleted.
+
+## 5440(S): The following callout was present when the Windows Filtering Platform Base Filtering Engine started.
+
+## 5441(S): The following filter was present when the Windows Filtering Platform Base Filtering Engine started.
+
+## 5442(S): The following provider was present when the Windows Filtering Platform Base Filtering Engine started.
+
+## 5443(S): The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.
+
+## 5444(S): The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.
+
+## 5446(S): A Windows Filtering Platform callout has been changed.
+
+## 5448(S): A Windows Filtering Platform provider has been changed.
+
+## 5449(S): A Windows Filtering Platform provider context has been changed.
+
+## 5450(S): A Windows Filtering Platform sub-layer has been changed.
+
+## 5456(S): PAStore Engine applied Active Directory storage IPsec policy on the computer.
+
+## 5457(F): PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.
+
+## 5458(S): PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.
+
+## 5459(F): PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.
+
+## 5460(S): PAStore Engine applied local registry storage IPsec policy on the computer.
+
+## 5461(F): PAStore Engine failed to apply local registry storage IPsec policy on the computer.
+
+## 5462(F): PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.
+
+## 5463(S): PAStore Engine polled for changes to the active IPsec policy and detected no changes.
+
+## 5464(S): PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.
+
+## 5465(S): PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.
+
+## 5466(F): PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied.
+
+## 5467(F): PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used.
+
+## 5468(S): PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used.
+
+## 5471(S): PAStore Engine loaded local storage IPsec policy on the computer.
+
+## 5472(F): PAStore Engine failed to load local storage IPsec policy on the computer.
+
+## 5473(S): PAStore Engine loaded directory storage IPsec policy on the computer.
+
+## 5474(F): PAStore Engine failed to load directory storage IPsec policy on the computer.
+
+## 5477(F): PAStore Engine failed to add quick mode filter.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-group-membership.md b/windows/keep-secure/audit-group-membership.md
index d738bb1582..9a770e3e95 100644
--- a/windows/keep-secure/audit-group-membership.md
+++ b/windows/keep-secure/audit-group-membership.md
@@ -2,37 +2,47 @@
title: Audit Group Membership (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Group Membership, which enables you to audit group memberships when they are enumerated on the client PC.
ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Group Membership
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Group Membership**, which enables you to audit group memberships when they are enumerated on the client PC.
+
+Audit Group Membership enables you to audit group memberships when they are enumerated on the client computer.
This policy allows you to audit the group membership information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created.
For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
-> **Note:** You must also enable the **Audit Logon** setting under **Advanced Audit Policy Configuration\\System Audit Policies\\Logon/Logoff**.
-
+
+You must also enable the [Audit Logon](audit-logon.md) subcategory.
+
Multiple events are generated if the group membership information cannot fit in a single security audit event
-Event volume: High
+**Event volume**:
-Default: Not configured
+- Low on a client computer.
-| Event ID | Event message |
-| - | - |
-| 4627 | Group membership information. |
-
-## Related topics
+- Medium on a domain controller or network servers.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | Group membership information for logged in user can help to detect that member of specific domain or local group logged in to the machine (for example, member of database administrators, built-in local administrators, domain administrators, service accounts group or other high value groups).
For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | Group membership information for logged in user can help to detect that member of specific domain or local group logged in to the machine (for example, member of database administrators, built-in local administrators, domain administrators, service accounts group or other high value groups).
For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | Group membership information for logged in user can help to detect that member of specific domain or local group logged in to the machine (for example, member of database administrators, built-in local administrators, domain administrators, service accounts group or other high value groups).
For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4627](event-4627.md)(S): Group membership information.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-handle-manipulation.md b/windows/keep-secure/audit-handle-manipulation.md
index 6b9fb9ab21..54bcdc2d64 100644
--- a/windows/keep-secure/audit-handle-manipulation.md
+++ b/windows/keep-secure/audit-handle-manipulation.md
@@ -2,37 +2,41 @@
title: Audit Handle Manipulation (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed.
ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Handle Manipulation
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Handle Manipulation**, which determines whether the operating system generates audit events when a handle to an object is opened or closed.
-Only objects with configured system access control lists (SACLs) generate these events, and only if the attempted handle operation matches the SACL.
+Audit Handle Manipulation enables generation of “4658: The handle to an object was closed” in [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), [Audit Removable Storage](audit-removable-storage.md) and [Audit SAM](audit-sam.md) subcategories, and shows object’s handle duplication and close actions.
-> **Important:** Handle Manipulation events are generated only for object types where the corresponding File System or Registry Object Access subcategory is enabled. For more information, see [Audit File System](audit-file-system.md) or [Audit Registry](audit-registry.md).
-
+**Event volume**: High.
-Event volume: High, depending on how SACLs are configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | No | No | Typically, information about the duplication or closing of an object handle has little to no security relevance and is hard to parse or analyze.
There is no recommendation to enable this subcategory for Success or Failure auditing, unless you know exactly what you need to monitor in Object’s Handles level. |
+| Member Server | No | No | No | No | Typically, information about the duplication or closing of an object handle has little to no security relevance and is hard to parse or analyze.
There is no recommendation to enable this subcategory for Success or Failure auditing, unless you know exactly what you need to monitor in Object’s Handles level. |
+| Workstation | No | No | No | No | Typically, information about the duplication or closing of an object handle has little to no security relevance and is hard to parse or analyze.
There is no recommendation to enable this subcategory for Success or Failure auditing, unless you know exactly what you need to monitor in Object’s Handles level. |
-Default: Not configured
+**Events List:**
-| Event ID | Event message |
-| - | - |
-| 4656 | A handle to an object was requested. |
-| 4658 | The handle to an object was closed. |
-| 4690 | An attempt was made to duplicate a handle to an object. |
-
-## Related topics
+- [4658](event-4658.md)(S): The handle to an object was closed.
+
+- [4690](event-4690.md)(S): An attempt was made to duplicate a handle to an object.
+
+## 4658(S): The handle to an object was closed.
+
+This event doesn’t generate in this subcategory, but you can use this subcategory to enable it. For a description of the event, see “[4658](event-4658.md)(S): The handle to an object was closed” in the Audit File System subcategory.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-ipsec-driver.md b/windows/keep-secure/audit-ipsec-driver.md
index dbe0ede32c..8125b82896 100644
--- a/windows/keep-secure/audit-ipsec-driver.md
+++ b/windows/keep-secure/audit-ipsec-driver.md
@@ -2,53 +2,69 @@
title: Audit IPsec Driver (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit IPsec Driver, which determines whether the operating system generates audit events for the activities of the IPsec driver.
ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit IPsec Driver
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit IPsec Driver**, which determines whether the operating system generates audit events for the activities of the IPsec driver.
-The IPsec driver, using the IP Filter List from the active IPsec policy, watches for outbound IP packets that must be secured and inbound IP packets that must be verified and decrypted. This security policy setting reports on the following activities of the IPsec driver:
+Audit IPsec Driver allows you to audit events generated by IPSec driver such as the following:
-- Startup and shutdown of IPsec services.
-- Packets dropped due to integrity-check failure.
-- Packets dropped due to replay-check failure.
-- Packets dropped due to being in plaintext.
-- Packets received with an incorrect Security Parameter Index (SPI). (This can indicate malfunctioning hardware or interoperability problems.)
-- Failure to process IPsec filters.
+- Startup and shutdown of the IPsec services.
+
+- Network packets dropped due to integrity check failure.
+
+- Network packets dropped due to replay check failure.
+
+- Network packets dropped due to being in plaintext.
+
+- Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated.
+
+- Inability to process IPsec filters.
A high rate of packet drops by the IPsec filter driver may indicate attempts to gain access to the network by unauthorized systems.
Failure to process IPsec filters poses a potential security risk because some network interfaces may not get the protection that is provided by the IPsec filter.
-Event volume: Medium
+This subcategory is outside the scope of this document.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at IPsec Driver level. |
+| Member Server | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at IPsec Driver level. |
+| Workstation | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at IPsec Driver level. |
-| Event ID | Event message |
-| - | - |
-| 4960 | IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations. |
-| 4961 | IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer. |
-| 4962 | IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay. |
-| 4963 | IPsec dropped an inbound clear text packet that should have been secured. This is usually due to the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt. |
-| 4965 | IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error may also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored. |
-| 5478 | IPsec Services has started successfully. |
-| 5479 | IPsec Services has been shut down successfully. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. |
-| 5480 | IPsec Services failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. |
-| 5483 | IPsec Services failed to initialize RPC server. IPsec Services could not be started. |
-| 5484 | IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. |
-| 5485 | IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. |
-
-## Related topics
+## 4960(S): IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations.
+
+## 4961(S): IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer.
+
+## 4962(S): IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay.
+
+## 4963(S): IPsec dropped an inbound clear text packet that should have been secured. This is usually due to the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt.
+
+## 4965(S): IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error may also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored.
+
+## 5478(S): IPsec Services has started successfully.
+
+## 5479(): IPsec Services has been shut down successfully. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks.
+
+## 5480(F): IPsec Services failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.
+
+## 5483(F): IPsec Services failed to initialize RPC server. IPsec Services could not be started.
+
+## 5484(F): IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks.
+
+## 5485(F): IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-ipsec-extended-mode.md b/windows/keep-secure/audit-ipsec-extended-mode.md
index 5030fc74a2..cf9bd5a83c 100644
--- a/windows/keep-secure/audit-ipsec-extended-mode.md
+++ b/windows/keep-secure/audit-ipsec-extended-mode.md
@@ -2,41 +2,45 @@
title: Audit IPsec Extended Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Extended Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit IPsec Extended Mode
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit IPsec Extended Mode**, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
-IKE is an Internet standard, defined in RFC 2409, that defines a mechanism to establish IPsec security associations (SAs). An SA is a combination of a mutually agreeable policy and keys that define the security services and mechanisms that help protect communication between IPsec peers.
+Audit IPsec Extended Mode allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
-AuthIP is an enhanced version of IKE that offers additional flexibility with support for user-based authentication, authentication with multiple credentials, improved authentication method negotiation, and asymmetric authentication. Like IKE, AuthIP supports main-mode and quick-mode negotiation.
-AuthIP also supports Extended Mode, a part of IPsec peer negotiation during which a second round of authentication can be performed. Extended Mode, which is optional, can be used for multiple authentications. For example, with extended mode you can perform separate computer-based and user-based authentications.
+Audit IPsec Extended Mode subcategory is out of scope of this document, because this subcategory is mainly used for IPsec Extended Mode troubleshooting.
-Event volume: High
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Extended Mode troubleshooting, or for tracing or monitoring IPsec Extended Mode operations. |
+| Member Server | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Extended Mode troubleshooting, or for tracing or monitoring IPsec Extended Mode operations. |
+| Workstation | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Extended Mode troubleshooting, or for tracing or monitoring IPsec Extended Mode operations. |
-Default: Not configured
+## 4978: During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.
-| Event ID | Event message |
-| - | - |
-| 4978 | During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. |
-| 4979 | IPsec Main Mode and Extended Mode security associations were established.
**Note:** This event provides event data in the following categories: Main Mode Local Endpoint, Main Mode Remote Endpoint, Main Mode Cryptographic Information, Main Mode Security Association, Main Mode Additional Information, and Extended Mode Information. |
-| 4980 | IPsec Main Mode and Extended Mode security associations were established.
**Note:** This event provides event audit data in the following categories: Main Mode Local Endpoint, Main Mode Remote Endpoint. Main Mode Cryptographic Information, Main Mode Security Association, Main Mode Additional Information, Extended Mode Local Endpoint, Extended Mode Remote Endpoint, and Extended Mode Additional Information: |
-| 4981 | IPsec Main Mode and Extended Mode security associations were established.
**Note:** This event provides event audit data in the following categories: Local Endpoint, Local Certificate, Remote Endpoint, Remote Certificate, Cryptographic Information, Security Association Information, Additional Information, and Extended Mode Information. |
-| 4982 | IPsec Main Mode and Extended Mode security associations were established.
**Note:** This event provides event audit data in the following categories: Local Endpoint, Local Certificate, Remote Endpoint, Remote Certificate, Cryptographic Information, Security Association Information, Additional Information, Extended Mode Local Endpoint, Extended Mode Remote Endpoint, and Extended Mode Additional Information. |
-| 4983 | An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.
**Note:** This event provides event audit data in the following categories: Local Endpoint, Local Certificate, Remote Endpoint, Remote Certificate, and Failure Information. |
-| 4984 | An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.
**Note:** This event provides event audit data in the following categories: Local Endpoint, Remote Endpoint, Additional Information, and Failure Information. |
-
-## Related topics
+## 4979: IPsec Main Mode and Extended Mode security associations were established.
+
+## 4980: IPsec Main Mode and Extended Mode security associations were established.
+
+## 4981: IPsec Main Mode and Extended Mode security associations were established.
+
+## 4982: IPsec Main Mode and Extended Mode security associations were established.
+
+## 4983: An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.
+
+## 4984: An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-ipsec-main-mode.md b/windows/keep-secure/audit-ipsec-main-mode.md
index 872af92c04..1af0eed70b 100644
--- a/windows/keep-secure/audit-ipsec-main-mode.md
+++ b/windows/keep-secure/audit-ipsec-main-mode.md
@@ -2,42 +2,49 @@
title: Audit IPsec Main Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Main Mode, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit IPsec Main Mode
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit IPsec Main Mode**, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
-IKE is an Internet standard, defined in RFC 2409, that defines a mechanism to establish IPsec security associations (SAs). An SA is a combination of a mutually agreeable policy and keys that define the security services and mechanisms that help protect communication between IPsec peers.
-AuthIP is an enhanced version of IKE that offers additional flexibility with support for user-based authentication, authentication with multiple credentials, improved authentication method negotiation, and asymmetric authentication. Like IKE, AuthIP supports Main Mode and Quick Mode negotiation.
-Main Mode Internet Key Exchange (IKE) negotiation establishes a secure channel, known as the Internet Security Association and Key Management Protocol (ISAKMP) security association (SA), between two computers. To establish the secure channel, Main Mode negotiation determines a set of cryptographic protection suites, exchanges keying material to establish the shared secret key, and authenticates computer identities.
+Audit IPsec Main Mode allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
-Event volume: High
+Audit IPsec Main Mode subcategory is out of scope of this document, because this subcategory is mainly used for IPsec Main Mode troubleshooting.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations. |
+| Member Server | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations. |
+| Workstation | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations. |
-| Event ID | Event message |
-| - | - |
-| 4646 | Security ID: %1 |
-| 4650 | An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used. |
-| 4651 | An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication. |
-| 4652 | An IPsec Main Mode negotiation failed.
**Note:** This audit event returns detailed audit data in the following categories: Local Endpoint, Local Certificate, Remote Endpoint, Remote Certificate, Additional Information, and Failure Information. |
-| 4653 | An IPsec Main Mode negotiation failed.
**Note:** This audit event returns detailed audit data in the following categories: Local Endpoint, Remote Endpoint, Additional Information, and Failure Information. |
-| 4655 | An IPsec Main Mode security association ended. |
-| 4976 | During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. |
-| 5049 | An IPsec Security Association was deleted. |
-| 5453 | An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started. |
-
-## Related topics
+## 4646: Security ID: %1
+
+## 4650: An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used.
+
+## 4651: An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication.
+
+## 4652: An IPsec Main Mode negotiation failed.
+
+## 4653: An IPsec Main Mode negotiation failed.
+
+## 4655: An IPsec Main Mode security association ended.
+
+## 4976: During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.
+
+## 5049: An IPsec Security Association was deleted.
+
+## 5453: An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-ipsec-quick-mode.md b/windows/keep-secure/audit-ipsec-quick-mode.md
index 8a3446cb65..71f1afee93 100644
--- a/windows/keep-secure/audit-ipsec-quick-mode.md
+++ b/windows/keep-secure/audit-ipsec-quick-mode.md
@@ -2,36 +2,37 @@
title: Audit IPsec Quick Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit IPsec Quick Mode
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit IPsec Quick Mode**, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
-IKE is an Internet standard, defined in RFC 2409, that defines a mechanism to establish IPsec security associations (SAs). An SA is a combination of a mutually agreeable policy and keys that define the security services and mechanisms that help protect communication between IPsec peers.
-AuthIP is an enhanced version of IKE that offers additional flexibility with support for user-based authentication, authentication with multiple credentials, improved authentication method negotiation, and asymmetric authentication. Like IKE, AuthIP supports Main Mode and Quick Mode negotiation.
-Quick Mode (also known as Phase 2) IKE negotiation establishes a secure channel between two computers to protect data. Because this phase involves the establishment of security associations (SAs) that are negotiated on behalf of the IPsec service, the SAs that are created during Quick Mode are called the IPsec SAs. During Quick Mode, keying material is refreshed or, if necessary, new keys are generated. A protection suite that protects specified IP traffic is also selected. A protection suite is a defined set of data integrity or data encryption settings. Quick Mode is not considered a complete exchange because it is dependent on a Main Mode exchange.
+Audit IPsec Quick Mode allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
-Event volume: High
+Audit IPsec Quick Mode subcategory is out of scope of this document, because this subcategory is mainly used for IPsec Quick Mode troubleshooting.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Quick Mode troubleshooting, or for tracing or monitoring IPsec Quick Mode operations. |
+| Member Server | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Quick Mode troubleshooting, or for tracing or monitoring IPsec Quick Mode operations. |
+| Workstation | IF | IF | IF | IF | IF - This subcategory is mainly used for IPsec Quick Mode troubleshooting, or for tracing or monitoring IPsec Quick Mode operations. |
-| Event ID | Event message |
-|- |- |
-| 4977 | During Quick Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.|
-| 5451 | An IPsec Quick Mode security association was established.|
-| 5452 | An IPsec Quick Mode security association ended.|
-
-## Related topics
+## 4977: During Quick Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.
+
+## 5451: An IPsec Quick Mode security association was established.
+
+## 5452: An IPsec Quick Mode security association ended.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-kerberos-authentication-service.md b/windows/keep-secure/audit-kerberos-authentication-service.md
index f8665de37e..7d2af0f81d 100644
--- a/windows/keep-secure/audit-kerberos-authentication-service.md
+++ b/windows/keep-secure/audit-kerberos-authentication-service.md
@@ -2,35 +2,43 @@
title: Audit Kerberos Authentication Service (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Kerberos Authentication Service
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Kerberos Authentication Service**, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
+
+Audit Kerberos Authentication Service determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful attempts and Failure audits record unsuccessful attempts.
-Event volume: High on Kerberos Key Distribution Center servers
+**Event volume**: High on Kerberos Key Distribution Center servers.
-Default: Not configured
+This subcategory contains events about issued TGTs and failed TGT requests. It also contains events about failed Pre-Authentications, due to wrong user password or when the user’s password has expired.
-| Event ID | Event message |
-| - | - |
-| 4768 | A Kerberos authentication ticket (TGT) was requested. |
-| 4771 | Kerberos preauthentication failed. |
-| 4772 | A Kerberos authentication ticket request failed. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend Success auditing, because you will see all Kerberos Authentication requests (TGT requests), which are a part of domain account logons. Also, you can see the IP address from which this account requested a TGT, when TGT was requested, which encryption type was used and so on.
We recommend Failure auditing, because you will see all failed requests with wrong password, username, revoked certificate, and so on. You will also be able to detect Kerberos issues or possible attack attempts.
Expected volume is high on domain controllers. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
+
+**Events List:**
+
+- [4768](event-4768.md)(S, F): A Kerberos authentication ticket (TGT) was requested.
+
+- [4771](event-4771.md)(F): Kerberos pre-authentication failed.
+
+- [4772](event-4772.md)(F): A Kerberos authentication ticket request failed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-kerberos-service-ticket-operations.md b/windows/keep-secure/audit-kerberos-service-ticket-operations.md
index 4e3a1976d6..5fbdfa66fe 100644
--- a/windows/keep-secure/audit-kerberos-service-ticket-operations.md
+++ b/windows/keep-secure/audit-kerberos-service-ticket-operations.md
@@ -2,37 +2,43 @@
title: Audit Kerberos Service Ticket Operations (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Kerberos Service Ticket Operations
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Kerberos Service Ticket Operations**, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
+
+Audit Kerberos Service Ticket Operations determines whether the operating system generates security audit events for Kerberos service ticket requests.
Events are generated every time Kerberos is used to authenticate a user who wants to access a protected network resource. Kerberos service ticket operation audit events can be used to track user activity.
-Event volume:
+**Event volume**: Very High on Kerberos Key Distribution Center servers.
-- High on a domain controller that is in a Key Distribution Center (KDC)
-- Low on domain members
+This subcategory contains events about issued TGSs and failed TGS requests.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | Yes | Yes | Yes | Expected volume is very high on domain controllers.
IF - We recommend Success auditing, because you will see all Kerberos Service Ticket requests (TGS requests), which are part of service use and access requests by specific accounts. Also, you can see the IP address from which this account requested TGS, when TGS was requested, which encryption type was used, and so on. For recommendations for using and analyzing the collected information, see the ***Security Monitoring Recommendations*** sections.
We recommend Failure auditing, because you will see all failed requests and be able to investigate the reason for failure. You will also be able to detect Kerberos issues or possible attack attempts. |
+| Member Server | No | No | No | No | This subcategory makes sense only on domain controllers. |
+| Workstation | No | No | No | No | This subcategory makes sense only on domain controllers. |
-| Event ID | Event message |
-| - | - |
-| 4769 | A Kerberos service ticket was requested. |
-| 4770 | A Kerberos service ticket was renewed. |
-
-## Related topics
+**Events List:**
+
+- [4769](event-4769.md)(S, F): A Kerberos service ticket was requested.
+
+- [4770](event-4770.md)(S): A Kerberos service ticket was renewed.
+
+- [4773](event-4773.md)(F): A Kerberos service ticket request failed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-kernel-object.md b/windows/keep-secure/audit-kernel-object.md
index 6600a97c21..e8928abb49 100644
--- a/windows/keep-secure/audit-kernel-object.md
+++ b/windows/keep-secure/audit-kernel-object.md
@@ -2,40 +2,49 @@
title: Audit Kernel Object (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Kernel Object
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Kernel Object**, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
-Only kernel objects with a matching system access control list (SACL) generate security audit events. The audits generated are usually useful only to developers.
+Audit Kernel Object determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
-Typically, kernel objects are given SACLs only if the **AuditBaseObjects** or **AuditBaseDirectories** auditing options are enabled.
+Only kernel objects with a matching system access control list ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)) generate security audit events. The audits generated are usually useful only to developers.
-> **Note:** The **Audit: Audit the access of global system objects** policy setting controls the default SACL of kernel objects.
-
-Event volume: High if you have enabled one of the Global Object Access Auditing settings
+Typically, kernel objects are given SACLs only if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled.
+
+The “[Audit: Audit the access of global system objects](https://technet.microsoft.com/en-us/library/jj852233.aspx)” policy setting controls the default SACL of kernel objects.
+
+**Event volume**: High.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | No | No | Typically Kernel object auditing events have little to no security relevance and are hard to parse or analyze. Also, the volume of these events is typically very high.
There is no recommendation to enable this subcategory, unless you know exactly what you need to monitor at the Kernel objects level. |
+| Member Server | No | No | No | No | Typically Kernel object auditing events have little to no security relevance and are hard to parse or analyze. Also, the volume of these events is typically very high.
There is no recommendation to enable this subcategory, unless you know exactly what you need to monitor at the Kernel objects level. |
+| Workstation | No | No | No | No | Typically Kernel object auditing events have little to no security relevance and are hard to parse or analyze. Also, the volume of these events is typically very high.
There is no recommendation to enable this subcategory, unless you know exactly what you need to monitor at the Kernel objects level. |
+
+**Events List:**
+
+- [4656](event-4656.md)(S, F): A handle to an object was requested.
+
+- [4658](event-4658.md)(S): The handle to an object was closed.
+
+- [4660](event-4660.md)(S): An object was deleted.
+
+- [4663](event-4663.md)(S): An attempt was made to access an object.
-Default setting: Not configured
-| Event ID | Event message |
-| - | - |
-| 4659 | A handle to an object was requested with intent to delete. |
-| 4660 | An object was deleted. |
-| 4661 | A handle to an object was requested. |
-| 4663 | An attempt was made to access an object. |
-
-## Related topics
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-logoff.md b/windows/keep-secure/audit-logoff.md
index 56970b2562..81be31807c 100644
--- a/windows/keep-secure/audit-logoff.md
+++ b/windows/keep-secure/audit-logoff.md
@@ -2,38 +2,45 @@
title: Audit Logoff (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated.
ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Logoff
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Logoff**, which determines whether the operating system generates audit events when logon sessions are terminated.
+
+Audit Logoff determines whether the operating system generates audit events when logon sessions are terminated.
These events occur on the computer that was accessed. In the case of an interactive logon, these events are generated on the computer that was logged on to.
-> **Note: ** There is no failure event in this subcategory because failed logoffs (such as when a system abruptly shuts down) do not generate an audit record.
-
+There is no failure event in this subcategory because failed logoffs (such as when a system abruptly shuts down) do not generate an audit record.
+
Logon events are essential to understanding user activity and detecting potential attacks. Logoff events are not 100 percent reliable. For example, the computer can be turned off without a proper logoff and shutdown; in this case, a logoff event is not generated.
-Event volume: Low
+**Event volume**: Low.
-Default: Success
+This subcategory allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to.
-| Event ID | Event message |
-| - | - |
-| 4634 | An account was logged off. |
-| 4647 | User initiated logoff. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | Yes | No | This subcategory typically generates huge amount of “[4634](event-4634.md)(S): An account was logged off.” events which, typically has little security relevance. It is more important to audit Logon events using [Audit Logon](audit-logon.md) subcategory, rather than Logoff events.
Enable Success audit if you want to track, for example, for how long session was active (in correlation with [Audit Logon](audit-logon.md) events) and when user actually logged off.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | Yes | No | This subcategory typically generates huge amount of “[4634](event-4634.md)(S): An account was logged off.” events which, typically has little security relevance. It is more important to audit Logon events using [Audit Logon](audit-logon.md) subcategory, rather than Logoff events.
Enable Success audit if you want to track, for example, for how long session was active (in correlation with [Audit Logon](audit-logon.md) events) and when user actually logged off.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | No | No | Yes | No | This subcategory typically generates huge amount of “[4634](event-4634.md)(S): An account was logged off.” events which, typically has little security relevance. It is more important to audit Logon events using [Audit Logon](audit-logon.md) subcategory, rather than Logoff events.
Enable Success audit if you want to track, for example, for how long session was active (in correlation with [Audit Logon](audit-logon.md) events) and when user actually logged off.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4634](event-4634.md)(S): An account was logged off.
+
+- [4647](event-4647.md)(S): User initiated logoff.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-logon.md b/windows/keep-secure/audit-logon.md
index bd363a9eb0..f7ff28f320 100644
--- a/windows/keep-secure/audit-logon.md
+++ b/windows/keep-secure/audit-logon.md
@@ -2,44 +2,57 @@
title: Audit Logon (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer.
ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Logon
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Logon**, which determines whether the operating system generates audit events when a user attempts to log on to a computer.
+
+Audit Logon determines whether the operating system generates audit events when a user attempts to log on to a computer.
These events are related to the creation of logon sessions and occur on the computer that was accessed. For an interactive logon, events are generated on the computer that was logged on to. For a network logon, such as accessing a share, events are generated on the computer that hosts the resource that was accessed.
The following events are recorded:
- Logon success and failure.
-- Logon attempts by using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account's credentials. This most commonly occurs in batch configurations such as scheduled tasks, or when using the Runas command.
+
+- Logon attempts by using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account's credentials. This most commonly occurs in batch configurations such as scheduled tasks, or when using the **RunAs** command.
+
- Security identifiers (SIDs) are filtered.
Logon events are essential to tracking user activity and detecting potential attacks.
-Event volume: Low on a client computer; medium on a domain controller or network server
+**Event volume**:
-Default: Success for client computers; success and failure for servers
+- Low on a client computer.
-| Event ID | Event message |
-| - | - |
-| 4624 | An account was successfully logged on. |
-| 4625 | An account failed to log on. |
-| 4648 | A logon was attempted using explicit credentials. |
-| 4675 | SIDs were filtered. |
-
-## Related topics
+- Medium on a domain controllers or network servers.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | Audit Logon events, for example, will give you information about which account, when, using which Logon Type, from which machine logged on to this machine.
Failure events will show you failed logon attempts and the reason why these attempts failed. |
+| Member Server | Yes | Yes | Yes | Yes | Audit Logon events, for example, will give you information about which account, when, using which Logon Type, from which machine logged on to this machine.
Failure events will show you failed logon attempts and the reason why these attempts failed. |
+| Workstation | Yes | Yes | Yes | Yes | Audit Logon events, for example, will give you information about which account, when, using which Logon Type, from which machine logged on to this machine.
Failure events will show you failed logon attempts and the reason why these attempts failed. |
+
+**Events List:**
+
+- [4624](event-4624.md)(S): An account was successfully logged on.
+
+- [4625](event-4625.md)(F): An account failed to log on.
+
+- [4648](event-4648.md)(S): A logon was attempted using explicit credentials.
+
+- [4675](event-4675.md)(S): SIDs were filtered.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-mpssvc-rule-level-policy-change.md b/windows/keep-secure/audit-mpssvc-rule-level-policy-change.md
index ab8412a168..83a72a4045 100644
--- a/windows/keep-secure/audit-mpssvc-rule-level-policy-change.md
+++ b/windows/keep-secure/audit-mpssvc-rule-level-policy-change.md
@@ -2,54 +2,77 @@
title: Audit MPSSVC Rule-Level Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit MPSSVC Rule-Level Policy Change
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit MPSSVC Rule-Level Policy Change**, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
+
+Audit MPSSVC Rule-Level Policy Change determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
The Microsoft Protection Service, which is used by Windows Firewall, is an integral part of the computer’s threat protection against malware. The tracked activities include:
- Active policies when the Windows Firewall service starts.
+
- Changes to Windows Firewall rules.
+
- Changes to the Windows Firewall exception list.
+
- Changes to Windows Firewall settings.
+
- Rules ignored or not applied by the Windows Firewall service.
+
- Changes to Windows Firewall Group Policy settings.
Changes to firewall rules are important for understanding the security state of the computer and how well it is protected against network attacks.
-Event volume: Low
+**Event volume**: Medium.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | Success events shows you changes in Windows Firewall rules and settings, active configuration and rules after Windows Firewall Service startup and default configuration restore actions.
Failure events may help to identify configuration problems with Windows Firewall rules or settings. |
+| Member Server | Yes | Yes | Yes | Yes | Success events shows you changes in Windows Firewall rules and settings, active configuration and rules after Windows Firewall Service startup and default configuration restore actions.
Failure events may help to identify configuration problems with Windows Firewall rules or settings. |
+| Workstation | Yes | Yes | Yes | Yes | Success events shows you changes in Windows Firewall rules and settings, active configuration and rules after Windows Firewall Service startup and default configuration restore actions.
Failure events may help to identify configuration problems with Windows Firewall rules or settings. |
-| Event ID | Event message |
-| - | - |
-| 4944 | The following policy was active when the Windows Firewall started. |
-| 4945 | A rule was listed when the Windows Firewall started. |
-| 4946 | A change has been made to Windows Firewall exception list. A rule was added. |
-| 4947 | A change has been made to Windows Firewall exception list. A rule was modified. |
-| 4948 | A change has been made to Windows Firewall exception list. A rule was deleted. |
-| 4949 | Windows Firewall settings were restored to the default values. |
-| 4950 | A Windows Firewall setting has changed. |
-| 4951 | A rule has been ignored because its major version number was not recognized by Windows Firewall. |
-| 4952 | Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. |
-| 4953 | A rule has been ignored by Windows Firewall because it could not parse the rule. |
-| 4954 | Windows Firewall Group Policy settings have changed. The new settings have been applied. |
-| 4956 | Windows Firewall has changed the active profile. |
-| 4957 | Windows Firewall did not apply the following rule: |
-| 4958 | Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer: |
-
-## Related topics
+**Events List:**
+
+- [4944](event-4944.md)(S): The following policy was active when the Windows Firewall started.
+
+- [4945](event-4945.md)(S): A rule was listed when the Windows Firewall started.
+
+- [4946](event-4946.md)(S): A change has been made to Windows Firewall exception list. A rule was added.
+
+- [4947](event-4947.md)(S): A change has been made to Windows Firewall exception list. A rule was modified.
+
+- [4948](event-4948.md)(S): A change has been made to Windows Firewall exception list. A rule was deleted.
+
+- [4949](event-4949.md)(S): Windows Firewall settings were restored to the default values.
+
+- [4950](event-4950.md)(S): A Windows Firewall setting has changed.
+
+- [4951](event-4951.md)(F): A rule has been ignored because its major version number was not recognized by Windows Firewall.
+
+- [4952](event-4952.md)(F): Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.
+
+- [4953](event-4953.md)(F): A rule has been ignored by Windows Firewall because it could not parse the rule.
+
+- [4954](event-4954.md)(S): Windows Firewall Group Policy settings have changed. The new settings have been applied.
+
+- [4956](event-4956.md)(S): Windows Firewall has changed the active profile.
+
+- [4957](event-4957.md)(F): Windows Firewall did not apply the following rule:
+
+- [4958](event-4958.md)(F): Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-network-policy-server.md b/windows/keep-secure/audit-network-policy-server.md
index f98d7f0579..859c030a3a 100644
--- a/windows/keep-secure/audit-network-policy-server.md
+++ b/windows/keep-secure/audit-network-policy-server.md
@@ -2,40 +2,57 @@
title: Audit Network Policy Server (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Network Policy Server
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Network Policy Server**, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
+
+Audit Network Policy Server allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) activity related to user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.
+
+If you configure this subcategory, an audit event is generated for each IAS and NAP user access request.
+
+This subcategory generates events only if NAS or IAS role is installed on the server.
NAP events can be used to help understand the overall health of the network.
-Event volume: Medium to high on servers that are running Network Policy Server (NPS); moderate on other servers or on client computers
+**Event volume**: Medium to High on servers that are running [Network Policy Server](https://msdn.microsoft.com/en-us/library/cc732912.aspx) (NPS).
-Default: Success and failure
+Role-specific subcategories are outside the scope of this document.
-| Event ID | Event message |
-| - | - |
-| 6272 | Network Policy Server granted access to a user. |
-| 6273 | Network Policy Server denied access to a user. |
-| 6274 | Network Policy Server discarded the request for a user. |
-| 6275 | Network Policy Server discarded the accounting request for a user. |
-| 6276 | Network Policy Server quarantined a user. |
-| 6277 | Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy. |
-| 6278 | Network Policy Server granted full access to a user because the host met the defined health policy. |
-| 6279 | Network Policy Server locked the user account due to repeated failed authentication attempts. |
-| 6280 | Network Policy Server unlocked the user account. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | IF – if a server has the [Network Policy Server](https://msdn.microsoft.com/en-us/library/cc732912.aspx) (NPS) role installed and you need to monitor access requests and other NPS-related events, enable this subcategory. |
+| Member Server | IF | IF | IF | IF | IF – if a server has the [Network Policy Server](https://msdn.microsoft.com/en-us/library/cc732912.aspx) (NPS) role installed and you need to monitor access requests and other NPS-related events, enable this subcategory. |
+| Workstation | No | No | No | No | [Network Policy Server](https://msdn.microsoft.com/en-us/library/cc732912.aspx) (NPS) role cannot be installed on client OS. |
+
+## 6272: Network Policy Server granted access to a user.
+
+## 6273: Network Policy Server denied access to a user.
+
+## 6274: Network Policy Server discarded the request for a user.
+
+## 6275: Network Policy Server discarded the accounting request for a user.
+
+## 6276: Network Policy Server quarantined a user.
+
+## 6277: Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.
+
+## 6278: Network Policy Server granted full access to a user because the host met the defined health policy.
+
+## 6279: Network Policy Server locked the user account due to repeated failed authentication attempts.
+
+## 6280: Network Policy Server unlocked the user account.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-non-sensitive-privilege-use.md b/windows/keep-secure/audit-non-sensitive-privilege-use.md
index 45dd5b1a2c..b787a4a0a1 100644
--- a/windows/keep-secure/audit-non-sensitive-privilege-use.md
+++ b/windows/keep-secure/audit-non-sensitive-privilege-use.md
@@ -1,68 +1,88 @@
---
-title: Audit Non-Sensitive Privilege Use (Windows 10)
+title: Audit Non Sensitive Privilege Use (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used.
ms.assetid: 8fd74783-1059-443e-aa86-566d78606627
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
-# Audit Non-Sensitive Privilege Use
+# Audit Non Sensitive Privilege Use
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Non-Sensitive Privilege Use**, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used.
-The following privileges are non-sensitive:
+Audit Non Sensitive Privilege Use contains events that show usage of non-sensitive privileges. This is the list of non-sensitive privileges:
-- **Access Credential Manager as a trusted caller**
-- **Access this computer from the network**
-- **Add workstations to domain**
-- **Adjust memory quotas for a process**
-- **Allow log on locally**
-- **Allow log on through Terminal Services**
-- **Bypass traverse checking**
-- **Change the system time**
-- **Create a page file**
-- **Create global objects**
-- **Create permanent shared objects**
-- **Create symbolic links**
-- **Deny access to this computer from the network**
-- **Deny log on as a batch job**
-- **Deny log on as a service**
-- **Deny log on locally**
-- **Deny log on through Terminal Services**
-- **Force shutdown from a remote system**
-- **Increase a process working set**
-- **Increase scheduling priority**
-- **Lock pages in memory**
-- **Log on as a batch job**
-- **Log on as a service**
-- **Modify an object label**
-- **Perform volume maintenance tasks**
-- **Profile single process**
-- **Profile system performance**
-- **Remove computer from docking station**
-- **Shut down the system**
-- **Synchronize directory service data**
+- Access Credential Manager as a trusted caller
+
+- Add workstations to domain
+
+- Adjust memory quotas for a process
+
+- Bypass traverse checking
+
+- Change the system time
+
+- Change the time zone
+
+- Create a page file
+
+- Create global objects
+
+- Create permanent shared objects
+
+- Create symbolic links
+
+- Force shutdown from a remote system
+
+- Increase a process working set
+
+- Increase scheduling priority
+
+- Lock pages in memory
+
+- Modify an object label
+
+- Perform volume maintenance tasks
+
+- Profile single process
+
+- Profile system performance
+
+- Remove computer from docking station
+
+- Shut down the system
+
+- Synchronize directory service data
+
+This subcategory also contains informational events from filesystem Transaction Manager.
If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful attempts, and failure audits record unsuccessful attempts.
-Event volume: Very high
+**Event volume**: Very High.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | IF | No | IF | We do not recommend Success auditing because the volume of events is very high and typically they are not as important as events from [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md) subcategory.
IF – You can enable Failure auditing if you need information about failed attempts to use non-sensitive privileges, for example, **SeShutdownPrivilege** or **SeRemoteShutdownPrivilege**. |
+| Member Server | No | IF | No | IF | We do not recommend Success auditing because the volume of events is very high and typically they are not as important as events from [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md) subcategory.
IF – You can enable Failure auditing if you need information about failed attempts to use non-sensitive privileges, for example, **SeShutdownPrivilege** or **SeRemoteShutdownPrivilege**. |
+| Workstation | No | IF | No | IF | We do not recommend Success auditing because the volume of events is very high and typically they are not as important as events from [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md) subcategory.
IF – You can enable Failure auditing if you need information about failed attempts to use non-sensitive privileges, for example, **SeShutdownPrivilege** or **SeRemoteShutdownPrivilege**. |
+
+**Events List:**
+
+- [4673](event-4673.md)(S, F): A privileged service was called.
+
+- [4674](event-4674.md)(S, F): An operation was attempted on a privileged object.
+
+- [4985](event-4985.md)(S): The state of a transaction has changed.
-Default: Not configured
-| Event ID | Event message |
-| - | - |
-| 4672 | Special privileges assigned to new logon. |
-| 4673 | A privileged service was called. |
-| 4674 | An operation was attempted on a privileged object. |
-
-## Related topics
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-account-logon-events.md b/windows/keep-secure/audit-other-account-logon-events.md
index 4511233562..68e947de07 100644
--- a/windows/keep-secure/audit-other-account-logon-events.md
+++ b/windows/keep-secure/audit-other-account-logon-events.md
@@ -2,53 +2,31 @@
title: Audit Other Account Logon Events (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Account Logon Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Other Account Logon Events**, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
-Examples can include the following:
+**General Subcategory Information:**
-- Remote Desktop session disconnections
-- New Remote Desktop sessions
-- Locking and unlocking a workstation
-- Invoking a screen saver
-- Dismissing a screen saver
-- Detection of a Kerberos replay attack, in which a Kerberos request with identical information was received twice
+This auditing subcategory does not contain any events. It is intended for future use.
- > **Note:** This condition could be caused by a network misconfiguration.
-
-- Access to a wireless network granted to a user or computer account
-- Access to a wired 802.1x network granted to a user or computer account
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | No | No | This auditing subcategory does not contain any events. It is intended for future use, and there is no reason to enable it. |
+| Member Server | No | No | No | No | This auditing subcategory does not contain any events. It is intended for future use, and there is no reason to enable it. |
+| Workstation | No | No | No | No | This auditing subcategory does not contain any events. It is intended for future use, and there is no reason to enable it. |
-Event volume: Varies, depending on system use
-
-Default: Not configured
-
-| Event ID | Event message |
-| - | - |
-| 4649 | A replay attack was detected. |
-| 4778 | A session was reconnected to a Window Station. |
-| 4779 | A session was disconnected from a Window Station. |
-| 4800 | The workstation was locked. |
-| 4801 | The workstation was unlocked. |
-| 4802 | The screen saver was invoked. |
-| 4803 | The screen saver was dismissed. |
-| 5378 | The requested credentials delegation was disallowed by policy. |
-| 5632 | A request was made to authenticate to a wireless network. |
-| 5633 | A request was made to authenticate to a wired network. |
-
-## Related topics
-
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-account-management-events.md b/windows/keep-secure/audit-other-account-management-events.md
index 48fecc4788..fd359417f7 100644
--- a/windows/keep-secure/audit-other-account-management-events.md
+++ b/windows/keep-secure/audit-other-account-management-events.md
@@ -2,38 +2,43 @@
title: Audit Other Account Management Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events.
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Account Management Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Other Account Management Events**, which determines whether the operating system generates user account management audit events.
-Events can be generated for user account management auditing when:
+Audit Other Account Management Events determines whether the operating system generates user account management audit events.
-- The password hash of an account is accessed. This typically happens when the Active Directory Migration Tool (ADMT) is moving password data.
-- The Password Policy Checking application programming interface (API) is called. Calls to this function could be part of an attack from a malicious application that is testing whether password complexity policy settings are being applied.
-- Changes are made to domain policy under **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** or **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy**.
-> **Note:** These events are logged when the domain policy is applied (on refresh or restart), not when settings are modified by an administrator.
-
-Event volume: Low
+**Event volume:** Typically Low on all types of computers.
-Default: Not configured
+This subcategory allows you to audit next events:
-| Event ID | Event message |
-| - | - |
-| 4782 | The password hash for an account was accessed. |
-| 4793 | The Password Policy Checking API was called. |
-
-## Related topics
+- The password hash of a user account was accessed. This happens during an Active Directory Management Tool password migration.
+
+- The Password Policy Checking API was called. Password Policy Checking API allows an application to check password compliance against an application-provided account database or single account and verify that passwords meet the complexity, aging, minimum length, and history reuse requirements of a password policy.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | The only reason to enable Success auditing on domain controllers is to monitor “[4782](event-4782.md)(S): The password hash an account was accessed.”
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | No | No | The only event which is generated on Member Servers is “[4793](event-4793.md)(S): The Password Policy Checking API was called.”, this event is a typical information event with little to no security relevance.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | No | No | No | No | The only event which is generated on Workstations is “[4793](event-4793.md)(S): The Password Policy Checking API was called.”, this event is a typical information event with little to no security relevance.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4782](event-4782.md)(S): The password hash an account was accessed.
+
+- [4793](event-4793.md)(S): The Password Policy Checking API was called.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-logonlogoff-events.md b/windows/keep-secure/audit-other-logonlogoff-events.md
index 5b9c517af5..b8119d7835 100644
--- a/windows/keep-secure/audit-other-logonlogoff-events.md
+++ b/windows/keep-secure/audit-other-logonlogoff-events.md
@@ -2,50 +2,69 @@
title: Audit Other Logon/Logoff Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, which determines whether Windows generates audit events for other logon or logoff events.
ms.assetid: 76d987cd-1917-4907-a739-dd642609a458
+<<<<<<< HEAD
ms.prod: w10
+=======
+ms.pagetype: security
+ms.prod: W10
+>>>>>>> secaudit
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Logon/Logoff Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Other Logon/Logoff Events**, which determines whether Windows generates audit events for other logon or logoff events.
+
+Audit Other Logon/Logoff Events determines whether Windows generates audit events for other logon or logoff events.
These other logon or logoff events include:
- A Remote Desktop session connects or disconnects.
+
- A workstation is locked or unlocked.
+
- A screen saver is invoked or dismissed.
+
- A replay attack is detected. This event indicates that a Kerberos request was received twice with identical information. This condition could also be caused by network misconfiguration.
-- A user is granted access to a wireless network. It can either be a user account or the computer account.
-- A user is granted access to a wired 802.1x network. It can either be a user account or the computer account.
+
+- A user is granted access to a wireless network. It can be either a user account or the computer account.
+
+- A user is granted access to a wired 802.1x network. It can be either a user account or the computer account.
Logon events are essential to understanding user activity and detecting potential attacks.
-Event volume: Low
+**Event volume**: Low.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend Success auditing, to track possible Kerberos replay attacks, terminal session connect and disconnect actions, network authentication events, and some other events. Volume of these events is typically very low.
Failure events will show you when requested credentials [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) delegation was disallowed by policy. The volume of these events is very low—typically you will not get any of these events. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend Success auditing, to track possible terminal session connect and disconnect actions, network authentication events, and some other events. Volume of these events is typically very low.
Failure events will show you when requested credentials [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) delegation was disallowed by policy. The volume of these events is very low—typically you will not get any of these events. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend Success auditing, to track possible terminal session connect and disconnect actions, network authentication events, and some other events. Volume of these events is typically very low.
Failure events will show you when requested credentials [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) delegation was disallowed by policy. The volume of these events is very low—typically you will not get any of these events. |
-| Event ID | Event message |
-| - | - |
-| 4649 | A replay attack was detected. |
-| 4778 | A session was reconnected to a Window Station. |
-| 4779 | A session was disconnected from a Window Station. |
-| 4800 | The workstation was locked. |
-| 4801 | The workstation was unlocked. |
-| 4802 | The screen saver was invoked. |
-| 4803 | The screen saver was dismissed. |
-| 5378 | The requested credentials delegation was disallowed by policy. |
-| 5632 | A request was made to authenticate to a wireless network. |
-| 5633 | A request was made to authenticate to a wired network. |
-
-## Related topics
+**Events List:**
+
+- [4649](event-4649.md)(S): A replay attack was detected.
+
+- [4778](event-4778.md)(S): A session was reconnected to a Window Station.
+
+- [4779](event-4779.md)(S): A session was disconnected from a Window Station.
+
+- [4800](event-4800.md)(S): The workstation was locked.
+
+- [4801](event-4801.md)(S): The workstation was unlocked.
+
+- [4802](event-4802.md)(S): The screen saver was invoked.
+
+- [4803](event-4803.md)(S): The screen saver was dismissed.
+
+- [5378](event-5378.md)(F): The requested credentials delegation was disallowed by policy.
+
+- [5632](event-5632.md)(S): A request was made to authenticate to a wireless network.
+
+- [5633](event-5633.md)(S): A request was made to authenticate to a wired network.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-object-access-events.md b/windows/keep-secure/audit-other-object-access-events.md
index 3d453c1927..66d034006d 100644
--- a/windows/keep-secure/audit-other-object-access-events.md
+++ b/windows/keep-secure/audit-other-object-access-events.md
@@ -2,55 +2,53 @@
title: Audit Other Object Access Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Object Access Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Other Object Access Events**, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
-For scheduler jobs, the following actions are audited:
+Audit Other Object Access Events allows you to monitor operations with scheduled tasks, COM+ objects and indirect object access requests.
-- Job created.
-- Job deleted.
-- Job enabled.
-- Job disabled.
-- Job updated.
+**Event volume**: Low.
-For COM+ objects, the following actions are audited:
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend Success auditing first of all because of scheduled tasks events.
We recommend Failure auditing to get events about possible ICPM DoS attack. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend Success auditing first of all because of scheduled tasks events.
We recommend Failure auditing to get events about possible ICPM DoS attack. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend Success auditing first of all because of scheduled tasks events.
We recommend Failure auditing to get events about possible ICPM DoS attack. |
-- Catalog object added.
-- Catalog object updated.
-- Catalog object deleted.
+**Events List:**
-Event volume: Low
+- [4671](event-4671.md)(-): An application attempted to access a blocked ordinal through the TBS.
-Default: Not configured
+- [4691](event-4691.md)(S): Indirect access to an object was requested.
-| Event ID | Event message |
-| - | - |
-| 4671 | An application attempted to access a blocked ordinal through the TBS. |
-| 4691 | Indirect access to an object was requested. |
-| 4698 | A scheduled task was created. |
-| 4699 | A scheduled task was deleted. |
-| 4700 | A scheduled task was enabled. |
-| 4701 | A scheduled task was disabled. |
-| 4702 | A scheduled task was updated. |
-| 5148 | The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. |
-| 5149 | The DoS attack has subsided and normal processing is being resumed. |
-| 5888 | An object in the COM+ Catalog was modified. |
-| 5889 | An object was deleted from the COM+ Catalog. |
-| 5890 | An object was added to the COM+ Catalog. |
-
-## Related topics
+- [5148](event-5148.md)(F): The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.
+
+- [5149](event-5149.md)(F): The DoS attack has subsided and normal processing is being resumed.
+
+- [4698](event-4698.md)(S): A scheduled task was created.
+
+- [4699](event-4699.md)(S): A scheduled task was deleted.
+
+- [4700](event-4700.md)(S): A scheduled task was enabled.
+
+- [4701](event-4701.md)(S): A scheduled task was disabled.
+
+- [4702](event-4702.md)(S): A scheduled task was updated.
+
+- [5888](event-5888.md)(S): An object in the COM+ Catalog was modified.
+
+- [5889](event-5889.md)(S): An object was deleted from the COM+ Catalog.
+
+- [5890](event-5890.md)(S): An object was added to the COM+ Catalog.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-policy-change-events.md b/windows/keep-secure/audit-other-policy-change-events.md
index 5ef649bca4..0af19e0be4 100644
--- a/windows/keep-secure/audit-other-policy-change-events.md
+++ b/windows/keep-secure/audit-other-policy-change-events.md
@@ -2,50 +2,61 @@
title: Audit Other Policy Change Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Policy Change Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Other Policy Change Events**, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
-These other activities in the Policy Change category that can be audited include:
+Audit Other Policy Change Events contains events about EFS Data Recovery Agent policy changes, changes in Windows Filtering Platform filter, status on Security policy settings updates for local Group Policy settings, Central Access Policy changes, and detailed troubleshooting events for Cryptographic Next Generation (CNG) operations.
-- Trusted Platform Module (TPM) configuration changes.
-- Kernel-mode cryptographic self tests.
-- Cryptographic provider operations.
-- Cryptographic context operations or modifications.
+**Event volume**: Low.
-Event volume: Low
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | Yes | IF | Yes | IF - We do not recommend Success auditing because of event “5447: A Windows Filtering Platform filter has been changed”—this event generates many times during group policy updates and typically is used for troubleshooting purposes for Windows Filtering Platform filters. But you would still need to enable Success auditing for this subcategory if, for example, you must monitor changes in Boot Configuration Data or Central Access Policies.
We recommend Failure auditing, to detect errors in applied Security settings which came from Group Policy, and failure events related to Cryptographic Next Generation (CNG) functions. |
+| Member Server | IF | Yes | IF | Yes | IF - We do not recommend Success auditing because of event “5447: A Windows Filtering Platform filter has been changed”—this event generates many times during group policy updates and typically is used for troubleshooting purposes for Windows Filtering Platform filters. But you would still need to enable Success auditing for this subcategory if, for example, you must monitor changes in Boot Configuration Data or Central Access Policies.
We recommend Failure auditing, to detect errors in applied Security settings which came from Group Policy, and failure events related to Cryptographic Next Generation (CNG) functions. |
+| Workstation | IF | Yes | IF | Yes | IF - We do not recommend Success auditing because of event “5447: A Windows Filtering Platform filter has been changed”—this event generates many times during group policy updates and typically is used for troubleshooting purposes for Windows Filtering Platform filters. But you would still need to enable Success auditing for this subcategory if, for example, you must monitor changes in Boot Configuration Data or Central Access Policies.
We recommend Failure auditing, to detect errors in applied Security settings which came from Group Policy, and failure events related to Cryptographic Next Generation (CNG) functions. |
-Default: Not configured
+**Events List:**
-| Event ID | Event message |
-| - | - |
-| 4670 | Permissions on an object were changed. |
-| 4909 | The local policy settings for the TBS were changed. |
-| 4910 | The group policy settings for the TBS were changed. |
-| 5063 | A cryptographic provider operation was attempted. |
-| 5064 | A cryptographic context operation was attempted. |
-| 5065 | A cryptographic context modification was attempted. |
-| 5066 | A cryptographic function operation was attempted. |
-| 5067 | A cryptographic function modification was attempted. |
-| 5068 | A cryptographic function provider operation was attempted. |
-| 5069 | A cryptographic function property operation was attempted. |
-| 5070 | A cryptographic function property modification was attempted. |
-| 5447 | A Windows Filtering Platform filter has been changed. |
-| 6144 | Security policy in the group policy objects has been applied successfully. |
-| 6145 | One or more errors occurred while processing security policy in the group policy objects. |
-
-## Related topics
+- [4714](event-4714.md)(S): Encrypted data recovery policy was changed.
+
+- [4819](event-4819.md)(S): Central Access Policies on the machine have been changed.
+
+- [4826](event-4826.md)(S): Boot Configuration Data loaded.
+
+- [4909](event-4909.md)(-): The local policy settings for the TBS were changed.
+
+- [4910](event-4910.md)(-): The group policy settings for the TBS were changed.
+
+- [5063](event-5063.md)(S, F): A cryptographic provider operation was attempted.
+
+- [5064](event-5064.md)(S, F): A cryptographic context operation was attempted.
+
+- [5065](event-5065.md)(S, F): A cryptographic context modification was attempted.
+
+- [5066](event-5066.md)(S, F): A cryptographic function operation was attempted.
+
+- [5067](event-5067.md)(S, F): A cryptographic function modification was attempted.
+
+- [5068](event-5068.md)(S, F): A cryptographic function provider operation was attempted.
+
+- [5069](event-5069.md)(S, F): A cryptographic function property operation was attempted.
+
+- [5070](event-5070.md)(S, F): A cryptographic function property modification was attempted.
+
+- [5447](event-5447.md)(S): A Windows Filtering Platform filter has been changed.
+
+- [6144](event-6144.md)(S): Security policy in the group policy objects has been applied successfully.
+
+- [6145](event-6145.md)(F): One or more errors occurred while processing security policy in the group policy objects.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-privilege-use-events.md b/windows/keep-secure/audit-other-privilege-use-events.md
index 5babb23a8a..b5ebe7d056 100644
--- a/windows/keep-secure/audit-other-privilege-use-events.md
+++ b/windows/keep-secure/audit-other-privilege-use-events.md
@@ -2,21 +2,31 @@
title: Audit Other Privilege Use Events (Windows 10)
description: This security policy setting is not used.
ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other Privilege Use Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
+
+
+This auditing subcategory should not have any events in it, but for some reason Success auditing will enable generation of event 4985(S): The state of a transaction has changed.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------|
+| Domain Controller | No | No | No | No | This auditing subcategory doesn’t have any informative events inside. |
+| Member Server | No | No | No | No | This auditing subcategory doesn’t have any informative events inside. |
+| Workstation | No | No | No | No | This auditing subcategory doesn’t have any informative events inside. |
+
+**Events List:**
+
+- [4985](event-4674.md)(S): The state of a transaction has changed.
+
-This security policy setting is not used.
-## Related topics
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-other-system-events.md b/windows/keep-secure/audit-other-system-events.md
index 3bb668bd64..bb1cfd06c3 100644
--- a/windows/keep-secure/audit-other-system-events.md
+++ b/windows/keep-secure/audit-other-system-events.md
@@ -2,59 +2,87 @@
title: Audit Other System Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events.
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Other System Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Other System Events**, which determines whether the operating system audits various system events.
+
+Audit Other System Events contains Windows Firewall Service and Windows Firewall driver start and stop events, failure events for these services and Windows Firewall Service policy processing failures.
+
+Audit Other System Events determines whether the operating system audits various system events.
The system events in this category include:
- Startup and shutdown of the Windows Firewall service and driver.
+
- Security policy processing by the Windows Firewall service.
+
- Cryptography key file and migration operations.
-> **Important:** Failure to start the Windows Firewall service may result in a computer that is not fully protected against network threats.
-
-Event volume: Low
+- BranchCache events.
-Default: Success and failure
+**Event volume**: Low.
-| Event ID | Event message |
-| - | - |
-| 5024 | The Windows Firewall Service has started successfully. |
-| 5025 | The Windows Firewall Service has been stopped. |
-| 5027 | The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. |
-| 5028 | The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. |
-| 5029 | The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. |
-| 5030 | The Windows Firewall Service failed to start. |
-| 5032 | Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.|
-| 5033 | The Windows Firewall Driver has started successfully. |
-| 5034 | The Windows Firewall Driver has been stopped. |
-| 5035 | The Windows Firewall Driver failed to start. |
-| 5037 | The Windows Firewall Driver detected critical runtime error. Terminating.|
-| 5058 | Key file operation. |
-| 5059 | Key migration operation.|
-| 6400 | BranchCache: Received an incorrectly formatted response while discovering availability of content.|
-| 6401 | BranchCache: Received invalid data from a peer. Data discarded. |
-| 6402 | BranchCache: The message to the hosted cache offering it data is incorrectly formatted.|
-| 6403 | BranchCache: The hosted cache sent an incorrectly formatted response to the client. |
-| 6404 | BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.|
-| 6405 | BranchCache: %2 instance(s) of event id %1 occurred. |
-| 6406 | %1 registered to Windows Firewall to control filtering for the following: %2|
-| 6407 | 1% |
-| 6408 | Registered product %1 failed and Windows Firewall is now controlling the filtering for %2 |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend enabling Success and Failure auditing because you will be able to get Windows Firewall Service and Windows Firewall Driver status events. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend enabling Success and Failure auditing because you will be able to get Windows Firewall Service and Windows Firewall Driver status events. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend enabling Success and Failure auditing because you will be able to get Windows Firewall Service and Windows Firewall Driver status events. |
+
+**Events List:**
+
+- [5024](event-5024.md)(S): The Windows Firewall Service has started successfully.
+
+- [5025](event-5025.md)(S): The Windows Firewall Service has been stopped.
+
+- [5027](event-5027.md)(F): The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.
+
+- [5028](event-5028.md)(F): The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.
+
+- [5029](event-5029.md)(F): The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.
+
+- [5030](event-5030.md)(F): The Windows Firewall Service failed to start.
+
+- [5032](event-5032.md)(F): Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
+
+- [5033](event-5033.md)(S): The Windows Firewall Driver has started successfully.
+
+- [5034](event-5034.md)(S): The Windows Firewall Driver was stopped.
+
+- [5035](event-5035.md)(F): The Windows Firewall Driver failed to start.
+
+- [5037](event-5037.md)(F): The Windows Firewall Driver detected critical runtime error. Terminating.
+
+- [5058](event-5058.md)(S, F): Key file operation.
+
+- [5059](event-5059.md)(S, F): Key migration operation.
+
+- [6400](event-6400.md)(-): BranchCache: Received an incorrectly formatted response while discovering availability of content.
+
+- [6401](event-6401.md)(-): BranchCache: Received invalid data from a peer. Data discarded.
+
+- [6402](event-6402.md)(-): BranchCache: The message to the hosted cache offering it data is incorrectly formatted.
+
+- [6403](event-6403.md)(-): BranchCache: The hosted cache sent an incorrectly formatted response to the client.
+
+- [6404](event-6404.md)(-): BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.
+
+- [6405](event-6405.md)(-): BranchCache: %2 instance(s) of event id %1 occurred.
+
+- [6406](event-6406.md)(-): %1 registered to Windows Firewall to control filtering for the following: %2
+
+- [6407](event-6407.md)(-): 1%
+
+- [6408](event-6408.md)(-): Registered product %1 failed and Windows Firewall is now controlling the filtering for %2
+
+- [6409](event-6408.md)(-): BranchCache: A service connection point object could not be parsed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-pnp-activity.md b/windows/keep-secure/audit-pnp-activity.md
index c80884e78c..8558ff0a08 100644
--- a/windows/keep-secure/audit-pnp-activity.md
+++ b/windows/keep-secure/audit-pnp-activity.md
@@ -2,32 +2,45 @@
title: Audit PNP Activity (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit PNP Activity, which determines when plug and play detects an external device.
ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit PNP Activity
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit PNP Activity**, which determines when plug and play detects an external device.
-A PnP audit event can be used to track down changes in system hardware and will be logged on the machine where the change took place. For example, when a keyboard is plugged into a PC a PnP event is triggered.
+Audit PNP Activity determines when Plug and Play detects an external device.
-Event volume: Varies, depending on how the computer is used
+A PnP audit event can be used to track down changes in system hardware and will be logged on the machine where the change took place. For example, when a keyboard is plugged into a computer, a PnP event is triggered.
-Default: Not configured
+**Event volume**: Varies, depending on how the computer is used. Typically Low.
-| Event ID | Event message |
-| - | - |
-| 6416 | A new external device was recognized by the system. |
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | This subcategory will help identify when and which Plug and Play device was attached, enabled, disabled or restricted by device installation policy.
You can track, for example, whether a USB flash drive or stick was attached to a domain controller, which is typically not allowed.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | This subcategory will help identify when and which Plug and Play device was attached, enabled, disabled or restricted by device installation policy.
You can track, for example, whether a USB flash drive or stick was attached to a critical server, which is typically not allowed.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | This subcategory will help identify when and which Plug and Play device was attached, enabled, disabled or restricted by device installation policy.
You can track, for example, whether a USB flash drive or stick was attached to an administrative workstation or VIP workstation.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [6416](event-6416.md)(S): A new external device was recognized by the System
+
+- [6419](event-6419.md)(S): A request was made to disable a device
+
+- [6420](event-6420.md)(S): A device was disabled.
+
+- [6421](event-6421.md)(S): A request was made to enable a device.
+
+- [6422](event-6422.md)(S): A device was enabled.
+
+- [6423](event-6423.md)(S): The installation of this device is forbidden by system policy.
+
+- [6424](event-6424.md)(S): The installation of this device was allowed, after having previously been forbidden by policy.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-process-creation.md b/windows/keep-secure/audit-process-creation.md
index c9c6d41c57..739cc9cf47 100644
--- a/windows/keep-secure/audit-process-creation.md
+++ b/windows/keep-secure/audit-process-creation.md
@@ -2,34 +2,37 @@
title: Audit Process Creation (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Creation, which determines whether the operating system generates audit events when a process is created (starts).
ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Process Creation
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Process Creation**, which determines whether the operating system generates audit events when a process is created (starts).
+
+Audit Process Creation determines whether the operating system generates audit events when a process is created (starts).
These audit events can help you track user activity and understand how a computer is being used. Information includes the name of the program or the user that created the process.
-Event volume: Low to medium, depending on system usage
+**Event volume**: Low to Medium, depending on system usage.
-Default: Not configured
+This subcategory allows you to audit events generated when a process is created or starts. The name of the application and user that created the process is also audited.
-| Event ID | Event message |
-| - | - |
-| 4688 | A new process has been created.|
-| 4696 | A primary token was assigned to a process.|
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | It is typically useful to collect Success auditing information for this subcategory for forensic investigations, to find information who, when and with which options\\parameters ran specific process.
Additionally, you can analyse process creation events for elevated credentials use, potential malicious process names and so on.
The event volume is typically medium-high level, depending on the process activity on the computer.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | It is typically useful to collect Success auditing information for this subcategory for forensic investigations, to find information who, when and with which options\\parameters ran specific process.
Additionally, you can analyse process creation events for elevated credentials use, potential malicious process names and so on.
The event volume is typically medium-high level, depending on the process activity on the computer.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | It is typically useful to collect Success auditing information for this subcategory for forensic investigations, to find information who, when and with which options\\parameters ran specific process.
Additionally, you can analyse process creation events for elevated credentials use, potential malicious process names and so on.
The event volume is typically medium-high level, depending on the process activity on the computer.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4688](event-4688.md)(S): A new process has been created.
+
+- [4696](event-4696.md)(S): A primary token was assigned to process.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-process-termination.md b/windows/keep-secure/audit-process-termination.md
index 9f4fde6d86..9c526efce5 100644
--- a/windows/keep-secure/audit-process-termination.md
+++ b/windows/keep-secure/audit-process-termination.md
@@ -2,37 +2,35 @@
title: Audit Process Termination (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process.
ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Process Termination
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Process Termination**, which determines whether the operating system generates audit events when an attempt is made to end a process.
+
+Audit Process Termination determines whether the operating system generates audit events when process has exited.
Success audits record successful attempts and Failure audits record unsuccessful attempts.
-If you do not configure this policy setting, no audit event is generated when a process ends.
-
This policy setting can help you track user activity and understand how the computer is used.
-Event volume: Varies, depending on how the computer is used
+**Event volume**: Low to Medium, depending on system usage.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | No | No | IF | No | IF - This subcategory typically is not as important as [Audit Process Creation](audit-process-creation.md) subcategory. Using this subcategory you can, for example get information about for how long process was run in correlation with [4688](event-4688.md) event.
If you have a list of critical processes that run on some computers, you can enable this subcategory to monitor for termination of these critical processes.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | No | No | IF | No | IF - This subcategory typically is not as important as [Audit Process Creation](audit-process-creation.md) subcategory. Using this subcategory you can, for example get information about for how long process was run in correlation with [4688](event-4688.md) event.
If you have a list of critical processes that run on some computers, you can enable this subcategory to monitor for termination of these critical processes.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | No | No | IF | No | IF - This subcategory typically is not as important as [Audit Process Creation](audit-process-creation.md) subcategory. Using this subcategory you can, for example get information about for how long process was run in correlation with [4688](event-4688.md) event.
If you have a list of critical processes that run on some computers, you can enable this subcategory to monitor for termination of these critical processes.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
-| Event ID | Event message |
-| - | - |
-| 4689 | A process has exited. |
+**Events List:**
-## Related topics
+- [4689](event-4689.md)(S): A process has exited.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-registry.md b/windows/keep-secure/audit-registry.md
index 2f58eb5560..f994e3be1b 100644
--- a/windows/keep-secure/audit-registry.md
+++ b/windows/keep-secure/audit-registry.md
@@ -2,37 +2,45 @@
title: Audit Registry (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Registry, which determines whether the operating system generates audit events when users attempt to access registry objects.
ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Registry
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Registry**, which determines whether the operating system generates audit events when users attempt to access registry objects.
-Audit events are generated only for objects that have configured system access control lists (SACLs) specified, and only if the type of access requested (such as Write, Read, or Modify) and the account making the request match the settings in the SACL.
+Audit Registry allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists ([SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL.
-If success auditing is enabled, an audit entry is generated each time any account successfully accesses a registry object that has a matching SACL. If failure auditing is enabled, an audit entry is generated each time any user unsuccessfully attempts to access a registry object that has a matching
-SACL.
+If success auditing is enabled, an audit entry is generated each time any account successfully accesses a registry object that has a matching SACL. If failure auditing is enabled, an audit entry is generated each time any user unsuccessfully attempts to access a registry object that has a matching SACL.
-Event volume: Low to medium, depending on how registry SACLs are configured
+**Event volume**: Low to Medium, depending on how registry SACLs are configured.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | IF | IF | IF | We strongly recommend that you develop a Registry Objects Security Monitoring policy and define appropriate [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s for registry objects for different operating system templates and roles. Do not enable this subcategory if you have not planned how to use and analyze the collected information. It is also important to delete non-effective, excess [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx)s. Otherwise the auditing log will be overloaded with useless information.
Failure events can show you unsuccessful attempts to access specific registry objects.
Consider enabling this subcategory for critical computers first, after you develop a Registry Objects Security Monitoring policy for them. |
+| Member Server | IF | IF | IF | IF | |
+| Workstation | IF | IF | IF | IF | |
-| Event ID | Event message |
-| - | - |
-| 4657 | A registry value was modified. |
-| 5039 | A registry key was virtualized. |
-
-## Related topics
+**Events List:**
+
+- [4663](event-4663.md)(S): An attempt was made to access an object.
+
+- [4656](event-4656.md)(S, F): A handle to an object was requested.
+
+- [4658](event-4658.md)(S): The handle to an object was closed.
+
+- [4660](event-4660.md)(S): An object was deleted.
+
+- [4657](event-4657.md)(S): A registry value was modified.
+
+- [5039](event-5039.md)(-): A registry key was virtualized.
+
+- [4670](event-4670.md)(S): Permissions on an object were changed.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-removable-storage.md b/windows/keep-secure/audit-removable-storage.md
index cdfc2b415e..0cd8e17a01 100644
--- a/windows/keep-secure/audit-removable-storage.md
+++ b/windows/keep-secure/audit-removable-storage.md
@@ -2,128 +2,35 @@
title: Audit Removable Storage (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Removable Storage, which determines when there is a read or a write to a removable drive.
ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Removable Storage
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Removable Storage**, which determines when there is a read or a write to a removable drive.
-Event volume: Low
+Audit Removable Storage allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated for all objects and all types of access requested, with no dependency on object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx).
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | This subcategory will help identify when and which files or folders were accessed or modified on removable devices.
It is often useful to track actions with removable storage devices and the files or folders on them, because malicious software very often uses removable devices as a method to get into the system. At the same time, you will be able to track which files were written or executed from a removable storage device.
You can track, for example, actions with files or folders on USB flash drives or sticks that were inserted into domain controllers or high value servers, which is typically not allowed.
We recommend Failure auditing to track failed access attempts. |
+| Member Server | Yes | Yes | Yes | Yes | |
+| Workstation | Yes | Yes | Yes | Yes | |
+
+**Events List:**
+
+- [4656](event-4656.md)(S, F): A handle to an object was requested.
+
+- [4658](event-4658.md)(S): The handle to an object was closed.
+
+- [4663](event-4663.md)(S): An attempt was made to access an object.
-Default: Not configured
-
-
-
-
-
-
-
-
-
-
-4663 |
-An attempt was made to access an object.
-Subject:
-Security ID: %1
-Account Name: %2
-Account Domain: %3
-Logon ID: %4
-Object:
-Object Server: %5
-Object Type: %6
-Object Name: %7
-Handle ID: %8
-Process Information:
-Process ID: %11
-Process Name: %12
-Access Request Information:
-Accesses: %9
-Access Mask: %10 |
-
-
-4659 |
-A handle to an object was requested with intent to delete.
-Subject:
-Security ID: %1
-Account Name: %2
-Account Domain: %3
-Logon ID: %4
-Object:
-Object Server: %5
-Object Type: %6
-Object Name: %7
-Handle ID: %8
-Process Information:
-Process ID: %13
-Access Request Information:
-Transaction ID: %9
-Accesses: %10
-Access Mask: %11
-Privileges Used for Access Check: %12 |
-
-
-4818 |
-Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.
-Subject:
-Security ID: %1
-Account Name: %2
-Account Domain: %3
-Logon ID: %4
-Object:
-Object Server: %5
-Object Type: %6
-Object Name: %7
-Handle ID: %8
-Process Information:
-Process ID: %9
-Process Name: %10
-Current Central Access Policy results:
-Access Reasons: %11
-Proposed Central Access Policy results that differ from the current Central Access Policy results:
-Access Reasons: %12 |
-
-
-4656 |
-A handle to an object was requested.
-Subject:
-Security ID: %1
-Account Name: %2
-Account Domain: %3
-Logon ID: %4
-Object:
-Object Server: %5
-Object Type: %6
-Object Name: %7
-Handle ID: %8
-Resource Attributes: %17
-Process Information:
-Process ID: %15
-Process Name: %16
-Access Request Information:
-Transaction ID: %9
-Accesses: %10
-Access Reasons: %11
-Access Mask: %12
-Privileges Used for Access Check: %13
-Restricted SID Count: %14 |
-
-
-
-
-## Related topics
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-rpc-events.md b/windows/keep-secure/audit-rpc-events.md
index 8bd9607c04..99e1f92cff 100644
--- a/windows/keep-secure/audit-rpc-events.md
+++ b/windows/keep-secure/audit-rpc-events.md
@@ -2,32 +2,29 @@
title: Audit RPC Events (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit RPC Events, which determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made.
ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit RPC Events
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit RPC Events**, which determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made.
-RPC is a technology for creating distributed client/server programs. RPC is an interprocess communication technique that enables client and server software to communicate. For more information, see [What Is RPC?](http://technet.microsoft.com/library/cc787851.aspx).
+Audit RPC Events determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made.
-Event volume: High on RPC servers
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------|
+| Domain Controller | No | No | No | No | Events in this subcategory occur rarely. |
+| Member Server | No | No | No | No | Events in this subcategory occur rarely. |
+| Workstation | No | No | No | No | Events in this subcategory occur rarely. |
-Default: Not configured
+**Events List:**
-| Event ID | Event message |
-| - | - |
-| 5712 | A Remote Procedure Call (RPC) was attempted. |
-
-## Related topics
+- [5712](event-5712.md)(S): A Remote Procedure Call (RPC) was attempted.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-sam.md b/windows/keep-secure/audit-sam.md
index 734ac0681a..7b097dc097 100644
--- a/windows/keep-secure/audit-sam.md
+++ b/windows/keep-secure/audit-sam.md
@@ -2,52 +2,55 @@
title: Audit SAM (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects.
ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit SAM
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit SAM**, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects.
+
+Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager ([SAM](https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx)) objects.
The Security Account Manager (SAM) is a database that is present on computers running Windows operating systems that stores user accounts and security descriptors for users on the local computer.
-SAM objects include the following:
+- SAM objects include the following:
- SAM\_ALIAS: A local group
+
- SAM\_GROUP: A group that is not a local group
+
- SAM\_USER: A user account
+
- SAM\_DOMAIN: A domain
+
- SAM\_SERVER: A computer account
If you configure this policy setting, an audit event is generated when a SAM object is accessed. Success audits record successful attempts, and failure audits record unsuccessful attempts.
-> **Note:** Only the SACL for SAM\_SERVER can be modified.
-
+Only a [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) for SAM\_SERVER can be modified.
+
Changes to user and group objects are tracked by the Account Management audit category. However, user accounts with enough privileges could potentially alter the files in which the account and password information is stored in the system, bypassing any Account Management events.
-Event volume: High on domain controllers
+**Event volume**: High on domain controllers.
-> **Note:** For information about reducing the number of events generated in this subcategory, see [KB841001](http://go.microsoft.com/fwlink/p/?LinkId=121698).
-
-Default setting: Not configured
+For information about reducing the number of events generated in this subcategory, see [KB841001](https://support.microsoft.com/en-us/kb/841001).
-| Event ID | Event message |
-| - | - |
-| 4659 | A handle to an object was requested with intent to delete.|
-| 4660 | An object was deleted. |
-| 4661 | A handle to an object was requested.|
-| 4663 | An attempt was made to access an object.|
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at [Security Account Manager](https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx) level. |
+| Member Server | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at [Security Account Manager](https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx) level. |
+| Workstation | - | - | - | - | There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at [Security Account Manager](https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx) level. |
+
+**Events List:**
+
+- [4661](event-4661.md)(S, F): A handle to an object was requested.
+
+#
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-security-group-management.md b/windows/keep-secure/audit-security-group-management.md
index 7ff17d66f3..4c6f72b3c3 100644
--- a/windows/keep-secure/audit-security-group-management.md
+++ b/windows/keep-secure/audit-security-group-management.md
@@ -2,52 +2,91 @@
title: Audit Security Group Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Security Group Management, which determines whether the operating system generates audit events when specific security group management tasks are performed.
ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Security Group Management
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit Security Group Management**, which determines whether the operating system generates audit events when specific security group management tasks are performed.
-Tasks for security group management include:
+Audit Security Group Management determines whether the operating system generates audit events when specific security group management tasks are performed.
-- A security group is created, changed, or deleted.
-- A member is added to or removed from a security group.
-- A group's type is changed.
-Security groups can be used for access control permissions and also as distribution lists.
+**Event volume**: Low.
-Event volume: Low
+This subcategory allows you to audit events generated by changes to security groups such as the following:
-Default: Success
+- Security group is created, changed, or deleted.
-| Event ID | Event message |
-| - | - |
-| 4727 | A security-enabled global group was created. |
-| 4728 | A member was added to a security-enabled global group. |
-| 4729 | A member was removed from a security-enabled global group. |
-| 4730 | A security-enabled global group was deleted. |
-| 4731 | A security-enabled local group was created. |
-| 4732 | A member was added to a security-enabled local group.|
-| 4733 | A member was removed from a security-enabled local group.|
-| 4734 | A security-enabled local group was deleted. |
-| 4735 | A security-enabled local group was changed. |
-| 4737 | A security-enabled global group was changed. |
-| 4754 | A security-enabled universal group was created.|
-| 4755 | A security-enabled universal group was changed. |
-| 4756 | A member was added to a security-enabled universal group.|
-| 4757 | A member was removed from a security-enabled universal group.|
-| 4758 | A security-enabled universal group was deleted. |
-| 4764 | A group's type was changed. |
+- Member is added or removed from a security group.
-## Related topics
+- Group type is changed.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | We recommend Success auditing of security groups, to see new group creation events, changes and deletion of critical groups. Also you will get information about new members of security groups, when a member was removed from a group and when security group membership was enumerated.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | We recommend Success auditing of security groups, to see new group creation events, changes and deletion of critical groups. Also you will get information about new members of security groups, when a member was removed from a group and when security group membership was enumerated.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | We recommend Success auditing of security groups, to see new group creation events, changes and deletion of critical groups. Also you will get information about new members of security groups, when a member was removed from a group and when security group membership was enumerated.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4731](event-4731.md)(S): A security-enabled local group was created.
+
+- [4732](event-4732.md)(S): A member was added to a security-enabled local group.
+
+- [4733](event-4733.md)(S): A member was removed from a security-enabled local group.
+
+- [4734](event-4734.md)(S): A security-enabled local group was deleted.
+
+- [4735](event-4735.md)(S): A security-enabled local group was changed.
+
+- [4764](event-4764.md)(S): A group’s type was changed.
+
+- [4799](event-4799.md)(S): A security-enabled local group membership was enumerated.
+
+**4727(S): A security-enabled global group was created.** See event “[4731](event-4731.md): A security-enabled local group was created.” Event 4727 is the same, but it is generated for a **global** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4731](event-4731.md) do not apply.
+
+**4737(S): A security-enabled global group was changed.** See event “[4735](event-4735.md): A security-enabled local group was changed.” Event 4737 is the same, but it is generated for a **global** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4735](event-4735.md) do not apply.
+
+**4728(S): A member was added to a security-enabled global group.** See event “[4732](event-4732.md): A member was added to a security-enabled local group.” Event 4728 is the same, but it is generated for a **global** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4732](event-4732.md) do not apply.
+
+**4729(S): A member was removed from a security-enabled global group.** See event “[4733](event-4733.md): A member was removed from a security-enabled local group.” Event 4729 is the same, but it is generated for a **global** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4733](event-4733.md) do not apply.
+
+**4730(S): A security-enabled global group was deleted.** See event “[4734](event-4734.md): A security-enabled local group was deleted.” Event 4730 is the same, but it is generated for a **global** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4734](event-4734.md) do not apply.
+
+**4754(S): A security-enabled universal group was created.** See event “[4731](event-4731.md): A security-enabled local group was created.”. Event 4754 is the same, but it is generated for a **universal** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4731](event-4731.md) do not apply.
+
+**4755(S): A security-enabled universal group was changed.** See event “[4735](event-4735.md): A security-enabled local group was changed.”. Event 4737 is the same, but it is generated for a **universal** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4735](event-4735.md) do not apply.
+
+**4756(S): A member was added to a security-enabled universal group.** See event “[4732](event-4732.md): A member was added to a security-enabled local group.”. Event 4756 is the same, but it is generated for a **universal** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4732](event-4732.md) do not apply.
+
+**4757(S): A member was removed from a security-enabled universal group.** See event “[4733](event-4733.md): A member was removed from a security-enabled local group.”. Event 4757 is the same, but it is generated for a **universal** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4733](event-4733.md) do not apply.
+
+**4758(S): A security-enabled universal group was deleted.** See event “[4734](event-4734.md): A security-enabled local group was deleted.”. Event 4758 is the same, but it is generated for a **universal** security group instead of a **local** security group. All event fields, XML, and recommendations are the same. The type of group is the only difference.
+
+**Important:** this event generates only for domain groups, so the Local sections in event [4734](event-4734.md) do not apply.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-security-state-change.md b/windows/keep-secure/audit-security-state-change.md
index e8c184b3e0..2bf37ca4a0 100644
--- a/windows/keep-secure/audit-security-state-change.md
+++ b/windows/keep-secure/audit-security-state-change.md
@@ -2,44 +2,37 @@
title: Audit Security State Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security State Change, which determines whether Windows generates audit events for changes in the security state of a system.
ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Security State Change
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Security State Change**, which determines whether Windows generates audit events for changes in the security state of a system.
-Changes in the security state of the operating system include:
+Audit Security State Change contains Windows startup, recovery, and shutdown events, and information about changes in system time.
-- System startup and shutdown.
-- Change of system time.
-- System recovery from **CrashOnAuditFail**. This event is logged after a system reboots following **CrashOnAuditFail**.
+**Event volume**: Low.
- > **Important:** Some auditable activity may not be recorded when a system restarts due to **CrashOnAuditFail**.
-
-System startup and shutdown events are important for understanding system usage.
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | The volume of events in this subcategory is very low and all of them are important events and have security relevance.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | The volume of events in this subcategory is very low and all of them are important events and have security relevance.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | The volume of events in this subcategory is very low and all of them are important events and have security relevance.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
-Event volume: Low
+**Events List:**
-Default: Success
+- [4608](event-4608.md)(S): Windows is starting up.
-| Event ID | Event message summary | Minimum requirement |
-| - | - | - |
-| 4608 | Windows is starting up. | Windows Vista, Windows Server 2008 |
-| 4609 | Windows is shutting down. | Windows Vista, Windows Server 2008 |
-| 4616 | The system time was changed.| Windows Vista, Windows Server 2008 |
-| 4621 | Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.| Windows Vista, Windows Server 2008 |
-
-## Related topics
+- [4616](event-4616.md)(S): The system time was changed.
+
+- [4621](event-4621.md)(S): Administrator recovered system from CrashOnAuditFail.
+
+>**Note** Event **4609(S): Windows is shutting down** currently doesn’t generate. It is a defined event, but it is never invoked by the operating system.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-security-system-extension.md b/windows/keep-secure/audit-security-system-extension.md
index 428a0d685c..7d83ba191c 100644
--- a/windows/keep-secure/audit-security-system-extension.md
+++ b/windows/keep-secure/audit-security-system-extension.md
@@ -2,43 +2,47 @@
title: Audit Security System Extension (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security System Extension, which determines whether the operating system generates audit events related to security system extensions.
ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Security System Extension
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Security System Extension**, which determines whether the operating system generates audit events related to security system extensions.
+
+Audit Security System Extension contains information about the loading of an authentication package, notification package, or security package, plus information about trusted logon process registration events.
Changes to security system extensions in the operating system include the following activities:
-- A security extension code is loaded (such as an authentication, notification, or security package). A security extension code registers with the Local Security Authority and will be used and trusted to authenticate logon attempts, submit logon requests, and be notified of any account or password changes. Examples of this extension code are Security Support Providers, such as Kerberos and NTLM.
+
+- Security extension code is loaded (for example, an authentication, notification, or security package). Security extension code registers with the Local Security Authority and will be used and trusted to authenticate logon attempts, submit logon requests, and be notified of any account or password changes. Examples of this extension code are Security Support Providers, such as Kerberos and NTLM.
+
- A service is installed. An audit log is generated when a service is registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account.
-> **Important:** Attempts to install or load security system extensions or services are critical system events that could indicate a security breach.
-
-Event volume: Low
+Attempts to install or load security system extensions or services are critical system events that could indicate a security breach.
-These events are expected to appear more on a domain controller than on client computers or member servers.
+**Event volume**: Low.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should have “SYSTEM” as value for **“Subject”** field.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
-| Event ID | Event message |
-| - | - |
-| 4610 | An authentication package has been loaded by the Local Security Authority. |
-| 4611 | A trusted logon process has been registered with the Local Security Authority.|
-| 4614 | A notification package has been loaded by the Security Account Manager. |
-| 4622 | A security package has been loaded by the Local Security Authority. |
-| 4697 | A service was installed in the system. |
-
-## Related topics
+**Events List:**
+
+- [4610](event-4610.md)(S): An authentication package has been loaded by the Local Security Authority.
+
+- [4611](event-4611.md)(S): A trusted logon process has been registered with the Local Security Authority.
+
+- [4614](event-4614.md)(S): A notification package has been loaded by the Security Account Manager.
+
+- [4622](event-4622.md)(S): A security package has been loaded by the Local Security Authority.
+
+- [4697](event-4697.md)(S): A service was installed in the system.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-sensitive-privilege-use.md b/windows/keep-secure/audit-sensitive-privilege-use.md
index 718aa00bd9..051c87dd73 100644
--- a/windows/keep-secure/audit-sensitive-privilege-use.md
+++ b/windows/keep-secure/audit-sensitive-privilege-use.md
@@ -2,51 +2,70 @@
title: Audit Sensitive Privilege Use (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Sensitive Privilege Use, which determines whether the operating system generates audit events when sensitive privileges (user rights) are used.
ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Sensitive Privilege Use
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Sensitive Privilege Use**, which determines whether the operating system generates audit events when sensitive privileges (user rights) are used.
-Actions that can be audited include:
-- A privileged service is called.
-- One of the following privileges is called:
- - **Act as part of the operating system**
- - **Back up files and directories**
- - **Create a token object**
- - **Debug programs**
- - **Enable computer and user accounts to be trusted for delegation**
- - **Generate security audits**
- - **Impersonate a client after authentication**
- - **Load and unload device drivers**
- - **Manage auditing and security log**
- - **Modify firmware environment values**
- - **Replace a process-level token**
- - **Restore files and directories**
- - **Take ownership of files or other objects**
+Audit Sensitive Privilege Use contains events that show the usage of sensitive privileges. This is the list of sensitive privileges:
+
+- Act as part of the operating system
+
+- Back up files and directories
+
+- Restore files and directories
+
+- Create a token object
+
+- Debug programs
+
+- Enable computer and user accounts to be trusted for delegation
+
+- Generate security audits
+
+- Impersonate a client after authentication
+
+- Load and unload device drivers
+
+- Manage auditing and security log
+
+- Modify firmware environment values
+
+- Replace a process-level token
+
+- Take ownership of files or other objects
+
+The use of two privileges, “Back up files and directories” and “Restore files and directories,” generate events only if the “[Audit: Audit the use of Backup and Restore privilege](https://technet.microsoft.com/en-us/library/jj852206.aspx)” Group Policy setting is enabled on the computer or device. We do not recommend enabling this Group Policy setting because of the high number of events recorded.
+
+This subcategory also contains informational events from the file system Transaction Manager.
If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful attempts, and failure audits record unsuccessful attempts.
-Event volume: High
+**Event volume**: High.
-Default: Not configured
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | We recommend tracking Success and Failure for this subcategory of events, especially if the sensitive privileges were used by a user account. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend tracking Success and Failure for this subcategory of events, especially if the sensitive privileges were used by a user account. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend tracking Success and Failure for this subcategory of events, especially if the sensitive privileges were used by a user account. |
+
+**Events List:**
+
+- [4673](event-4673.md)(S, F): A privileged service was called.
+
+- [4674](event-4674.md)(S, F): An operation was attempted on a privileged object.
+
+- [4985](event-4985.md)(S): The state of a transaction has changed.
+
+>**Note** For some reason event “[4985](event-4985.md)(S): The state of a transaction has changed" from [Audit File System](audit-file-system.md) subcategory generates also in this subcategory. See description of event [4985](event-4985.md) in [Audit File System](audit-file-system.md) subcategory.
-| Event ID | Event message |
-| - | - |
-| 4672 | Special privileges assigned to new logon.|
-| 4673 | A privileged service was called. |
-| 4674 | An operation was attempted on a privileged object.|
-
-## Related topics
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-special-logon.md b/windows/keep-secure/audit-special-logon.md
index f4bad313c7..e03317f158 100644
--- a/windows/keep-secure/audit-special-logon.md
+++ b/windows/keep-secure/audit-special-logon.md
@@ -2,38 +2,43 @@
title: Audit Special Logon (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Special Logon, which determines whether the operating system generates audit events under special sign on (or log on) circumstances.
ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit Special Logon
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit Special Logon**, which determines whether the operating system generates audit events under special sign on (or log on) circumstances.
-This security policy setting determines whether the operating system generates audit events when:
+Audit Special Logon determines whether the operating system generates audit events under special sign on (or log on) circumstances.
-- A special logon is used. A special logon is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
-- A member of a special group logs on. Special Groups is a Windows feature that enables the administrator to find out when a member of a certain group has logged on. The administrator can set a list of group security identifiers (SIDs) in the registry. If any of these SIDs is added to a token during logon and this auditing subcategory is enabled, a security event is logged. For more information about this feature, see [article 947223](http://go.microsoft.com/fwlink/p/?linkid=120183) in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/p/?linkid=120183).
+This subcategory allows you to audit events generated by special logons such as the following:
-Users holding special privileges can potentially make changes to the system. We recommend that you track their activity.
+- The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
-Event volume: Low
+- A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged.
-Default: Success
+**Event volume**:
-| Event ID | Event message |
-| - | - |
-| 4964 | Special groups have been assigned to a new logon.|
-
-## Related topics
+- Low on a client computer.
+
+- Medium on a domain controllers or network servers.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | No | Yes | No | This subcategory is very important because of [Special Groups](http://blogs.technet.com/b/askds/archive/2008/03/11/special-groups-auditing-via-group-policy-preferences.aspx) related events, you must enable this subcategory for Success audit if you use this feature.
At the same time this subcategory allows you to track account logon sessions to which sensitive privileges were assigned.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | Yes | No | Yes | No | This subcategory is very important because of [Special Groups](http://blogs.technet.com/b/askds/archive/2008/03/11/special-groups-auditing-via-group-policy-preferences.aspx) related events, you must enable this subcategory for Success audit if you use this feature.
At the same time this subcategory allows you to track account logon sessions to which sensitive privileges were assigned.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | Yes | No | Yes | No | This subcategory is very important because of [Special Groups](http://blogs.technet.com/b/askds/archive/2008/03/11/special-groups-auditing-via-group-policy-preferences.aspx) related events, you must enable this subcategory for Success audit if you use this feature.
At the same time this subcategory allows you to track account logon sessions to which sensitive privileges were assigned.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4964](event-4964.md)(S): Special groups have been assigned to a new logon.
+
+- [4672](event-4672.md)(S): Special privileges assigned to new logon.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-system-integrity.md b/windows/keep-secure/audit-system-integrity.md
index 38fd5a5ce5..fbb0f1b2f7 100644
--- a/windows/keep-secure/audit-system-integrity.md
+++ b/windows/keep-secure/audit-system-integrity.md
@@ -2,51 +2,67 @@
title: Audit System Integrity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit System Integrity, which determines whether the operating system audits events that violate the integrity of the security subsystem.
ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit System Integrity
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the Advanced Security Audit policy setting, **Audit System Integrity**, which determines whether the operating system audits events that violate the integrity of the security subsystem.
+
+Audit System Integrity determines whether the operating system audits events that violate the integrity of the security subsystem.
Activities that violate the integrity of the security subsystem include the following:
- Audited events are lost due to a failure of the auditing system.
+
- A process uses an invalid local procedure call (LPC) port in an attempt to impersonate a client, reply to a client address space, read to a client address space, or write from a client address space.
+
- A remote procedure call (RPC) integrity violation is detected.
+
- A code integrity violation with an invalid hash value of an executable file is detected.
+
- Cryptographic tasks are performed.
-> **Important:** Violations of security subsystem integrity are critical and could indicate a potential security attack.
-
-Event volume: Low
+Violations of security subsystem integrity are critical and could indicate a potential security attack.
-Default: Success and failure
+**Event volume**: Low.
-| Event ID | Event message |
-| - | - |
-| 4612 | Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. |
-| 4615 | Invalid use of LPC port. |
-| 4618 | A monitored security event pattern has occurred.|
-| 4816 | RPC detected an integrity violation while decrypting an incoming message.|
-| 5038 | Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.|
-| 5056 | A cryptographic self-test was performed. |
-| 5057 | A cryptographic primitive operation failed.|
-| 5060 | Verification operation failed. |
-| 5061 | Cryptographic operation. |
-| 5062 | A kernel-mode cryptographic self-test was performed.|
-| 6281 | Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.|
-
-## Related topics
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | The main reason why we recommend Success auditing for this subcategory is to be able to get RPC integrity violation errors and auditing subsystem errors (event 4612). However, if you are planning to manually invoke “[4618](event-4618.md)(S): A monitored security event pattern has occurred”, then you also need to enable Success auditing for this subcategory.
The main reason why we recommend Failure auditing for this subcategory is to be able to get [Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) failure events. |
+| Member Server | Yes | Yes | Yes | Yes | The main reason why we recommend Success auditing for this subcategory is to be able to get RPC integrity violation errors and auditing subsystem errors (event 4612). However, if you are planning to manually invoke “[4618](event-4618.md)(S): A monitored security event pattern has occurred”, then you also need to enable Success auditing for this subcategory.
The main reason why we recommend Failure auditing for this subcategory is to be able to get [Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) failure events. |
+| Workstation | Yes | Yes | Yes | Yes | The main reason why we recommend Success auditing for this subcategory is to be able to get RPC integrity violation errors and auditing subsystem errors (event 4612). However, if you are planning to manually invoke “[4618](event-4618.md)(S): A monitored security event pattern has occurred”, then you also need to enable Success auditing for this subcategory.
The main reason why we recommend Failure auditing for this subcategory is to be able to get [Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) failure events. |
+
+**Events List:**
+
+- [4612](event-4612.md)(S): Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.
+
+- [4615](event-4615.md)(S): Invalid use of LPC port.
+
+- [4618](event-4618.md)(S): A monitored security event pattern has occurred.
+
+- [4816](event-4816.md)(S): RPC detected an integrity violation while decrypting an incoming message.
+
+- [5038](event-5038.md)(F): Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.
+
+- [5056](event-5056.md)(S): A cryptographic self-test was performed.
+
+- [5062](event-5062.md)(S): A kernel-mode cryptographic self-test was performed.
+
+- [5057](event-5057.md)(F): A cryptographic primitive operation failed.
+
+- [5060](event-5060.md)(F): Verification operation failed.
+
+- [5061](event-5061.md)(S, F): Cryptographic operation.
+
+- [6281](event-6281.md)(F): Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.
+
+- [6410](event-6410.md)(F): Code integrity determined that a file does not meet the security requirements to load into a process.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-user-account-management.md b/windows/keep-secure/audit-user-account-management.md
index a763d8ea76..eda9df358a 100644
--- a/windows/keep-secure/audit-user-account-management.md
+++ b/windows/keep-secure/audit-user-account-management.md
@@ -2,56 +2,81 @@
title: Audit User Account Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User Account Management, which determines whether the operating system generates audit events when specific user account management tasks are performed.
ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit User Account Management
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit User Account Management**, which determines whether the operating system generates audit events when specific user account management tasks are performed.
-Tasks that are audited for user account management include:
+Audit User Account Management determines whether the operating system generates audit events when specific user account management tasks are performed.
+
+**Event volume**: Low.
+
+This policy setting allows you to audit changes to user accounts. Events include the following:
+
+- A user account is created, changed, deleted, renamed, disabled, enabled, locked out or unlocked.
+
+- A user account’s password is set or changed.
+
+- A security identifier (SID) is added to the SID History of a user account, or fails to be added.
+
+- The Directory Services Restore Mode password is configured.
+
+- Permissions on administrative user accounts are changed.
+
+- A user's local group membership was enumerated.
-- A user account is created, changed, deleted, renamed, disabled, enabled, locked out, or unlocked.
-- A user account password is set or changed.
-- Security identifier (SID) history is added to a user account.
-- The Directory Services Restore Mode password is set.
-- Permissions are changed on accounts that are members of administrator groups.
- Credential Manager credentials are backed up or restored.
-This policy setting is essential for tracking events that involve provisioning and managing user accounts.
+Some events in this subcategory, for example 4722, 4725, 4724, and 4781, are also generated for computer accounts.
-Event volume: Low
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | Yes | Yes | Yes | Yes | This subcategory contains many useful events for monitoring, especially for critical domain accounts, such as domain admins, service accounts, database admins, and so on.
We recommend Failure auditing, mostly to see invalid password change and reset attempts for domain accounts, DSRM account password change failures, and failed SID History add attempts. |
+| Member Server | Yes | Yes | Yes | Yes | We recommend monitoring all changes related to local user accounts, especially built-in local Administrator and other critical accounts.
We recommend Failure auditing, mostly to see invalid password change and reset attempts for local accounts. |
+| Workstation | Yes | Yes | Yes | Yes | We recommend monitoring all changes related to local user accounts, especially built-in local Administrator and other critical accounts.
We recommend Failure auditing, mostly to see invalid password change and reset attempts for local accounts. |
-Default: Success
+**Events List:**
-| Event ID | Event message |
-| - | - |
-| 4720 | A user account was created. |
-| 4722 | A user account was enabled. |
-| 4723 | An attempt was made to change an account's password.|
-| 4724 | An attempt was made to reset an account's password. |
-| 4725 | A user account was disabled. |
-| 4726 | A user account was deleted. |
-| 4738 | A user account was changed. |
-| 4740 | A user account was locked out.|
-| 4765 | SID History was added to an account.|
-| 4766 | An attempt to add SID History to an account failed.|
-| 4767 | A user account was unlocked. |
-| 4780 | The ACL was set on accounts which are members of administrators groups.|
-| 4781 | The name of an account was changed: |
-| 4794 | An attempt was made to set the Directory Services Restore Mode.|
-| 5376 | Credential Manager credentials were backed up. |
-| 5377 | Credential Manager credentials were restored from a backup.|
-
-## Related topics
+- [4720](event-4720.md)(S): A user account was created.
+
+- [4722](event-4722.md)(S): A user account was enabled.
+
+- [4723](event-4723.md)(S, F): An attempt was made to change an account's password.
+
+- [4724](event-4724.md)(S, F): An attempt was made to reset an account's password.
+
+- [4725](event-4725.md)(S): A user account was disabled.
+
+- [4726](event-4726.md)(S): A user account was deleted.
+
+- [4738](event-4738.md)(S): A user account was changed.
+
+- [4740](event-4740.md)(S): A user account was locked out.
+
+- [4765](event-4765.md)(S): SID History was added to an account.
+
+- [4766](event-4766.md)(F): An attempt to add SID History to an account failed.
+
+- [4767](event-4767.md)(S): A user account was unlocked.
+
+- [4780](event-4780.md)(S): The ACL was set on accounts which are members of administrators groups.
+
+- [4781](event-4781.md)(S): The name of an account was changed.
+
+- [4794](event-4794.md)(S, F): An attempt was made to set the Directory Services Restore Mode administrator password.
+
+- [4798](event-4798.md)(S): A user's local group membership was enumerated.
+
+- [5376](event-5376.md)(S): Credential Manager credentials were backed up.
+
+- [5377](event-5377.md)(S): Credential Manager credentials were restored from a backup.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/audit-user-device-claims.md b/windows/keep-secure/audit-user-device-claims.md
index e5576c4bdf..3624a64b1e 100644
--- a/windows/keep-secure/audit-user-device-claims.md
+++ b/windows/keep-secure/audit-user-device-claims.md
@@ -2,63 +2,39 @@
title: Audit User/Device Claims (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User/Device Claims, which enables you to audit security events that are generated by user and device claims.
ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486
-ms.prod: w10
+ms.pagetype: security
+ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
-ms.pagetype: security
-author: brianlic-msft
+author: Mir0sh
---
# Audit User/Device Claims
**Applies to**
-- Windows 10
+- Windows 10
+- Windows Server 2016
-This topic for the IT professional describes the advanced security audit policy setting, **Audit User/Device Claims**, which enables you to audit security events that are generated by user and device claims.
-Event volume:
+Audit User/Device Claims allows you to audit user and device claims information in the account’s logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to.
-Default: Not configured
+For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
-
-
-
-
-
-
-
-
-
-
-4626 |
-User / Device claims information.
-Subject:
-Security ID: %1
-Account Name: %2
-Account Domain: %3
-Logon ID: %4
-Logon Type:%9
-New Logon:
-Security ID: %5
-Account Name: %6
-Account Domain: %7
-Logon ID: %8
-Event in sequence: %10 of %11
-User Claims: %12
-Device Claims: %13
-The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
-The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
-The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
-This event is generated when the Audit User/Device claims subcategory is configured and the user’s logon token contains user/device claims information. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session. |
-
-
-
-
-## Related topics
+***Important***: [Audit Logon](audit-logon.md) subcategory must also be enabled in order to get events from this subcategory.
+
+**Event volume**:
+
+- Low on a client computer.
+
+- Medium on a domain controller or network servers.
+
+| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments |
+|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Domain Controller | IF | No | IF | No | IF – if claims are in use in your organization and you need to monitor user/device claims, enable Success auditing for this subcategory.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Member Server | IF | No | IF | No | IF – if claims are in use in your organization and you need to monitor user/device claims, enable Success auditing for this subcategory.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+| Workstation | IF | No | IF | No | IF – if claims are in use in your organization and you need to monitor user/device claims, enable Success auditing for this subcategory.
This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. |
+
+**Events List:**
+
+- [4626](event-4626.md)(S): User/Device claims information.
-- [Advanced security audit policy settings](advanced-security-audit-policy-settings.md)
-
-
diff --git a/windows/keep-secure/event-1100.md b/windows/keep-secure/event-1100.md
new file mode 100644
index 0000000000..b6646f9867
--- /dev/null
+++ b/windows/keep-secure/event-1100.md
@@ -0,0 +1,73 @@
+---
+title: 1100(S) The event logging service has shut down. (Windows 10)
+description: Describes security event 1100(S) The event logging service has shut down.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 1100(S): The event logging service has shut down.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Other Events](other-events.md)
+
+***Event Description:***
+
+This event generates every time Windows Event Log service has shut down.
+
+It also generates during normal system shutdown.
+
+This event doesn’t generate during emergency system reset.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 1100
+ 0
+ 4
+ 103
+ 0
+ 0x4020000000000000
+
+ 1048124
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 1100(S): The event logging service has shut down.
+
+- With this event, you can track system shutdowns and restarts.
+
+- This event also can be a sign of malicious action when someone tried to shut down the Log Service to cover his or her activity.
+
diff --git a/windows/keep-secure/event-1102.md b/windows/keep-secure/event-1102.md
new file mode 100644
index 0000000000..eb7b13ca41
--- /dev/null
+++ b/windows/keep-secure/event-1102.md
@@ -0,0 +1,98 @@
+---
+title: 1102(S) The audit log was cleared. (Windows 10)
+description: Describes security event 1102(S) The audit log was cleared.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 1102(S): The audit log was cleared.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Other Events](other-events.md)
+
+***Event Description:***
+
+This event generates every time Windows Security audit log was cleared.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+ 1087729
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x55cd1d
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that cleared the system security audit log. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that cleared the system security audit log.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+## Security Monitoring Recommendations
+
+For 1102(S): The audit log was cleared.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically you should not see this event. There is no need to manually clear the Security event log in most cases. We recommend monitoring this event and investigating why this action was performed.
+
diff --git a/windows/keep-secure/event-1104.md b/windows/keep-secure/event-1104.md
new file mode 100644
index 0000000000..4448c4a509
--- /dev/null
+++ b/windows/keep-secure/event-1104.md
@@ -0,0 +1,67 @@
+---
+title: 1104(S) The security log is now full. (Windows 10)
+description: Describes security event 1104(S) The security log is now full.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 1104(S): The security log is now full.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Other Events](other-events.md)
+
+***Event Description:***
+
+This event generates every time Windows security log becomes full.
+
+This event generates, for example, if the maximum size of Security Event Log file was reached and event log retention method is: “[Do not overwrite events (Clear logs manually)](https://technet.microsoft.com/en-us/library/cc778402(v=ws.10).aspx)”.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 1104
+ 0
+ 2
+ 101
+ 0
+ 0x4020000000000000
+
+ 1087728
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- If the Security event log retention method is set to “[Do not overwrite events (Clear logs manually)](https://technet.microsoft.com/en-us/library/cc778402(v=ws.10).aspx)”, then this event will indicate that log file is full and you need to perform immediate actions, for example, archive the log or clear it.
+
diff --git a/windows/keep-secure/event-1105.md b/windows/keep-secure/event-1105.md
new file mode 100644
index 0000000000..3b06cbd87a
--- /dev/null
+++ b/windows/keep-secure/event-1105.md
@@ -0,0 +1,98 @@
+---
+title: 1105(S) Event log automatic backup. (Windows 10)
+description: Describes security event 1105(S) Event log automatic backup.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 1105(S): Event log automatic backup.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Other Events](other-events.md)
+
+***Event Description:***
+
+This event generates every time Windows security log becomes full and new event log file was created.
+
+This event generates, for example, if the maximum size of Security Event Log file was reached and event log retention method is: “[Archive the log when full, do not overwrite events](https://technet.microsoft.com/en-us/library/cc721981.aspx)”.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 1105
+ 0
+ 4
+ 105
+ 0
+ 0x4020000000000000
+
+ 1128551
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+-
+ Security
+ C:\\Windows\\System32\\Winevt\\Logs\\Archive-Security-2015-10-16-00-50-12-621.evtx
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Log** \[Type = UnicodeString\]: the name of the log which was archived (new event log file was created and previous event log was archived). Always “**Security”** for Security Event Logs.
+
+**File**: \[Type = FILETIME\]: full path and filename of archived log file.
+
+The format of archived log file name is: “Archive-LOG\_FILE\_NAME-YYYY-MM-DD-hh-mm-ss-nnn.evtx”. Where:
+
+- LOG\_FILE\_NAME – the name of archived file.
+
+- Y – years.
+
+- M – months.
+
+- D – days.
+
+- h – hours.
+
+- m – minutes.
+
+- s – seconds.
+
+- n – fractional seconds.
+
+The time in this event is always in ***GMT+0/UTC+0*** time zone.
+
+## Security Monitoring Recommendations
+
+For 1105(S): Event log automatic backup.
+
+- Typically it’s an informational event and no actions are needed. But if your baseline settings are not set to [Archive the log when full, do not overwrite events](https://technet.microsoft.com/en-us/library/cc721981.aspx), then this event will be a sign that some settings are not set to baseline settings or were changed.
+
diff --git a/windows/keep-secure/event-1108.md b/windows/keep-secure/event-1108.md
new file mode 100644
index 0000000000..b10c79fa3a
--- /dev/null
+++ b/windows/keep-secure/event-1108.md
@@ -0,0 +1,83 @@
+---
+title: 1108(S) The event logging service encountered an error while processing an incoming event published from %1. (Windows 10)
+description: Describes security event 1108(S) The event logging service encountered an error while processing an incoming event published from %1.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 1108(S): The event logging service encountered an error while processing an incoming event published from %1.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Other Events](other-events.md)
+
+***Event Description:***
+
+This event generates when event logging service encountered an error while processing an incoming event.
+
+It typically generates when logging service will not be able to correctly write the event to the event log or some parameters were not passed to logging service to log the event correctly. You will typically see a defective or incorrect event before 1108.
+
+For example, event 1108 might be generated after an incorrect [4703](event-4703.md) event:
+
+
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 1108
+ 0
+ 2
+ 101
+ 0
+ 0x4020000000000000
+
+ 5599
+
+
+ Security
+ WIN-GG82ULGC9GO.contoso.local
+
+
+-
+-
+
+ 0
+ Microsoft-Windows-Security-Auditing
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**%1** \[Type = UnicodeString\]: the name of [security event source](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363661(v=vs.85).aspx) from which event was received for processing. You can see all registered security event source names in this registry path: “HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog\\Security”. Here is an example:
+
+
+
+## Security Monitoring Recommendations
+
+For 1108(S): The event logging service encountered an error while processing an incoming event published from %1.
+
+- We recommend monitoring for all events of this type and checking what the cause of the error was.
+
diff --git a/windows/keep-secure/event-4608.md b/windows/keep-secure/event-4608.md
new file mode 100644
index 0000000000..8e846de721
--- /dev/null
+++ b/windows/keep-secure/event-4608.md
@@ -0,0 +1,67 @@
+---
+title: 4608(S) Windows is starting up. (Windows 10)
+description: Describes security event 4608(S) Windows is starting up.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4608(S): Windows is starting up.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security State Change](audit-security-state-change.md)
+
+***Event Description:***
+
+This event is logged when LSASS.EXE process starts and the auditing subsystem is initialized.
+
+It typically generates during operating system startup process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4608
+ 0
+ 0
+ 12288
+ 0
+ 0x8020000000000000
+
+ 1101704
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4608(S): Windows is starting up.
+
+- With this event, you can track system startup events.
+
diff --git a/windows/keep-secure/event-4610.md b/windows/keep-secure/event-4610.md
new file mode 100644
index 0000000000..91f93ccf61
--- /dev/null
+++ b/windows/keep-secure/event-4610.md
@@ -0,0 +1,77 @@
+---
+title: 4610(S) An authentication package has been loaded by the Local Security Authority. (Windows 10)
+description: Describes security event 4610(S) An authentication package has been loaded by the Local Security Authority.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4610(S): An authentication package has been loaded by the Local Security Authority.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security System Extension](audit-security-system-extension.md)
+
+***Event Description:***
+
+This event generates every time [Authentication Package](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374733(v=vs.85).aspx) has been loaded by the Local Security Authority ([LSA](https://msdn.microsoft.com/en-us/library/windows/desktop/aa378326(v=vs.85).aspx)).
+
+Each time the system starts, the LSA loads the Authentication Package DLLs from **HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Authentication Packages** registry value and performs the initialization sequence for every package located in these DLLs.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4610
+ 0
+ 0
+ 12289
+ 0
+ 0x8020000000000000
+
+ 1048138
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ C:\\Windows\\system32\\msv1\_0.DLL : MICROSOFT\_AUTHENTICATION\_PACKAGE\_V1\_0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Authentication Package Name** \[Type = UnicodeString\]**:** the name of loaded [Authentication Package](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374733(v=vs.85).aspx). The format is: DLL\_PATH\_AND\_NAME: AUTHENTICATION\_PACKAGE\_NAME.
+
+By default the only one Authentication Package loaded by Windows 10 is “[MICROSOFT\_AUTHENTICATION\_PACKAGE\_V1\_0](https://msdn.microsoft.com/en-us/library/windows/desktop/aa378753(v=vs.85).aspx)”.
+
+## Security Monitoring Recommendations
+
+For 4610(S): An authentication package has been loaded by the Local Security Authority.
+
+- Report all “**Authentication Package Name**” not equals “C:\\Windows\\system32\\msv1\_0.DLL : MICROSOFT\_AUTHENTICATION\_PACKAGE\_V1\_0”, because by default this is the only Authentication Package loaded by Windows 10.
+
+- Typically this event has an informational purpose. If you have a pre-defined list of allowed Authentication Packages in the system, then you can check whether “**Authentication Package Name”** is in your defined list.
+
diff --git a/windows/keep-secure/event-4611.md b/windows/keep-secure/event-4611.md
new file mode 100644
index 0000000000..ccb63e2c97
--- /dev/null
+++ b/windows/keep-secure/event-4611.md
@@ -0,0 +1,109 @@
+---
+title: 4611(S) A trusted logon process has been registered with the Local Security Authority. (Windows 10)
+description: Describes security event 4611(S) A trusted logon process has been registered with the Local Security Authority.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4611(S): A trusted logon process has been registered with the Local Security Authority.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security System Extension](audit-security-system-extension.md)
+
+***Event Description:***
+
+This event indicates that a logon process has registered with the Local Security Authority ([LSA](https://msdn.microsoft.com/en-us/library/windows/desktop/aa378326(v=vs.85).aspx)). Also, logon requests will now be accepted from this source.
+
+At the technical level, the event does not come from the registration of a trusted logon process, but from a confirmation that the process is a trusted logon process. If it is a trusted logon process, the event generates.
+
+A logon process is a trusted part of the operating system that handles the overall logon function for different logon methods (network, interactive, etc.).
+
+You typically see these events during operating system startup or user logon and authentication actions.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4611
+ 0
+ 0
+ 12289
+ 0
+ 0x8020000000000000
+
+ 1048175
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ Winlogon
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that registered the trusted logon process. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that registered the trusted logon process.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Logon Process Name** \[Type = UnicodeString\]**:** the name of registered logon process.
+
+## Security Monitoring Recommendations
+
+For 4611(S): A trusted logon process has been registered with the Local Security Authority.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- Typically this event has an informational purpose. If you defined the list of allowed Logon Processes in the system, then you can check is “**Logon Process Name”** field value in the whitelist or not.
+
+-
+
diff --git a/windows/keep-secure/event-4612.md b/windows/keep-secure/event-4612.md
new file mode 100644
index 0000000000..ec67b2cc5c
--- /dev/null
+++ b/windows/keep-secure/event-4612.md
@@ -0,0 +1,43 @@
+---
+title: 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. (Windows 10)
+description: Describes security event 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4612(S): Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is generated when audit queues are filled and events must be discarded. This most commonly occurs when security events are being generated faster than they are being written to disk.
+
+This event doesn't generate when the event log service is stopped or event log is full and events retention is disabled.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. *
+
+*Number of audit messages discarded: %1 *
+
+*This event is generated when audit queues are filled and events must be discarded. This most commonly occurs when security events are being generated faster than they are being written to disk, or when the auditing system loses connectivity to the event log, such as when the event log service is stopped.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of hardware issues or lack of system resources (for example, RAM). We recommend monitoring this event and investigating the reason for the condition.
+
diff --git a/windows/keep-secure/event-4614.md b/windows/keep-secure/event-4614.md
new file mode 100644
index 0000000000..223da4ca4c
--- /dev/null
+++ b/windows/keep-secure/event-4614.md
@@ -0,0 +1,77 @@
+---
+title: 4614(S) A notification package has been loaded by the Security Account Manager. (Windows 10)
+description: Describes security event 4614(S) A notification package has been loaded by the Security Account Manager.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4614(S): A notification package has been loaded by the Security Account Manager.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security System Extension](audit-security-system-extension.md)
+
+***Event Description:***
+
+This event generates every time a Notification Package has been loaded by the [Security Account Manager](https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx).
+
+In reality, starting with Windows Vista, a notification package should be interpreted as afs [Password Filter](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721882(v=vs.85).aspx).
+
+Password Filters are DLLs that are loaded or called when passwords are set or changed.
+
+Each time a system starts, it loads the notification package DLLs from **HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Notification Packages** registry value and performs the initialization sequence for every package.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4614
+ 0
+ 0
+ 12289
+ 0
+ 0x8020000000000000
+
+ 1048140
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ WDIGEST
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Notification Package Name** \[Type = UnicodeString\]**:** the name of loaded Notification Package.
+
+## Security Monitoring Recommendations
+
+For 4614(S): A notification package has been loaded by the Security Account Manager.
+
+- Typically this event has an informational purpose. If you defined the list of allowed Notification Packages in the system, then you can check is “**Notification Package Name”** field value in the whitelist or not.
+
diff --git a/windows/keep-secure/event-4615.md b/windows/keep-secure/event-4615.md
new file mode 100644
index 0000000000..9b0a3151ad
--- /dev/null
+++ b/windows/keep-secure/event-4615.md
@@ -0,0 +1,57 @@
+---
+title: 4615(S) Invalid use of LPC port. (Windows 10)
+description: Describes security event 4615(S) Invalid use of LPC port.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4615(S): Invalid use of LPC port.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+It appears that this event never occurs.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Invalid use of LPC port.*
+
+*Subject:*
+
+> *Security ID%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Process Information:*
+
+> *PID:%7*
+>
+> *Name:%8*
+
+*Invalid Use:%5*
+
+*LPC Server Port Name:%6*
+
+*Windows Local Security Authority (LSA) communicates with the Windows kernel using Local Procedure Call (LPC) ports. If you see this event, an application has inadvertently or intentionally accessed this port which is reserved exclusively for LSA’s use. The application (process) should be investigated to ensure that it is not attempting to tamper with this communications channel." *
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4616.md b/windows/keep-secure/event-4616.md
new file mode 100644
index 0000000000..b2ba578b7c
--- /dev/null
+++ b/windows/keep-secure/event-4616.md
@@ -0,0 +1,172 @@
+---
+title: 4616(S) The system time was changed. (Windows 10)
+description: Describes security event 4616(S) The system time was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4616(S): The system time was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security State Change](audit-security-state-change.md)
+
+***Event Description:***
+
+This event generates every time system time was changed.
+
+This event is always logged regardless of the "Audit Security State Change" sub-category setting.
+
+You will typically see these events with “**Subject\\Security ID**” = “**LOCAL SERVICE**”, these are normal time correction actions.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4616
+ 1
+ 0
+ 12288
+ 0
+ 0x8020000000000000
+
+ 1101699
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x48f29
+ 2015-10-09T05:04:30.000941900Z
+ 2015-10-09T05:04:30.000000000Z
+ 0x1074
+ C:\\Windows\\WinSxS\\amd64\_microsoft-windows-com-surrogate-core\_31bf3856ad364e35\_6.3.9600.16384\_none\_25a8f00faa8f185c\\dllhost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+- 1 - Windows Server 2008 R2, Windows 7.
+
+ - Added “Process Information” section.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change system time” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change system time” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information** \[Version 1\]**:**
+
+- **Process ID** \[Type = Pointer\] \[Version 1\]: hexadecimal Process ID of the process that changed the system time. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Name** \[Type = UnicodeString\] \[Version 1\]**:** full path and the name of the executable for the process.
+
+**Previous Time** \[Type = FILETIME\]: previous time in ***UTC*** time zone. The format is **YYYY-MM-DDThh:mm:ss.nnnnnnnZ**:
+
+- Y - years
+
+- M - months
+
+- D - days
+
+- T - the beginning of the time element, as specified in [ISO 8601](http://www.iso.org/iso/home/standards/iso8601.htm).
+
+- h - hours
+
+- m - minutes
+
+- s - seconds
+
+- n - fractional seconds
+
+- Z - the zone designator for the zero UTC offset. "09:30 UTC" is therefore represented as "09:30Z". "14:45:15 UTC" would be "14:45:15Z".
+
+**New Time** \[Type = FILETIME\]: new time that was set in ***UTC*** time zone. The format is **YYYY-MM-DDThh:mm:ss.nnnnnnnZ**:
+
+- Y - years
+
+- M - months
+
+- D - days
+
+- T - the beginning of the time element, as specified in [ISO 8601](http://www.iso.org/iso/home/standards/iso8601.htm).
+
+- h - hours
+
+- m - minutes
+
+- s - seconds
+
+- n - fractional seconds
+
+- Z - the zone designator for the zero UTC offset. "09:30 UTC" is therefore represented as "09:30Z". "14:45:15 UTC" would be "14:45:15Z".
+
+## Security Monitoring Recommendations
+
+For 4616(S): The system time was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Report all “**Subject\\Security ID**” not equals **“LOCAL SERVICE”**, which means that the time change was not made not by Windows Time service.
+
+- Report all “**Process Information\\Name**” not equals **“C:\\Windows\\System32\\svchost.exe”** (path to svchost.exe can be different, you can search for “svchost.exe” substring), which means that the time change was not made not by Windows Time service.
+
+
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
diff --git a/windows/keep-secure/event-4618.md b/windows/keep-secure/event-4618.md
new file mode 100644
index 0000000000..755dbc817f
--- /dev/null
+++ b/windows/keep-secure/event-4618.md
@@ -0,0 +1,97 @@
+---
+title: 4618(S) A monitored security event pattern has occurred. (Windows 10)
+description: Describes security event 4618(S) A monitored security event pattern has occurred.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4618(S): A monitored security event pattern has occurred.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+This event can be generated (invoked) only externally using the following command:
+
+**%windir%\\system32\\rundll32 %windir%\\system32\\authz.dll,AuthziGenerateAdminAlertAudit OrgEventId ComputerName UserSid UserName UserDomain UserLogonId EventCount Duration**
+
+Account must have **SeAuditPrivilege** (Generate security audits) to be able to generate this event.
+
+- **UserSid** is resolved when viewing the event in event viewer.
+
+- Only **OrgEventID**, **ComputerName**, and **EventCount** are required—others are optional. Fields not specified appear with “**-**“ in the event description field.
+
+- If a field doesn’t match the expected data type, the event is not generated. (i.e., if **EventCount** = “XYZ” then no event is generated.)
+
+- **UserSid**, **UserName**, and **UserDomain** are not related to each other (think **SubjectUser** fields, where they are)
+
+- Parameters are space delimited, even if a parameter is enclosed in double-quotes.
+
+- Here are the expected data types for the parameters:
+
+| Parameter | Expected Data Type |
+|--------------|--------------------------------------------------|
+| OrgEventID | Ulong |
+| ComputerName | String |
+| UserSid | SID (in string format) |
+| UserName | String |
+| UserDomain | String |
+| UserLogonID | Luid (a ULongLong converted to Hex in the event) |
+| EventCount | Ulong |
+| Duration | String |
+
+
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4618
+ 0
+ 0
+ 12290
+ 0
+ 0x8020000000000000
+
+ 1198759
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4624
+ DC01.contoso.local
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x1
+ 10
+ “Hour"
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4618(S): A monitored security event pattern has occurred.
+
+- This event can be invoked only manually/intentionally, it is up to you how interpret this event depends on information you put inside of it.
+
diff --git a/windows/keep-secure/event-4621.md b/windows/keep-secure/event-4621.md
new file mode 100644
index 0000000000..e8cef166bc
--- /dev/null
+++ b/windows/keep-secure/event-4621.md
@@ -0,0 +1,43 @@
+---
+title: 4621(S) Administrator recovered system from CrashOnAuditFail. (Windows 10)
+description: Describes security event 4621(S) Administrator recovered system from CrashOnAuditFail.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4621(S): Administrator recovered system from CrashOnAuditFail.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is logged after a system reboots following [CrashOnAuditFail](https://technet.microsoft.com/en-us/library/cc963220.aspx?f=255&MSPPError=-2147217396). It generates when CrashOnAuditFail = 2.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Security State Change](audit-security-state-change.md)
+
+***Event Schema:***
+
+*Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.*
+
+*Value of CrashOnAuditFail:%1*
+
+*This event is logged after a system reboots following CrashOnAuditFail.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend triggering an alert for any occurrence of this event. The event shows that the system halted because it could not record an auditable event in the Security Log, as described in [CrashOnAuditFail](https://technet.microsoft.com/en-us/library/cc963220.aspx?f=255&MSPPError=-2147217396).
+
+- If your computers don’t have the [CrashOnAuditFail](https://technet.microsoft.com/en-us/library/cc963220.aspx?f=255&MSPPError=-2147217396) flag enabled, then this event will be a sign that some settings are not set to baseline settings or were changed.
+
diff --git a/windows/keep-secure/event-4622.md b/windows/keep-secure/event-4622.md
new file mode 100644
index 0000000000..2e1e226db8
--- /dev/null
+++ b/windows/keep-secure/event-4622.md
@@ -0,0 +1,99 @@
+---
+title: 4622(S) A security package has been loaded by the Local Security Authority. (Windows 10)
+description: Describes security event 4622(S) A security package has been loaded by the Local Security Authority.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4622(S): A security package has been loaded by the Local Security Authority.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security System Extension](audit-security-system-extension.md)
+
+***Event Description:***
+
+This event generates every time [Security Package](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380501(v=vs.85).aspx) has been loaded by the Local Security Authority ([LSA](https://msdn.microsoft.com/en-us/library/windows/desktop/aa378326(v=vs.85).aspx)).
+
+Security Package is the software implementation of a security protocol (Kerberos, NTLM, for example). Security packages are contained in security support provider DLLs or security support provider/authentication package DLLs.
+
+Each time the system starts, the LSA loads the Security Package DLLs from **HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages** registry value and performs the initialization sequence for every package located in these DLLs.
+
+It is also possible to add security package dynamically using [AddSecurityPackage](https://msdn.microsoft.com/en-us/library/windows/desktop/dd401506(v=vs.85).aspx) function, not only during system startup process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4622
+ 0
+ 0
+ 12289
+ 0
+ 0x8020000000000000
+
+ 1048131
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ C:\\Windows\\system32\\kerberos.DLL : Kerberos
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Security Package Name** \[Type = UnicodeString\]**:** the name of loaded Security Package. The format is: DLL\_PATH\_AND\_NAME: SECURITY\_PACKAGE\_NAME.
+
+These are some Security Package DLLs loaded by default in Windows 10:
+
+- C:\\Windows\\system32\\schannel.DLL : Microsoft Unified Security Protocol Provider
+
+- C:\\Windows\\system32\\schannel.DLL : Schannel
+
+- C:\\Windows\\system32\\cloudAP.DLL : CloudAP
+
+- C:\\Windows\\system32\\wdigest.DLL : WDigest
+
+- C:\\Windows\\system32\\pku2u.DLL : pku2u
+
+- C:\\Windows\\system32\\tspkg.DLL : TSSSP
+
+- C:\\Windows\\system32\\msv1\_0.DLL : NTLM
+
+- C:\\Windows\\system32\\kerberos.DLL : Kerberos
+
+- C:\\Windows\\system32\\negoexts.DLL : NegoExtender
+
+- C:\\Windows\\system32\\lsasrv.dll : Negotiate
+
+## Security Monitoring Recommendations
+
+For 4622(S): A security package has been loaded by the Local Security Authority.
+
+- Typically this event has an informational purpose. If you defined the list of allowed Security Packages in the system, then you can check is “**Security Package Name”** field value in the whitelist or not.
+
diff --git a/windows/keep-secure/event-4624.md b/windows/keep-secure/event-4624.md
new file mode 100644
index 0000000000..292033d608
--- /dev/null
+++ b/windows/keep-secure/event-4624.md
@@ -0,0 +1,308 @@
+---
+title: 4624(S) An account was successfully logged on. (Windows 10)
+description: Describes security event 4624(S) An account was successfully logged on.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4624(S): An account was successfully logged on.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Logon](audit-logon.md)
+
+***Event Description:***
+
+This event generates when a logon session is created (on destination machine). It generates on the computer that was accessed, where the session was created.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+ 211
+
+
+ Security
+ WIN-GG82ULGC9GO
+
+
+-
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ WORKGROUP
+ 0x3e7
+ S-1-5-21-1377283216-344919071-3415362939-500
+ Administrator
+ WIN-GG82ULGC9GO
+ 0x8dcdc
+ 2
+ User32
+ Negotiate
+ WIN-GG82ULGC9GO
+ {00000000-0000-0000-0000-000000000000}
+ -
+ -
+ 0
+ 0x44c
+ C:\\Windows\\System32\\svchost.exe
+ 127.0.0.1
+ 0
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+- 1 - Windows Server 2012, Windows 8.
+
+ - Added “Impersonation Level” field.
+
+- 2 – Windows 10.
+
+ - Added “Logon Information:” section.
+
+ - **Logon Type** moved to “Logon Information:” section.
+
+ - Added “Restricted Admin Mode” field.
+
+ - Added “Virtual Account” field.
+
+ - Added “Elevated Token” field.
+
+ - Added “Linked Logon ID” field.
+
+ - Added “Network Account Name” field.
+
+ - Added “Network Account Domain” field.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that reported information about successful logon or invokes it. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that reported information about successful logon.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4672](event-4672.md)(S): Special privileges assigned to new logon.”
+
+**Logon Information** \[Version 2\]**: **
+
+- **Logon Type** \[Version 0, 1, 2\] \[Type = UInt32\]**:** the type of logon which was performed. The table below contains the list of possible values for this field.
+
+## Logon types and descriptions
+
+| Logon Type | Logon Title | Description |
+|------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 2 | Interactive | A user logged on to this computer. |
+| 3 | Network | A user or computer logged on to this computer from the network. |
+| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| 5 | Service | A service was started by the Service Control Manager. |
+| 7 | Unlock | This workstation was unlocked. |
+| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+
+- **Restricted Admin Mode** \[Version 2\] \[Type = UnicodeString\]**:** Only populated for **RemoteInteractive** logon type sessions. This is a Yes/No flag indicating if the credentials provided were passed using Restricted Admin mode. Restricted Admin mode was added in Win8.1/2012R2 but this flag was added to the event in Win10.
+
+ Reference: .
+
+ If not a **RemoteInteractive** logon, then this will be "-" string.
+
+- **Virtual Account** \[Version 2\] \[Type = UnicodeString\]**:** a “Yes” or “No” flag, which indicates if the account is a virtual account (e.g., "[Managed Service Account](https://technet.microsoft.com/en-us/library/dd560633(v=ws.10).aspx)"), which was introduced in Windows 7 and Windows Server 2008 R2 to provide the ability to identify the account that a given Service uses, instead of just using "NetworkService".
+
+- **Elevated Token** \[Version 2\] \[Type = UnicodeString\]**:** a “Yes” or “No” flag. If “Yes” then the session this event represents is elevated and has administrator privileges.
+
+**Impersonation Level** \[Version 1, 2\] \[Type = UnicodeString\]: can have one of these four values:
+
+- SecurityAnonymous (displayed as **empty string**): The server process cannot obtain identification information about the client, and it cannot impersonate the client. It is defined with no value given, and thus, by ANSI C rules, defaults to a value of zero.
+
+- SecurityIdentification (displayed as "**Identification**"): The server process can obtain information about the client, such as security identifiers and privileges, but it cannot impersonate the client. This is useful for servers that export their own objects, for example, database products that export tables and views. Using the retrieved client-security information, the server can make access-validation decisions without being able to use other services that are using the client's security context.
+
+- SecurityImpersonation (displayed as "**Impersonation**"): The server process can impersonate the client's security context on its local system. The server cannot impersonate the client on remote systems. This is the most common type.
+
+- SecurityDelegation (displayed as "**Delegation**"): The server process can impersonate the client's security context on remote systems.
+
+**New Logon:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which logon was performed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which logon was performed.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4672](event-4672.md)(S): Special privileges assigned to new logon.”
+
+- **Linked Logon ID** \[Version 2\] \[Type = HexInt64\]**:** A hexadecimal value of the paired logon session. If there is no other logon session associated with this logon session, then the value is “**0x0**”.
+
+- **Network Account Name** \[Version 2\] \[Type = UnicodeString\]**:** User name that will be used for outbound (network) connections. Valid only for [NewCredentials](#logon-types-and-descriptions) logon type.
+
+ If not **NewCredentials** logon, then this will be a "-" string.
+
+- **Network Account Domain** \[Version 2\] \[Type = UnicodeString\]**:** Domain for the user that will be used for outbound (network) connections. Valid only for [NewCredentials](#logon-types-and-descriptions) logon type.
+
+ If not **NewCredentials** logon, then this will be a "-" string.
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event with another event that can contain the same **Logon GUID**, “[4769](event-4769.md)(S, F): A Kerberos service ticket was requested event on a domain controller.
+
+ It also can be used for correlation between a 4624 event and several other events (on the same computer) that can contain the same **Logon GUID**, “[4648](event-4648.md)(S): A logon was attempted using explicit credentials” and “[4964](event-4964.md)(S): Special groups have been assigned to a new logon.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+**Process Information:**
+
+- **Caller Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted the logon. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Caller Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Network Information:**
+
+- **Workstation Name** \[Type = UnicodeString\]**:** machine name from which logon attempt was performed.
+
+- **Source Network Address** \[Type = UnicodeString\]**:** IP address of machine from which logon attempt was performed.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+- **Source Port** \[Type = UnicodeString\]: source port which was used for logon attempt from remote machine.
+
+ - 0 for interactive logons.
+
+**Detailed Authentication Information:**
+
+- **Logon Process** \[Type = UnicodeString\]**:** the name of the trusted logon process that was used for the logon. See event “[4611](event-4611.md): A trusted logon process has been registered with the Local Security Authority” description for more information.
+
+- **Authentication Package** \[Type = UnicodeString\]**:** The name of the authentication package which was used for the logon authentication process. Default packages loaded on LSA startup are located in “HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig” registry key. Other packages can be loaded at runtime. When a new package is loaded a “[4610](event-4610.md): An authentication package has been loaded by the Local Security Authority” (typically for NTLM) or “[4622](event-4622.md): A security package has been loaded by the Local Security Authority” (typically for Kerberos) event is logged to indicate that a new package has been loaded along with the package name. The most common authentication packages are:
+
+ - **NTLM** – NTLM-family Authentication
+
+ - **Kerberos** – Kerberos authentication.
+
+ - **Negotiate** – the Negotiate security package selects between Kerberos and NTLM protocols. Negotiate selects Kerberos unless it cannot be used by one of the systems involved in the authentication or the calling application did not provide sufficient information to use Kerberos.
+
+- **Transited Services** \[Type = UnicodeString\] \[Kerberos-only\]**:** the list of transmitted services. Transmitted services are populated if the logon was a result of a S4U (Service For User) logon process. S4U is a Microsoft extension to the Kerberos Protocol to allow an application service to obtain a Kerberos service ticket on behalf of a user – most commonly done by a front-end website to access an internal resource on behalf of a user. For more information about S4U, see
+
+- **Package Name (NTLM only)** \[Type = UnicodeString\]**:** The name of the LAN Manager sub-package ([NTLM-family](https://msdn.microsoft.com/en-us/library/cc236627.aspx) protocol name) that was used during logon. Possible values are:
+
+ - “NTLM V1”
+
+ - “NTLM V2”
+
+ - “LM”
+
+ Only populated if “**Authentication Package” = “NTLM”**.
+
+- **Key Length** \[Type = UInt32\]**:** the length of [NTLM Session Security](https://msdn.microsoft.com/en-us/library/cc236650.aspx) key. Typically it has 128 bit or 56 bit length. This parameter is always 0 if “**Authentication Package” = “Kerberos”**, because it is not applicable for Kerberos protocol. This field will also have “0” value if Kerberos was negotiated using **Negotiate** authentication package.
+
+## Security Monitoring Recommendations
+
+For 4624(S): An account was successfully logged on.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“New Logon\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“New Logon\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“New Logon\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“New Logon\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“New Logon\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“New Logon\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- If “**Restricted Admin**” mode must be used for logons by certain accounts, use this event to monitor logons by “**New Logon\\Security ID**” in relation to “**Logon Type**”=10 and “**Restricted Admin Mode**”=”Yes”. If “**Restricted Admin Mode**”=”No” for these accounts, trigger an alert.
+
+- If you need to monitor all logon events for accounts with administrator privileges, monitor this event with “**Elevated Token**”=”Yes”.
+
+- If you need to monitor all logon events for managed service accounts and group managed service accounts, monitor for events with “**Virtual Account**”=”Yes”.
+
+- To monitor for a mismatch between the logon type and the account that uses it (for example, if **Logon Type** 4-Batch or 5-Service is used by a member of a domain administrative group), monitor **Logon Type** in this event.
+
+- If your organization restricts logons in the following ways, you can use this event to monitor accordingly:
+
+ - If the user account **“New Logon\\Security ID”** should never be used to log on from the specific **Computer:**.
+
+ - If **New Logon\\Security ID** credentials should not be used from **Workstation Name** or **Source Network Address**.
+
+ - If a specific account, such as a service account, should only be used from your internal IP address list (or some other list of IP addresses). In this case, you can monitor for **Network Information\\Source Network Address** and compare the network address with your list of IP addresses.
+
+ - If a particular version of NTLM is always used in your organization. In this case, you can use this event to monitor **Package Name (NTLM only)**, for example, to find events where **Package Name (NTLM only)** does not equal **NTLM V2**.
+
+ - If NTLM is not used in your organization, or should not be used by a specific account (**New Logon\\Security ID**). In this case, monitor for all events where **Authentication Package** is NTLM.
+
+ - If the **Authentication Package** is NTLM. In this case, monitor for **Key Length** not equal to 128, because all Windows operating systems starting with Windows 2000 support 128-bit Key Length.
+
+- If you monitor for potentially malicious software, or software that is not authorized to request logon actions, monitor this event for **Process Name**.
+
+- If you have a trusted logon processes list, monitor for a **Logon Process** that is not from the list.
+
diff --git a/windows/keep-secure/event-4625.md b/windows/keep-secure/event-4625.md
new file mode 100644
index 0000000000..882c481177
--- /dev/null
+++ b/windows/keep-secure/event-4625.md
@@ -0,0 +1,289 @@
+---
+title: 4625(F) An account failed to log on. (Windows 10)
+description: Describes security event 4625(F) An account failed to log on.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4625(F): An account failed to log on.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit Account Lockout](audit-account-lockout.md) and [Audit Logon](audit-logon.md)
+
+***Event Description:***
+
+This event generates if an account logon attempt failed when the account was already locked out. It also generates for a logon attempt after which the account was locked out.
+
+It generates on the computer where logon attempt was made, for example, if logon attempt was made on user’s workstation, then event will be logged on this workstation.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4625
+ 0
+ 0
+ 12546
+ 0
+ 0x8010000000000000
+
+ 229977
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ S-1-0-0
+ Auditor
+ CONTOSO
+ 0xc0000234
+ %%2307
+ 0x0
+ 2
+ User32
+ Negotiate
+ DC01
+ -
+ -
+ 0
+ 0x1bc
+ C:\\Windows\\System32\\winlogon.exe
+ 127.0.0.1
+ 0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that reported information about logon failure. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that reported information about logon failure.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+**Logon Type** \[Type = UInt32\]**:** the type of logon which was performed. “Table 11. Windows Logon Types” contains the list of possible values for this field.
+
+| Logon Type | Logon Title | Description |
+|-----------------------------------------------------------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 2 | Interactive | A user logged on to this computer. |
+| 3 | Network | A user or computer logged on to this computer from the network. |
+| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| 5 | Service | A service was started by the Service Control Manager. |
+| 7 | Unlock | This workstation was unlocked. |
+| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+
+> Table: Windows Logon Types
+
+**Account For Which Logon Failed:**
+
+- **Security ID** \[Type = SID\]**:** SID of the account that was specified in the logon attempt. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was specified in the logon attempt.
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Failure Information:**
+
+- **Failure Reason** \[Type = UnicodeString\]**:** textual explanation of **Status** field value. For this event it typically has “**Account locked out**” value.
+
+- **Status** \[Type = HexInt32\]**:** the reason why logon failed. For this event it typically has “**0xC0000234**” value. The most common status codes are listed in “Table 12. Windows logon status codes.”
+
+| Status\\Sub-Status Code | Description |
+|-------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0XC000005E | There are currently no logon servers available to service the logon request. |
+| 0xC0000064 | User logon with misspelled or bad user account |
+| 0xC000006A | User logon with misspelled or bad password |
+| 0XC000006D | This is either due to a bad username or authentication information |
+| 0XC000006E | Unknown user name or bad password. |
+| 0xC000006F | User logon outside authorized hours |
+| 0xC0000070 | User logon from unauthorized workstation |
+| 0xC0000071 | User logon with expired password |
+| 0xC0000072 | User logon to account disabled by administrator |
+| 0XC00000DC | Indicates the Sam Server was in the wrong state to perform the desired operation. |
+| 0XC0000133 | Clocks between DC and other computer too far out of sync |
+| 0XC000015B | The user has not been granted the requested logon type (aka logon right) at this machine |
+| 0XC000018C | The logon request failed because the trust relationship between the primary domain and the trusted domain failed. |
+| 0XC0000192 | An attempt was made to logon, but the N**etlogon** service was not started. |
+| 0xC0000193 | User logon with expired account |
+| 0XC0000224 | User is required to change password at next logon |
+| 0XC0000225 | Evidently a bug in Windows and not a risk |
+| 0xC0000234 | User logon with account locked |
+| 0XC00002EE | Failure Reason: An Error occurred during Logon |
+| 0XC0000413 | Logon Failure: The machine you are logging onto is protected by an authentication firewall. The specified account is not allowed to authenticate to the machine. |
+| 0x0 | Status OK. |
+
+> Table: Windows logon status codes.
+
+> **Note** To see the meaning of other status\\sub-status codes you may also check for status code in the Window header file ntstatus.h in Windows SDK.
+
+More information:
+
+- **Sub Status** \[Type = HexInt32\]**:** additional information about logon failure. The most common sub-status codes listed in the “Table 12. Windows logon status codes.”.
+
+**Process Information:**
+
+- **Caller Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted the logon. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Caller Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Network Information:**
+
+- **Workstation Name** \[Type = UnicodeString\]**:** machine name from which logon attempt was performed.
+
+- **Source Network Address** \[Type = UnicodeString\]**:** IP address of machine from which logon attempt was performed.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+- **Source Port** \[Type = UnicodeString\]: source port which was used for logon attempt from remote machine.
+
+ - 0 for interactive logons.
+
+**Detailed Authentication Information:**
+
+- **Logon Process** \[Type = UnicodeString\]**:** the name of the trusted logon process that was used for the logon attempt. See event “[4611](event-4611.md): A trusted logon process has been registered with the Local Security Authority” description for more information.
+
+- **Authentication Package** \[Type = UnicodeString\]**:** The name of the authentication package which was used for the logon authentication process. Default packages loaded on LSA startup are located in “HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig” registry key. Other packages can be loaded at runtime. When a new package is loaded a “[4610](event-4610.md): An authentication package has been loaded by the Local Security Authority” (typically for NTLM) or “[4622](event-4622.md): A security package has been loaded by the Local Security Authority” (typically for Kerberos) event is logged to indicate that a new package has been loaded along with the package name. The most common authentication packages are:
+
+ - **NTLM** – NTLM-family Authentication
+
+ - **Kerberos** – Kerberos authentication.
+
+ - **Negotiate** – the Negotiate security package selects between Kerberos and NTLM protocols. Negotiate selects Kerberos unless it cannot be used by one of the systems involved in the authentication or the calling application did not provide sufficient information to use Kerberos.
+
+- **Transited Services** \[Type = UnicodeString\] \[Kerberos-only\]**:** the list of transmitted services. Transmitted services are populated if the logon was a result of a S4U (Service For User) logon process. S4U is a Microsoft extension to the Kerberos Protocol to allow an application service to obtain a Kerberos service ticket on behalf of a user – most commonly done by a front-end website to access an internal resource on behalf of a user. For more information about S4U, see
+
+- **Package Name (NTLM only)** \[Type = UnicodeString\]**:** The name of the LAN Manager sub-package ([NTLM-family](https://msdn.microsoft.com/en-us/library/cc236627.aspx) protocol name) that was used during the logon attempt. Possible values are:
+
+ - “NTLM V1”
+
+ - “NTLM V2”
+
+ - “LM”
+
+ Only populated if “**Authentication Package” = “NTLM”**.
+
+- **Key Length** \[Type = UInt32\]**:** the length of [NTLM Session Security](https://msdn.microsoft.com/en-us/library/cc236650.aspx) key. Typically it has 128 bit or 56 bit length. This parameter is always 0 if “**Authentication Package” = “Kerberos”**, because it is not applicable for Kerberos protocol. This field will also have “0” value if Kerberos was negotiated using **Negotiate** authentication package.
+
+## Security Monitoring Recommendations
+
+For 4625(F): An account failed to log on.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If **Subject\\Account Name** is a name of service account or user account, it may be useful to investigate whether that account is allowed (or expected) to request logon for **Account For Which Logon Failed\\Security ID**.
+
+- To monitor for a mismatch between the logon type and the account that uses it (for example, if **Logon Type** 4-Batch or 5-Service is used by a member of a domain administrative group), monitor **Logon Type** in this event.
+
+- If you have a high-value domain or local account for which you need to monitor every lockout, monitor all [4625](event-4625.md) events with the **“Subject\\Security ID”** that corresponds to the account.
+
+- We recommend monitoring all [4625](event-4625.md) events for local accounts, because these accounts typically should not be locked out. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
+- We recommend monitoring all [4625](event-4625.md) events for service accounts, because these accounts should not be locked out or prevented from functioning. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
+- If your organization restricts logons in the following ways, you can use this event to monitor accordingly:
+
+ - If the **“Account For Which Logon Failed \\Security ID”** should never be used to log on from the specific **Network Information\\Workstation Name**.
+
+ - If a specific account, such as a service account, should only be used from your internal IP address list (or some other list of IP addresses). In this case, you can monitor for **Network Information\\Source Network Address** and compare the network address with your list of IP addresses.
+
+ - If a particular version of NTLM is always used in your organization. In this case, you can use this event to monitor **Package Name (NTLM only)**, for example, to find events where **Package Name (NTLM only)** does not equal **NTLM V2**.
+
+ - If NTLM is not used in your organization, or should not be used by a specific account (**New Logon\\Security ID**). In this case, monitor for all events where **Authentication Package** is NTLM.
+
+ - If the **Authentication Package** is NTLM. In this case, monitor for **Key Length** not equal to 128, because all Windows operating systems starting with Windows 2000 support 128-bit Key Length.
+
+ - If **Logon Process** is not from a trusted logon processes list.
+
+- Monitor for all events with the fields and values in the following table:
+
+| **Field** | Value to monitor for |
+|----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0XC000005E – “There are currently no logon servers available to service the logon request.”
This is typically not a security issue but it can be an infrastructure or availability issue. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC0000064 – “User logon with misspelled or bad user account”.
Especially if you get a number of these in a row, it can be a sign of user enumeration attack. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC000006A – “User logon with misspelled or bad password” for critical accounts or service accounts.
Especially watch for a number of such events in a row. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0XC000006D – “This is either due to a bad username or authentication information” for critical accounts or service accounts.
Especially watch for a number of such events in a row. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC000006F – “User logon outside authorized hours”. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC0000070 – “User logon from unauthorized workstation”. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC0000072 – “User logon to account disabled by administrator”. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0XC000015B – “The user has not been granted the requested logon type (aka logon right) at this machine”. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0XC0000192 – “An attempt was made to logon, but the Netlogon service was not started”.
This is typically not a security issue but it can be an infrastructure or availability issue. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0xC0000193 – “User logon with expired account”. |
+| **Failure Information\\Status** or
**Failure Information\\Sub Status** | 0XC0000413 – “Logon Failure: The machine you are logging onto is protected by an authentication firewall. The specified account is not allowed to authenticate to the machine”. |
+
diff --git a/windows/keep-secure/event-4626.md b/windows/keep-secure/event-4626.md
new file mode 100644
index 0000000000..7ed1c4a5e0
--- /dev/null
+++ b/windows/keep-secure/event-4626.md
@@ -0,0 +1,181 @@
+---
+title: 4626(S) User/Device claims information. (Windows 10)
+description: Describes security event 4626(S) User/Device claims information.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4626(S): User/Device claims information.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User/Device Claims](audit-user-device-claims.md)
+
+***Event Description:***
+
+This event generates for new account logons and contains user/device claims which were associated with a new logon session.
+
+This event does not generate if the user/device doesn’t have claims.
+
+For computer account logons you will also see device claims listed in the “**User Claims**” field.
+
+You will typically get “[4624](event-4624.md): An account was successfully logged on” and after it a 4626 event with the same information in **Subject**, **Logon Type** and **New Logon** sections.
+
+This event generates on the computer to which the logon was performed (target computer). For example, for Interactive logons it will be the same computer.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4626
+ 0
+ 0
+ 12553
+ 0
+ 0x8020000000000000
+
+ 232648
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x136f7b
+ 3
+ 1
+ 1
+ ad://ext/cn:88d2b96fdb2b4c49 <%%1818> : "dadmin" ad://ext/Department:88d16a8edaa8c66b <%%1818> : "IT"
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that reported information about claims. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that reported information about claims.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Logon Type** \[Type = UInt32\]**:** the type of logon which was performed. The table below contains the list of possible values for this field:
+
+| Logon Type | Logon Title | Description |
+|------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 2 | Interactive | A user logged on to this computer. |
+| 3 | Network | A user or computer logged on to this computer from the network. |
+| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| 5 | Service | A service was started by the Service Control Manager. |
+| 7 | Unlock | This workstation was unlocked. |
+| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+
+**New Logon:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which logon was performed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which logon was performed.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Event in sequence** \[Type = UInt32\]**: I**f is there is not enough space in one event to put all claims, you will see “**1 of N**” in this field and additional events will be generated. Typically this field has “**1 of 1**” value.
+
+**User Claims** \[Type = UnicodeString\]**:** list of user claims for new logon session. This field contains user claims if user account was logged in and device claims if computer account was logged in. Here is an example how to parse the entrance of this field:
+
+- ad://ext/cn:88d2b96fdb2b4c49 <String> : “dadmin”
+
+ - cn – claim display name.
+
+ - 88d2b96fdb2b4c49 – unique claim ID.
+
+ - <String> - claim type.
+
+ - “dadmin” – claim value.
+
+**Device Claims** \[Type = UnicodeString\]**:** list of device claims for new logon session. For user accounts this field typically has “**-**“ value**.** For computer accounts this field has device claims listed.
+
+## Security Monitoring Recommendations
+
+For 4626(S): User/Device claims information.
+
+- Typically this action is reported by the NULL SID account, so we recommend reporting all events with **“Subject\\Security ID”** not equal “**NULL SID**”.
+
+- If you need to monitor account logons with specific claims, you can monitor for [4626](event-4626.md) and check **User Claims**\\**Device Claims** fields.
+
+- If you have specific requirements, such as:
+
+ - Users with specific claims should not access specific computers;
+
+ - Computer account should not have specific claims;
+
+ - User account should not have specific claims;
+
+ - Claim should not be empty
+
+ - And so on…
+
+ You can monitor for [4626](event-4626.md) and check **User Claims**\\**Device Claims** fields.
+
+- If you need to monitor computer/user logon attempts only and you don’t need information about claims, then it is better to monitor “[4624](event-4624.md): An account was successfully logged on.”
+
diff --git a/windows/keep-secure/event-4627.md b/windows/keep-secure/event-4627.md
new file mode 100644
index 0000000000..33f1daae58
--- /dev/null
+++ b/windows/keep-secure/event-4627.md
@@ -0,0 +1,152 @@
+---
+title: 4627(S) Group membership information. (Windows 10)
+description: Describes security event 4627(S) Group membership information.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4627(S): Group membership information.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Group Membership](audit-group-membership.md)
+
+***Event Description:***
+
+This event generates with “[4624](event-4624.md)(S): An account was successfully logged on” and shows the list of groups that the logged-on account belongs to.
+
+You must also enable the Success audit for [Audit Logon](audit-logon.md) subcategory to get this event.
+
+Multiple events are generated if the group membership information cannot fit in a single security audit event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4627
+ 0
+ 0
+ 12554
+ 0
+ 0x8020000000000000
+
+ 3081
+
+
+ Security
+ WIN-GG82ULGC9GO.contoso.local
+
+
+-
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1377283216-344919071-3415362939-1104
+ dadmin
+ CONTOSO
+ 0x569860
+ 3
+ 1
+ 1
+ %{S-1-5-21-1377283216-344919071-3415362939-513} %{S-1-1-0} %{S-1-5-32-544} %{S-1-5-32-545} %{S-1-5-32-554} %{S-1-5-2} %{S-1-5-11} %{S-1-5-15} %{S-1-5-21-1377283216-344919071-3415362939-512} %{S-1-5-21-1377283216-344919071-3415362939-572} %{S-1-5-64-10} %{S-1-16-12288}
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that reported information about successful logon or invokes it. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that reported information about successful logon or invokes it.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4672](event-4672.md)(S): Special privileges assigned to new logon.”
+
+**Logon Type** \[Type = UInt32\]**:** the type of logon which was performed. The table below contains the list of possible values for this field:
+
+| Logon Type | Logon Title | Description |
+|------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 2 | Interactive | A user logged on to this computer. |
+| 3 | Network | A user or computer logged on to this computer from the network. |
+| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| 5 | Service | A service was started by the Service Control Manager. |
+| 7 | Unlock | This workstation was unlocked. |
+| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+
+**New Logon:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which logon was performed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which logon was performed.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4672](event-4672.md)(S): Special privileges assigned to new logon.”
+
+**Event in sequence** \[Type = UInt32\]**: I**f is there is not enough space in one event to put all groups, you will see “**1 of N**” in this field and additional events will be generated. Typically this field has “**1 of 1**” value.
+
+**Group Membership** \[Type = UnicodeString\]**:** the list of group SIDs which logged account belongs to (member of). Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+## Security Monitoring Recommendations
+
+For 4627(S): Group membership information.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this action is reported by the NULL SID account, so we recommend reporting all events with **“Subject\\Security ID”** not equal “**NULL SID**”.
+
+
+
+- If you need to track that a member of a specific group logged on to a computer, check the “**Group Membership**” field.
+
diff --git a/windows/keep-secure/event-4634.md b/windows/keep-secure/event-4634.md
new file mode 100644
index 0000000000..46ecf743dc
--- /dev/null
+++ b/windows/keep-secure/event-4634.md
@@ -0,0 +1,117 @@
+---
+title: 4634(S) An account was logged off. (Windows 10)
+description: Describes security event 4634(S) An account was logged off.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4634(S): An account was logged off.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Logoff](audit-logoff.md)
+
+***Event Description:***
+
+This event shows that logon session was terminated and no longer exists.
+
+The main difference between “[4647](event-4647.md): User initiated logoff.” and 4647 event is that 4647 event is generated when logoff procedure was initiated by specific account using logoff function, and 4634 event shows that session was terminated and no longer exists.
+
+4647 is more typical for **Interactive** and **RemoteInteractive** logon types when user was logged off using standard methods. You will typically see both 4647 and 4634 events when logoff procedure was initiated by user.
+
+It may be positively correlated with a “[4624](event-4624.md): An account was successfully logged on.” event using the **Logon ID** value. Logon IDs are only unique between reboots on the same computer.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4634
+ 0
+ 0
+ 12545
+ 0
+ 0x8020000000000000
+
+ 230019
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-90-1
+ DWM-1
+ Window Manager
+ 0x1a0992
+ 2
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was logged off. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was logged off.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Logon Type** \[Type = UInt32\]**:** the type of logon which was used. The table below contains the list of possible values for this field:
+
+| Logon Type | Logon Title | Description |
+|------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 2 | Interactive | A user logged on to this computer. |
+| 3 | Network | A user or computer logged on to this computer from the network. |
+| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| 5 | Service | A service was started by the Service Control Manager. |
+| 7 | Unlock | This workstation was unlocked. |
+| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+
+## Security Monitoring Recommendations
+
+For 4634(S): An account was logged off.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If a particular **Logon Type** should not be used by a particular account (for example if **Logon Type** 4-Batch or 5-Service is used by a member of a domain administrative group), monitor this event for such actions.
+
diff --git a/windows/keep-secure/event-4647.md b/windows/keep-secure/event-4647.md
new file mode 100644
index 0000000000..73b26c7c01
--- /dev/null
+++ b/windows/keep-secure/event-4647.md
@@ -0,0 +1,100 @@
+---
+title: 4647(S) User initiated logoff. (Windows 10)
+description: Describes security event 4647(S) User initiated logoff.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4647(S): User initiated logoff.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Logoff](audit-logoff.md)
+
+***Event Description:***
+
+This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
+
+The main difference with “[4634](event-4634.md)(S): An account was logged off.” event is that 4647 event is generated when logoff procedure was initiated by specific account using logoff function, and 4634 event shows that session was terminated and no longer exists.
+
+4647 is more typical for **Interactive** and **RemoteInteractive** logon types when user was logged off using standard methods. You will typically see both 4647 and 4634 events when logoff procedure was initiated by user.
+
+It may be positively correlated with a “[4624](event-4624.md): An account was successfully logged on.” event using the **Logon ID** value. Logon IDs are only unique between reboots on the same computer.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4647
+ 0
+ 0
+ 12545
+ 0
+ 0x8020000000000000
+
+ 230200
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x29b379
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “logoff” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “logoff” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+## Security Monitoring Recommendations
+
+For 4647(S): User initiated logoff.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
diff --git a/windows/keep-secure/event-4648.md b/windows/keep-secure/event-4648.md
new file mode 100644
index 0000000000..9cb907dcb0
--- /dev/null
+++ b/windows/keep-secure/event-4648.md
@@ -0,0 +1,194 @@
+---
+title: 4648(S) A logon was attempted using explicit credentials. (Windows 10)
+description: Describes security event 4648(S) A logon was attempted using explicit credentials.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4648(S): A logon was attempted using explicit credentials.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Logon](audit-logon.md)
+
+***Event Description:***
+
+This event is generated when a process attempts an account logon by explicitly specifying that account’s credentials.
+
+This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the “RUNAS” command.
+
+It is also a routine event which periodically occurs during normal operating system activity.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4648
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+ 233200
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x31844
+ {00000000-0000-0000-0000-000000000000}
+ ladmin
+ CONTOSO
+ {0887F1E4-39EA-D53C-804F-31D568A06274}
+ localhost
+ localhost
+ 0x368
+ C:\\Windows\\System32\\svchost.exe
+ ::1
+ 0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the new logon session with explicit credentials. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the new logon session with explicit credentials.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event with another event that can contain the same **Logon GUID**, “[4769](event-4769.md)(S, F): A Kerberos service ticket was requested event on a domain controller.
+
+ It also can be used for correlation between a 4648 event and several other events (on the same computer) that can contain the same **Logon GUID**, “[4624](event-4624.md)(S): An account was successfully logged on” and “[4964](event-4964.md)(S): Special groups have been assigned to a new logon.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+**Account Whose Credentials Were Used:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account whose credentials were used.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event with another event that can contain the same **Logon GUID**, “[4769](event-4769.md)(S, F): A Kerberos service ticket was requested event on a domain controller.
+
+ It also can be used for correlation between a 4648 event and several other events (on the same computer) that can contain the same **Logon GUID**, “[4624](event-4624.md)(S): An account was successfully logged on” and “[4964](event-4964.md)(S): Special groups have been assigned to a new logon.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+**Target Server:**
+
+- **Target Server Name** \[Type = UnicodeString\]**:** the name of the server on which the new process was run. Has “**localhost**” value if the process was run locally.
+
+- **Additional Information** \[Type = UnicodeString\]**:** there is no detailed information about this field in this document.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which was run using explicit credentials. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Network Information:**
+
+- **Network Address** \[Type = UnicodeString\]**:** IP address of machine from which logon attempt was performed.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+- **Port** \[Type = UnicodeString\]: source port which was used for logon attempt from remote machine.
+
+ - 0 for interactive logons.
+
+## Security Monitoring Recommendations
+
+For 4648(S): A logon was attempted using explicit credentials.
+
+The following table is similar to the table in [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md), but also describes ways of monitoring that use “**Account Whose Credentials Were Used\\Security ID.**”
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high value domain or local accounts for which you need to monitor each action.
Examples of high value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that correspond to the high value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** and “**Account Whose Credentials Were Used\\Security ID**” (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and “**Account Whose Credentials Were Used\\Security ID**” for accounts that are outside the whitelist. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform the action corresponding to this event. | Monitor for the **“Subject\\Account Domain”** or “**Account Whose Credentials Were Used\\Security ID**” corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that you are concerned about.
For example, you might monitor to ensure that “**Account Whose Credentials Were Used\\Security ID**” is not used to log on to a certain computer. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** and “**Account Whose Credentials Were Used\\Security ID**” for names that don’t comply with naming conventions. |
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If **Subject\\Security ID** should not know or use credentials for **Account Whose Credentials Were Used\\Account Name**, monitor this event.
+
+- If credentials for **Account Whose Credentials Were Used\\Account Name** should not be used from **Network Information\\Network Address**, monitor this event.
+
+- Check that **Network Information\\Network Address** is from internal IP address list. For example, if you know that a specific account (for example, a service account) should be used only from specific IP addresses, you can monitor for all events where **Network Information\\Network Address** is not one of the allowed IP addresses.
+
diff --git a/windows/keep-secure/event-4649.md b/windows/keep-secure/event-4649.md
new file mode 100644
index 0000000000..d360401748
--- /dev/null
+++ b/windows/keep-secure/event-4649.md
@@ -0,0 +1,79 @@
+---
+title: 4649(S) A replay attack was detected. (Windows 10)
+description: Describes security event 4649(S) A replay attack was detected.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4649(S): A replay attack was detected.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates on domain controllers when **KRB\_AP\_ERR\_REPEAT** Kerberos response was sent to the client.
+
+Domain controllers cache information from recently received tickets. If the server name, client name, time, and microsecond fields from the Authenticator match recently seen entries in the cache, it will return KRB\_AP\_ERR\_REPEAT. You can read more about this in [RFC-1510](http://www.ietf.org/rfc/rfc1510.txt). One potential cause for this is a misconfigured network device between the client and server that could send the same packet(s) repeatedly.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Schema:***
+
+*A replay attack was detected.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Credentials Which Were Replayed:*
+
+> *Account Name:%5*
+>
+> *Account Domain:%6*
+
+*Process Information:*
+
+> *Process ID:%12*
+>
+> *Process Name:%13*
+
+*Network Information:*
+
+> *Workstation Name:%10*
+
+*Detailed Authentication Information:*
+
+> *Request Type:%7*
+>
+> *Logon Process:%8*
+>
+> *Authentication Package:%9*
+>
+> *Transited Services:%11*
+
+*This event indicates that a Kerberos replay attack was detected- a request was received twice with identical information. This condition could be caused by network misconfiguration."*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4649(S): A replay attack was detected.
+
+- This event can be a sign of Kerberos replay attack or, among other things, network device configuration or routing problems. In both cases, we recommend triggering an alert and investigating the reason the event was generated.
+
diff --git a/windows/keep-secure/event-4656.md b/windows/keep-secure/event-4656.md
new file mode 100644
index 0000000000..fbe4f6276e
--- /dev/null
+++ b/windows/keep-secure/event-4656.md
@@ -0,0 +1,277 @@
+---
+title: 4656(S, F) A handle to an object was requested. (Windows 10)
+description: Describes security event 4656(S, F) A handle to an object was requested.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4656(S, F): A handle to an object was requested.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), and [Audit Removable Storage](audit-removable-storage.md)
+
+***Event Description:***
+
+This event indicates that specific access was requested for an object. The object could be a file system, kernel, or registry object, or a file system object on removable storage or a device.
+
+If access was declined, a Failure event is generated.
+
+This event generates only if the object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) has the required ACE to handle the use of specific access rights.
+
+This event shows that access was requested, and the results of the request, but it doesn’t show that the operation was performed. To see that the operation was performed, check “[4663](event-4663.md)(S): An attempt was made to access an object.”
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+***Event XML***:
+```
+-
+-
+
+ 4656
+ 1
+ 0
+ 12800
+ 0
+ 0x8010000000000000
+
+ 274057
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x4367b
+ Security
+ File
+ C:\\Documents\\HBI Data.txt
+ 0x0
+ {00000000-0000-0000-0000-000000000000}
+ %%1538 %%1541 %%4416 %%4417 %%4418 %%4419 %%4420 %%4423 %%4424
+ %%1538: %%1804 %%1541: %%1809 %%4416: %%1809 %%4417: %%1809 %%4418: %%1802 D:(D;;LC;;;S-1-5-21-3457937927-2839227994-823803824-1104) %%4419: %%1809 %%4420: %%1809 %%4423: %%1811 D:(A;OICI;FA;;;S-1-5-21-3457937927-2839227994-823803824-1104) %%4424: %%1809
+ 0x12019f
+ -
+ 0
+ 0x1074
+ C:\\Windows\\System32\\notepad.exe
+ S:AI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+- 1 - Windows Server 2012, Windows 8.
+
+ - Added “Resource Attributes” field.
+
+ - Added “Access Reasons” field.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested a handle to an object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested a handle to an object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: name and other identifying information for the object for which access was requested. For example, for a file, the path would be included.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+- **Resource Attributes** \[Type = UnicodeString\] \[Version 1\]: attributes associated with the object. For some objects, the field does not apply and “-“ is displayed.
+
+ For example, for a file, the following might be displayed: S:AI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+
+ - Impact\_MS: Resource Property ***ID***.
+
+ - 3000: Recourse Property ***Value***.
+
+
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the access was requested. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Access Request Information:**
+
+- **Transaction ID** \[Type = GUID\]: unique GUID of the transaction. This field can help you correlate this event with other events that might contain the same **Transaction ID**, such as “[4660](event-4660.md)(S): An object was deleted.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were requested by **Subject\\Security ID**. These access rights depend on **Object Type**. The following table contains information about the most common access rights for file system objects. Access rights for registry objects are often similar to file system objects, but the table contains a few notes about how they vary.
+
+| Access | Hexadecimal Value,
Schema Value | Description |
+|---------------------------------------------------------------------------------------|-------------------------------------|----------------|
+| ReadData (or ListDirectory)
(For registry objects, this is “Query key value.”) | 0x1,
%%4416 | **ReadData -** For a file object, the right to read the corresponding file data. For a directory object, the right to read the corresponding directory data.
**ListDirectory -** For a directory, the right to list the contents of the directory. |
+| WriteData (or AddFile)
(For registry objects, this is “Set key value.”) | 0x2,
%%4417 | **WriteData -** For a file object, the right to write data to the file. For a directory object, the right to create a file in the directory (**FILE\_ADD\_FILE**).
**AddFile -** For a directory, the right to create a file in the directory. |
+| AppendData (or AddSubdirectory or CreatePipeInstance) | 0x4,
%%4418 | **AppendData -** For a file object, the right to append data to the file. (For local files, write operations will not overwrite existing data if this flag is specified without **FILE\_WRITE\_DATA**.) For a directory object, the right to create a subdirectory (**FILE\_ADD\_SUBDIRECTORY**).
**AddSubdirectory -** For a directory, the right to create a subdirectory.
**CreatePipeInstance -** For a named pipe, the right to create a pipe. |
+| ReadEA
(For registry objects, this is “Enumerate sub-keys.”) | 0x8,
%%4419 | The right to read extended file attributes. |
+| WriteEA | 0x10,
%%4420 | The right to write extended file attributes. |
+| Execute/Traverse | 0x20,
%%4421 | **Execute** - For a native code file, the right to execute the file. This access right given to scripts may cause the script to be executable, depending on the script interpreter.
**Traverse -** For a directory, the right to traverse the directory. By default, users are assigned the **BYPASS\_TRAVERSE\_CHECKING** [privilege](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379306(v=vs.85).aspx), which ignores the **FILE\_TRAVERSE** [access right](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374902(v=vs.85).aspx). See the remarks in [File Security and Access Rights](https://msdn.microsoft.com/en-us/library/windows/desktop/aa364399(v=vs.85).aspx) for more information. |
+| DeleteChild | 0x40,
%%4422 | For a directory, the right to delete a directory and all the files it contains, including read-only files. |
+| ReadAttributes | 0x80,
%%4423 | The right to read file attributes. |
+| WriteAttributes | 0x100,
%%4424 | The right to write file attributes. |
+| DELETE | 0x10000,
%%1537 | The right to delete the object. |
+| READ\_CONTROL | 0x20000,
%%1538 | The right to read the information in the object's security descriptor, not including the information in the system access control list (SACL). |
+| WRITE\_DAC | 0x40000,
%%1539 | The right to modify the discretionary access control list (DACL) in the object's security descriptor. |
+| WRITE\_OWNER | 0x80000,
%%1540 | The right to change the owner in the object's security descriptor |
+| SYNCHRONIZE | 0x100000,
%%1541 | The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right. |
+| ACCESS\_SYS\_SEC | 0x1000000,
%%1542 | The ACCESS\_SYS\_SEC access right controls the ability to get or set the SACL in an object's security descriptor. |
+
+> Table 14. File System objects access rights.
+
+- **Access Reasons** \[Type = UnicodeString\] \[Version 1\]: the list of access check results. The format of this varies, depending on the object. For kernel objects, this field does not apply.
+
+- **Access Mask** \[Type = HexInt32\]: hexadecimal mask for the requested or performed operation. For more information, see the preceding table.
+
+
+
+- **Privileges Used for Access Check** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in the table below:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+- **Restricted SID Count** \[Type = UInt32\]: Number of [restricted SIDs](https://msdn.microsoft.com/en-us/library/windows/desktop/aa446583(v=vs.85).aspx) in the token. Applicable to only specific **Object Types**.
+
+## Security Monitoring Recommendations
+
+For 4656(S, F): A handle to an object was requested.
+
+For kernel objects, this event and other auditing events have little to no security relevance and are hard to parse or analyze. There is no recommendation for auditing them, unless you know exactly what you need to monitor at the Kernel objects level.
+
+For other types of objects, the following recommendations apply.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If **Object Name** is a sensitive or critical object for which you need to monitor any access attempt, monitor all [4656](event-4656.md) events.
+
+- If **Object Name** is a sensitive or critical object for which you need to monitor specific access attempts (for example, only write actions), monitor for all [4656](event-4656.md) events with the corresponding **Access Request Information\\Accesses** values.
+
+- If you need to monitor files and folders with specific Resource Attribute values, monitor for all [4656](event-4656.md) events with specific **Resource Attributes** field values.
+
+ For file system objects, we recommend that you monitor these **Access Request Information\\Accesses** rights (especially for Failure events):
+
+ - WriteData (or AddFile)
+
+ - AppendData (or AddSubdirectory or CreatePipeInstance)
+
+ - WriteEA
+
+ - DeleteChild
+
+ - WriteAttributes
+
+ - DELETE
+
+ - WRITE\_DAC
+
+ - WRITE\_OWNER
+
diff --git a/windows/keep-secure/event-4657.md b/windows/keep-secure/event-4657.md
new file mode 100644
index 0000000000..f4795e4e3e
--- /dev/null
+++ b/windows/keep-secure/event-4657.md
@@ -0,0 +1,179 @@
+---
+title: 4657(S) A registry value was modified. (Windows 10)
+description: Describes security event 4657(S) A registry value was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4657(S): A registry value was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Registry](audit-registry.md)
+
+***Event Description:***
+
+This event generates when a registry key ***value*** was modified. It doesn’t generate when a registry key was modified.
+
+This event generates only if “Set Value" auditing is set in registry key’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4657
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+ 744725
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\REGISTRY\\MACHINE
+ Name\_New
+ 0x54
+ %%1905
+ %%1873
+
+ %%1873
+ Andrei
+ 0xce4
+ C:\\Windows\\regedit.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify registry value” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify registry value” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object:**
+
+- **Object Name** \[Type = UnicodeString\]: full path and name of the registry key which value was modified. The format is: \\REGISTRY\\HIVE\\PATH where:
+
+ - HIVE:
+
+ - HKEY\_LOCAL\_MACHINE = \\REGISTRY\\MACHINE
+
+ - HKEY\_CURRENT\_USER = \\REGISTRY\\USER\\\[USER\_SID\], where \[USER\_SID\] is the SID of current user.
+
+ - HKEY\_CLASSES\_ROOT = \\REGISTRY\\MACHINE\\SOFTWARE\\Classes
+
+ - HKEY\_USERS = \\REGISTRY\\USER
+
+ - HKEY\_CURRENT\_CONFIG = \\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Hardware Profiles\\Current
+
+ - PATH – path to the registry key.
+
+- **Object Value Name** \[Type = UnicodeString\]**:** the name of modified registry key value.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4656](event-4656.md): A handle to an object was requested.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+- **Operation Type** \[Type = UnicodeString\]**:** the type of performed operation with registry key value. Most common operations are:
+
+ - New registry value created
+
+ - Registry value deleted
+
+ - Existing registry value modified
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the registry key value was modified. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Change Information:**
+
+- **Old Value Type** \[Type = UnicodeString\]**:** old type of changed registry key value. Registry key value types:
+
+| Value Type | Description |
+|-----------------|-------------------------|
+| REG\_SZ | String |
+| REG\_BINARY | Binary |
+| REG\_DWORD | DWORD (32-bit) Value |
+| REG\_QWORD | QWORD (64-bit) Value |
+| REG\_MULTI\_SZ | Multi-String Value |
+| REG\_EXPAND\_SZ | Expandable String Value |
+
+- **Old Value** \[Type = UnicodeString\]: old value for changed registry key value.
+
+- **New Value Type** \[Type = UnicodeString\]**:** new type of changed registry key value. See table above for possible values.
+
+- **New Value** \[Type = UnicodeString\]: new value for changed registry key value.
+
+## Security Monitoring Recommendations
+
+For 4657(S): A registry value was modified.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If **Object Name** is a sensitive or critical registry key for which you need to monitor any modification of its values, monitor all [4657](event-4657.md) events.
+
+- If **Object Name** has specific values (**Object Value Name**) and you need to monitor modifications of these values, monitor for all [4657](event-4657.md) events.
+
diff --git a/windows/keep-secure/event-4658.md b/windows/keep-secure/event-4658.md
new file mode 100644
index 0000000000..41f3978e7d
--- /dev/null
+++ b/windows/keep-secure/event-4658.md
@@ -0,0 +1,132 @@
+---
+title: 4658(S) The handle to an object was closed. (Windows 10)
+description: Describes security event 4658(S) The handle to an object was closed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4658(S): The handle to an object was closed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Handle Manipulation](audit-handle-manipulation.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), and [Audit Removable Storage](audit-removable-storage.md)
+
+***Event Description:***
+
+This event generates when the handle to an object is closed. The object could be a file system, kernel, or registry object, or a file system object on removable storage or a device.
+
+This event generates only if Success auditing is enabled for [Audit Handle Manipulation](audit-handle-manipulation.md) subcategory.
+
+Typically this event is needed if you need to know how long the handle to the object was open. Otherwise, it might not have any security relevance.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4658
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+ 276724
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x4367b
+ Security
+ 0x18a8
+ 0xef0
+ C:\\Windows\\explorer.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “close object’s handle” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “close object’s handle” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that requested that the handle be closed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+## Security Monitoring Recommendations
+
+For 4658(S): The handle to an object was closed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this event has little to no security relevance and is hard to parse or analyze. There is no recommendation for this event, unless you know exactly what you need to monitor with it.
+
+- This event can be used to track all actions or operations related to a specific object handle.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
diff --git a/windows/keep-secure/event-4660.md b/windows/keep-secure/event-4660.md
new file mode 100644
index 0000000000..8621c75ec2
--- /dev/null
+++ b/windows/keep-secure/event-4660.md
@@ -0,0 +1,133 @@
+---
+title: 4660(S) An object was deleted. (Windows 10)
+description: Describes security event 4660(S) An object was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4660(S): An object was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), and [Audit Registry](audit-registry.md)
+
+***Event Description:***
+
+This event generates when an object was deleted. The object could be a file system, kernel, or registry object.
+
+This event generates only if “Delete" auditing is set in object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx).
+
+This event doesn’t contain the name of the deleted object (only the **Handle ID**). It is better to use “[4663](event-4663.md)(S): An attempt was made to access an object” with DELETE access to track object deletion.
+
+The advantage of this event is that it’s generated only during real delete operations. In contrast, “4663(S): An attempt was made to access an object” also generates during other actions, such as object renaming.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4660
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+ 270188
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x4367b
+ Security
+ 0x1678
+ 0xef0
+ C:\\Windows\\explorer.exe
+ {00000000-0000-0000-0000-000000000000}
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that deleted the object. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+
+
+- **Transaction ID** \[Type = GUID\]: unique GUID of the transaction. This field can help you correlate this event with other events that might contain the same **Transaction ID**, such as “[4656](event-4656.md)(S, F): A handle to an object was requested.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+## Security Monitoring Recommendations
+
+For 4660(S): An object was deleted.
+
+- This event doesn’t contains the name of deleted object (only **Handle ID**). It is better to use “[4663](event-4663.md)(S): An attempt was made to access an object.” events with DELETE access to track object deletion actions.
+
+- For kernel objects, this event and other auditing events have little to no security relevance and are hard to parse or analyze. There is no recommendation for auditing them, unless you know exactly what you need to monitor at the Kernel objects level.
+
diff --git a/windows/keep-secure/event-4661.md b/windows/keep-secure/event-4661.md
new file mode 100644
index 0000000000..d57a37f333
--- /dev/null
+++ b/windows/keep-secure/event-4661.md
@@ -0,0 +1,220 @@
+---
+title: 4661(S, F) A handle to an object was requested. (Windows 10)
+description: Describes security event 4661(S, F) A handle to an object was requested.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4661(S, F): A handle to an object was requested.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit Directory Service Access](audit-directory-service-access.md) and [Audit SAM](audit-sam.md)
+
+***Event Description:***
+
+This event indicates that a handle was requested for either an Active Directory object or a Security Account Manager (SAM) object.
+
+If access was declined, then Failure event is generated.
+
+This event generates only if Success auditing is enabled for the [Audit Handle Manipulation](audit-handle-manipulation.md) subcategory.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML***:
+```
+-
+-
+
+ 4661
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+ 1048009
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x4280e
+ Security Account Manager
+ SAM\_DOMAIN
+ DC=contoso,DC=local
+ 0xdd64d36870
+ {00000000-0000-0000-0000-000000000000}
+ %%5400
+ 0x2d
+ Ā
+ -
+ 2949165
+ 0x9000a000d002d
+ {bf967a90-0de6-11d0-a285-00aa003049e2} %%5400 {ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501}
+
+
+
+```
+
+***Required Server Roles:*** For an Active Directory object, the domain controller role is required. For a SAM object, there is no required role.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested a handle to an object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested a handle to an object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security Account Manager**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: the type or class of the object that was accessed. The following list contains possible values for this field:
+
+ - SAM\_ALIAS - a local group.
+
+ - SAM\_GROUP - a group that is not a local group.
+
+ - SAM\_USER - a user account.
+
+ - SAM\_DOMAIN - a domain. For Active Directory events, this is the typical value.
+
+ - SAM\_SERVER - a computer account.
+
+- **Object Name** \[Type = UnicodeString\]: the name of an object for which access was requested. Depends on **Object Type.** This event can have the following format:
+
+ - SAM\_ALIAS – SID of the group.
+
+ - SAM\_GROUP - SID of the group.
+
+ - SAM\_USER - SID of the account.
+
+ - SAM\_DOMAIN – distinguished name of the accessed object.
+
+ - SAM\_SERVER - distinguished name of the accessed object.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4662](event-4662.md): An operation was performed on an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that requested the handle. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Access Request Information:**
+
+- **Transaction ID** \[Type = GUID\]: unique GUID of the transaction. This field can help you correlate this event with other events that might contain the same the **Transaction ID**, such as “[4660](event-4660.md)(S): An object was deleted.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were requested by **Subject\\Security ID**. These access rights depend on **Object Type**. See “Table 13. File access codes.” for more information about file access rights. For information about SAM object access right use or other informational resources.
+
+- **Access Mask** \[Type = HexInt32\]: hexadecimal mask for the operation that was requested or performed. See “Table 13. File access codes.” for more information about file access rights. For information about SAM object access right use or other informational resources.
+
+- **Privileges Used for Access Check** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in the table below:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+- **Properties** \[Type = UnicodeString\]: depends on **Object Type**. This field can be empty or contain the list of the object properties that were accessed. See more detailed information in “[4661](event-4661.md): A handle to an object was requested” from [Audit SAM](audit-sam.md) subcategory.
+
+- **Restricted SID Count** \[Type = UInt32\]: Number of [restricted SIDs](https://msdn.microsoft.com/en-us/library/windows/desktop/aa446583(v=vs.85).aspx) in the token. Applicable to only specific **Object Types**.
+
+## Security Monitoring Recommendations
+
+For 4661(S, F): A handle to an object was requested.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can get almost the same information from “[4662](event-4662.md): An operation was performed on an object.” There are no additional recommendations for this event in this document.
+
diff --git a/windows/keep-secure/event-4662.md b/windows/keep-secure/event-4662.md
new file mode 100644
index 0000000000..2137b547fe
--- /dev/null
+++ b/windows/keep-secure/event-4662.md
@@ -0,0 +1,248 @@
+---
+title: 4662(S, F) An operation was performed on an object. (Windows 10)
+description: Describes security event 4662(S, F) An operation was performed on an object.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4662(S, F): An operation was performed on an object.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Access](audit-directory-service-access.md)
+
+***Event Description:***
+
+This event generates every time when an operation was performed on an Active Directory object.
+
+This event generates only if appropriate [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) was set for Active Directory object and performed operation meets this SACL.
+
+If operation failed then Failure event will be generated.
+
+You will get one 4662 for each operation type which was performed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4662
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+ 407230
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x35867
+ DS
+ %{bf967a86-0de6-11d0-a285-00aa003049e2}
+ %{38b3d2e6-9948-4dc1-ae90-1605d5eab9a2}
+ Object Access
+ 0x0
+ %%1537
+ 0x10000
+ %%1537 {bf967a86-0de6-11d0-a285-00aa003049e2}
+ -
+
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object:**
+
+- **Object Server** \[Type = UnicodeString\]: has “**DS**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: type or class of the object that was accessed. Some of the common Active Directory object types and classes are:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of **Object Type** open Active Directory Schema snap-in (see how to enable this snap-in: and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+- **Object Name** \[Type = UnicodeString\]: distinguished name of the object that was accessed.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4661](event-4661.md): A handle to an object was requested.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Operation:**
+
+- **Operation Type** \[Type = UnicodeString\]: the type of operation which was performed on an object. Typically has “**Object Access”** value for this event.
+
+- **Accesses** \[Type = UnicodeString\]: the type of access used for the operation. See “Table 9. Active Directory Access Codes and Rights.” for more information.
+
+- **Access Mask** \[Type = HexInt32\]: hexadecimal mask for the type of access used for the operation. See “Table 9. Active Directory Access Codes and Rights.” for more information.
+
+| Access Mask | Access Name | Description |
+|--------------------------------------------------------------------------------------|--------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x1 | Create Child | The right to create child objects of the object. |
+| 0x2 | Delete Child | The right to delete child objects of the object. |
+| 0x4 | List Contents | The right to list child objects of this object. |
+| 0x8 | SELF | The right to perform an operation controlled by a validated write access right. |
+| 0x10 | Read Property | The right to read properties of the object. |
+| 0x20 | Write Property | The right to write properties of the object. |
+| 0x40 | Delete Tree | Delete all children of this object, regardless of the permissions of the children. It is indicates that “Use Delete Subtree server control” check box was checked during deletion. This operation means that all objects within the subtree, including all delete-protected objects, will be deleted. |
+| 0x80 | List Object | The right to list a particular object. |
+| 0x100 | Control Access | Access allowed only after extended rights checks supported by the object are performed.
The right to perform an operation controlled by an extended access right. |
+| 0x10000 | DELETE | The right to delete the object.
DELETE also generated when object was moved. |
+| 0x20000 | READ\_CONTROL | The right to read data from the security descriptor of the object, not including the data in the SACL. |
+| 0x40000 | WRITE\_DAC | The right to modify the discretionary access-control list (DACL) in the object security descriptor. |
+| 0x80000 | WRITE\_OWNER | The right to assume ownership of the object. The user must be an object trustee. The user cannot transfer the ownership to other users. |
+| 0x100000 | SYNCHRONIZE | The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. |
+| 0x1000000 | ADS\_RIGHT\_ACCESS\_SYSTEM\_SECURITY | The right to get or set the SACL in the object security descriptor. |
+| 0x80000000 | ADS\_RIGHT\_GENERIC\_READ | The right to read permissions on this object, read all the properties on this object, list this object name when the parent container is listed, and list the contents of this object if it is a container. |
+| 0x40000000 | ADS\_RIGHT\_GENERIC\_WRITE | The right to read permissions on this object, write all the properties on this object, and perform all validated writes to this object. |
+| 0x20000000 | ADS\_RIGHT\_GENERIC\_EXECUTE | The right to read permissions on, and list the contents of, a container object. |
+| 0x10000000 | ADS\_RIGHT\_GENERIC\_ALL | The right to create or delete child objects, delete a subtree, read and write properties, examine child objects and the object itself, add and remove the object from the directory, and read or write with an extended right. |
+
+> Table 9. Active Directory Access Codes and Rights.
+
+- **Properties** \[Type = UnicodeString\]: first part is the type of access that was used. Typically has the same value as **Accesses** field.
+
+ Second part is a tree of **GUID** values of Active Directory classes or property sets, for which operation was performed.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+To translate this GUID, use the following procedure:
+
+- Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(schemaIDGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: bf967a86-0de6-11d0-a285-00aa003049e2
+
+ - Take first 3 sections bf967a86-0de6-11d0.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this 867a96bf-e60d-d011
+
+ - Add the last 2 sections without transformation: 867a96bf-e60d-d011-a285-00aa003049e2
+
+ - Delete - : 867a96bfe60dd011a28500aa003049e2
+
+ - Divide bytes with backslashes: \\86\\7a\\96\\bf\\e6\\0d\\d0\\11\\a2\\85\\00\\aa\\00\\30\\49\\e2
+
+ - Filter example: (&(objectClass=\*)(schemaIDGUID=\\86\\7a\\96\\bf\\e6\\0d\\d0\\11\\a2\\85\\00\\aa\\00\\30\\49\\e2))
+
+ - Scope: Subtree
+
+ - Attributes: schemaIDGUID
+
+
+
+Sometimes GUID refers to pre-defined Active Directory Property Sets, you can find GUID (**Rights-GUID** field), “property set name” and details here: .
+
+Here is an example of decoding of **Properties** field:
+
+| Properties | Translation |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------|
+| {bf967a86-0de6-11d0-a285-00aa003049e2}
{91e647de-d96f-4b70-9557-d63ff4f3ccd8}
{6617e4ac-a2f1-43ab-b60c-11fbd1facf05}
{b3f93023-9239-4f7c-b99c-6745d87adbc2}
{b8dfa744-31dc-4ef1-ac7c-84baf7ef9da7} | Computer
Private-Information property set
ms-PKI-RoamingTimeStamp
ms-PKI-DPAPIMasterKeys
ms-PKI-AccountCredentials |
+
+**Additional Information:**
+
+- **Parameter 1** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+- **Parameter 2** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+## Security Monitoring Recommendations
+
+For 4662(S, F): An operation was performed on an object.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor operations attempts to specific Active Directory classes, monitor for **Object Type** field with specific class name. For example, we recommend that you monitor all operations attempts to **domainDNS** class.
+
+- If you need to monitor operations attempts to specific Active Directory objects, monitor for **Object Name** field with specific object name. For example, we recommend that you monitor all operations attempts to “**CN=AdminSDHolder,CN=System,DC=domain,DC=com”** object.
+
+- Some access types are more important to monitor, for example:
+
+ - Write Property
+
+ - Control Access
+
+ - DELETE
+
+ - WRITE\_DAC
+
+ - WRITE\_OWNER
+
+ You can decide to monitor these (or one of these) access types for specific Active Directory objects. To do so, monitor for **Accesses** field with specific access type.
+
+- If you need to monitor operations attempts to specific Active Directory properties, monitor for **Properties** field with specific property GUID.
+
+- Do not forget that **Failure** attempts are also very important to audit. Decide where you want to monitor Failure attempts based on previous recommendations.
+
diff --git a/windows/keep-secure/event-4663.md b/windows/keep-secure/event-4663.md
new file mode 100644
index 0000000000..18fa7b3352
--- /dev/null
+++ b/windows/keep-secure/event-4663.md
@@ -0,0 +1,223 @@
+---
+title: 4663(S) An attempt was made to access an object. (Windows 10)
+description: Describes security event 4663(S) An attempt was made to access an object.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4663(S): An attempt was made to access an object.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), and [Audit Removable Storage](audit-removable-storage.md)
+
+***Event Description:***
+
+This event indicates that a specific operation was performed on an object. The object could be a file system, kernel, or registry object, or a file system object on removable storage or a device.
+
+This event generates only if object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) has required ACE to handle specific access right use.
+
+The main difference with “[4656](event-4656.md): A handle to an object was requested.” event is that 4663 shows that access right was used instead of just requested and 4663 doesn’t have Failure events.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4663
+ 1
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+ 273866
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x4367b
+ Security
+ File
+ C:\\Documents\\HBI Data.txt
+ 0x1bc
+ %%4417 %%4418
+ 0x6
+ 0x458
+ C:\\Windows\\System32\\notepad.exe
+ S:AI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+- 1 - Windows Server 2012, Windows 8.
+
+ - Added “Resource Attributes” field.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to access an object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to access an object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of object that was accessed during the operation.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: name and other identifying information for the object for which access was requested. For example, for a file, the path would be included.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can be used for correlation with other events, for example with **Handle ID** field in “[4656](event-4656.md)(S, F): A handle to an object was requested.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+- **Resource Attributes** \[Type = UnicodeString\] \[Version 1\]: attributes associated with the object. For some objects, the field does not apply and “-“ is displayed.
+
+ For example, for a file, the following might be displayed: S:AI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+
+ - Impact\_MS: Resource Property ***ID***.
+
+ - 3000: Recourse Property ***Value***.
+
+
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that accessed the object. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Access Request Information:**
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were used by **Subject\\Security ID**. These access rights depend on **Object Type**. The following table contains information about the most common access rights for file system objects. Access rights for registry objects are often similar to file system objects, but the table contains a few notes about how they vary.
+
+| Access | Hex Value,
Schema Value | Description |
+|----------------------------------------------------------------------------------------|-----------------------------|---------------------|
+| ReadData (or ListDirectory)
(For registry objects, this is “Query key value.”) | 0x1,
%%4416 | **ReadData -** For a file object, the right to read the corresponding file data. For a directory object, the right to read the corresponding directory data.
**ListDirectory -** For a directory, the right to list the contents of the directory. |
+| WriteData (or AddFile)
(For registry objects, this is “Set key value.”) | 0x2,
%%4417 | **WriteData -** For a file object, the right to write data to the file. For a directory object, the right to create a file in the directory (**FILE\_ADD\_FILE**).
**AddFile -** For a directory, the right to create a file in the directory. |
+| AppendData (or AddSubdirectory or CreatePipeInstance) | 0x4,
%%4418 | **AppendData -** For a file object, the right to append data to the file. (For local files, write operations will not overwrite existing data if this flag is specified without **FILE\_WRITE\_DATA**.) For a directory object, the right to create a subdirectory (**FILE\_ADD\_SUBDIRECTORY**).
**AddSubdirectory -** For a directory, the right to create a subdirectory.
**CreatePipeInstance -** For a named pipe, the right to create a pipe. |
+| ReadEA
(For registry objects, this is “Enumerate sub-keys.”) | 0x8,
%%4419 | The right to read extended file attributes. |
+| WriteEA | 0x10,
%%4420 | The right to write extended file attributes. |
+| Execute/Traverse | 0x20,
%%4421 | **Execute** - For a native code file, the right to execute the file. This access right given to scripts may cause the script to be executable, depending on the script interpreter.
**Traverse -** For a directory, the right to traverse the directory. By default, users are assigned the **BYPASS\_TRAVERSE\_CHECKING** [privilege](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379306(v=vs.85).aspx), which ignores the **FILE\_TRAVERSE** [access right](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374902(v=vs.85).aspx). See the remarks in [File Security and Access Rights](https://msdn.microsoft.com/en-us/library/windows/desktop/aa364399(v=vs.85).aspx) for more information. |
+| DeleteChild | 0x40,
%%4422 | For a directory, the right to delete a directory and all the files it contains, including read-only files. |
+| ReadAttributes | 0x80,
%%4423 | The right to read file attributes. |
+| WriteAttributes | 0x100,
%%4424 | The right to write file attributes. |
+| DELETE | 0x10000,
%%1537 | The right to delete the object. |
+| READ\_CONTROL | 0x20000,
%%1538 | The right to read the information in the object's security descriptor, not including the information in the system access control list (SACL). |
+| WRITE\_DAC | 0x40000,
%%1539 | The right to modify the discretionary access control list (DACL) in the object's security descriptor. |
+| WRITE\_OWNER | 0x80000,
%%1540 | The right to change the owner in the object's security descriptor |
+| SYNCHRONIZE | 0x100000,
%%1541 | The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right. |
+| ACCESS\_SYS\_SEC | 0x1000000,
%%1542 | The ACCESS\_SYS\_SEC access right controls the ability to get or set the SACL in an object's security descriptor. |
+
+> Table 15. File System objects access rights.
+
+- **Access Mask** \[Type = HexInt32\]: hexadecimal mask for the requested or performed operation. For more information, see the preceding table.
+
+## Security Monitoring Recommendations
+
+For 4663(S): An attempt was made to access an object.
+
+For kernel objects, this event and other auditing events have little to no security relevance and are hard to parse or analyze. There is no recommendation for auditing them, unless you know exactly what you need to monitor at the Kernel objects level.
+
+For other types of objects, the following recommendations apply.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have critical file system objects for which you need to monitor all access attempts, monitor this event for **Object Name**.
+
+- If you have critical file system objects for which you need to monitor certain access attempts (for example, write actions), monitor this event for **Object Name** in relation to **Access Request Information\\Accesses**.
+
+- If you have file system objects with specific attributes, for which you need to monitor access attempts, monitor this event for **Resource Attributes**.
+
+- If **Object Name** is a sensitive or critical registry key for which you need to monitor specific access attempts (for example, only write actions), monitor for all [4663](event-4663.md) events with the corresponding **Access Request Information\\Accesses**.
+
+
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- For file system objects, we recommend that you monitor for these **Access Request Information\\Accesses** rights:
+
+ - WriteData (or AddFile)
+
+ - AppendData (or AddSubdirectory or CreatePipeInstance)
+
+ - WriteEA
+
+ - DeleteChild
+
+ - WriteAttributes
+
+ - DELETE
+
+ - WRITE\_DAC
+
+ - WRITE\_OWNER
+
diff --git a/windows/keep-secure/event-4664.md b/windows/keep-secure/event-4664.md
new file mode 100644
index 0000000000..4a4c04f599
--- /dev/null
+++ b/windows/keep-secure/event-4664.md
@@ -0,0 +1,109 @@
+---
+title: 4664(S) An attempt was made to create a hard link. (Windows 10)
+description: Describes security event 4664(S) An attempt was made to create a hard link.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4664(S): An attempt was made to create a hard link.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File System](audit-file-system.md)
+
+***Event Description:***
+
+This event generates when an NTFS hard link was successfully created.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4664
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+ 276680
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x43659
+ C:\\notepad.exe
+ C:\\Docs\\My.exe
+ {00000000-0000-0000-0000-000000000000}
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to create the hard link. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to create the hard link.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Link Information:**
+
+- **File Name** \[Type = UnicodeString\]**:** the name of a file or folder that new hard link refers to.
+
+- **Link Name** \[Type = UnicodeString\]**:** full path name with new hard link file name.
+
+- **Transaction ID** \[Type = GUID\]: unique GUID of the transaction. This field can help you correlate this event with other events that might contain the same **Transaction ID**, such as “[4660](event-4660.md)(S): An object was deleted.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+## Security Monitoring Recommendations
+
+For 4664(S): An attempt was made to create a hard link.
+
+- We recommend monitoring for any [4664](event-4664.md) event, because this action is not typical for normal operating system behavior and can be a sign of malicious activity.
+
diff --git a/windows/keep-secure/event-4670.md b/windows/keep-secure/event-4670.md
new file mode 100644
index 0000000000..5702cf1f4d
--- /dev/null
+++ b/windows/keep-secure/event-4670.md
@@ -0,0 +1,274 @@
+---
+title: 4670(S) Permissions on an object were changed. (Windows 10)
+description: Describes security event 4670(S) Permissions on an object were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4670(S): Permissions on an object were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Registry](audit-registry.md), [Audit Authentication Policy Change](audit-authentication-policy-change.md), and [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates when the permissions for an object are changed. The object could be a file system, registry, or security token object.
+
+This event does not generate if the [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) (Auditing ACL) was changed.
+
+Before this event can generate, certain ACEs might need to be set in the object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx). For example, for a file system object, it generates only if “Change Permissions" and/or "Take Ownership” are set in the object’s SACL. For a registry key, it generates only if “Write DAC" and/or "Write Owner” are set in the object’s SACL.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4670
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 269529
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x43659
+ Security
+ File
+ C:\\Documents\\netcat-1.11
+ 0x3f0
+ D:AI(A;OICIID;FA;;;S-1-5-21-3457937927-2839227994-823803824-2104)(A;OICIID;FA;;;S-1-5-21-3457937927-2839227994-823803824-1104)(A;OICIID;FA;;;SY)(A;OICIID;FA;;;BA)
+ D:ARAI(A;OICI;FA;;;WD)(A;OICIID;FA;;;S-1-5-21-3457937927-2839227994-823803824-2104)(A;OICIID;FA;;;S-1-5-21-3457937927-2839227994-823803824-1104)(A;OICIID;FA;;;SY)(A;OICIID;FA;;;BA)
+ 0xdb0
+ C:\\Windows\\System32\\dllhost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change object’s permissions” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change object’s permissions” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: name and other identifying information for the object for which permissions were changed. For example, for a file, the path would be included. For Token objects, this field typically equals “-“.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the permissions were changed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Permissions Change:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the old Security Descriptor Definition Language (SDDL) value for the object.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** the new Security Descriptor Definition Language (SDDL) value for the object.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4670(S): Permissions on an object were changed.
+
+For token objects, this is typically an informational event, and at the same time it is difficult to identify which token's permission were changed. For token objects, there are no monitoring recommendations for this event in this document.
+
+For file system and registry objects, the following recommendations apply.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If you have critical registry objects for which you need to monitor all modifications (especially permissions changes and owner changes), monitor for the specific **Object\\Object Name.**
+
+- If you have high-value computers for which you need to monitor all changes for all or specific objects (for example, file system or registry objects), monitor for all [4670](event-4670.md) events on these computers**.** For example, you could monitor the **ntds.dit** file on domain controllers.
+
diff --git a/windows/keep-secure/event-4671.md b/windows/keep-secure/event-4671.md
new file mode 100644
index 0000000000..9e39d86e0a
--- /dev/null
+++ b/windows/keep-secure/event-4671.md
@@ -0,0 +1,21 @@
+---
+title: 4671(-) An application attempted to access a blocked ordinal through the TBS. (Windows 10)
+description: Describes security event 4671(-) An application attempted to access a blocked ordinal through the TBS.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4671(-): An application attempted to access a blocked ordinal through the TBS.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system.
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
diff --git a/windows/keep-secure/event-4672.md b/windows/keep-secure/event-4672.md
new file mode 100644
index 0000000000..2d0ec716c2
--- /dev/null
+++ b/windows/keep-secure/event-4672.md
@@ -0,0 +1,149 @@
+---
+title: 4672(S) Special privileges assigned to new logon. (Windows 10)
+description: Describes security event 4672(S) Special privileges assigned to new logon.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4672(S): Special privileges assigned to new logon.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Special Logon](audit-special-logon.md)
+
+***Event Description:***
+
+This event generates for new account logons if any of the following sensitive privileges are assigned to the new logon session:
+
+- SeTcbPrivilege - Act as part of the operating system
+
+- SeBackupPrivilege - Back up files and directories
+
+- SeCreateTokenPrivilege - Create a token object
+
+- SeDebugPrivilege - Debug programs
+
+- SeEnableDelegationPrivilege - Enable computer and user accounts to be trusted for delegation
+
+- SeAuditPrivilege - Generate security audits
+
+- SeImpersonatePrivilege - Impersonate a client after authentication
+
+- SeLoadDriverPrivilege - Load and unload device drivers
+
+- SeSecurityPrivilege - Manage auditing and security log
+
+- SeSystemEnvironmentPrivilege - Modify firmware environment values
+
+- SeAssignPrimaryTokenPrivilege - Replace a process-level token
+
+- SeRestorePrivilege - Restore files and directories,
+
+- SeTakeOwnershipPrivilege - Take ownership of files or other objects
+
+You typically will see many of these events in the event log, because every logon of SYSTEM (Local System) account triggers this event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4672
+ 0
+ 0
+ 12548
+ 0
+ 0x8020000000000000
+
+ 237692
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x671101
+ SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeEnableDelegationPrivilege SeImpersonatePrivilege
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account to which special privileges were assigned. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account to which special privileges were assigned.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Privileges** \[Type = UnicodeString\]**:** the list of sensitive privileges, assigned to the new logon. The following table contains the list of possible privileges for this event:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|-------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+
+## Security Monitoring Recommendations
+
+For 4672(S): Special privileges assigned to new logon.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Monitor for this event where “**Subject\\Security ID**” is *not* one of these well-known security principals: LOCAL SYSTEM, NETWORK SERVICE, LOCAL SERVICE, and where “**Subject\\Security ID**” is not an administrative account that is expected to have the listed **Privileges**.
+
+- If you have a list of specific privileges which should never be granted, or granted only to a few accounts (for example, SeDebugPrivilege), use this event to monitor for those “**Privileges**.”
+
+
+
+- If you are required to monitor any of the sensitive privileges in the [Event Description for this event](event-4672.md), search for those specific privileges in the event.
+
diff --git a/windows/keep-secure/event-4673.md b/windows/keep-secure/event-4673.md
new file mode 100644
index 0000000000..2816879567
--- /dev/null
+++ b/windows/keep-secure/event-4673.md
@@ -0,0 +1,196 @@
+---
+title: 4673(S, F) A privileged service was called. (Windows 10)
+description: Describes security event 4673(S, F) A privileged service was called.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4673(S, F): A privileged service was called.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md) and [Audit Non Sensitive Privilege Use](audit-non-sensitive-privilege-use.md)
+
+***Event Description:***
+
+This event generates when an attempt was made to perform privileged system service operations.
+
+This event generates, for example, when **SeSystemtimePrivilege**, **SeCreateGlobalPrivilege**, or **SeTcbPrivilege** privilege was used.
+
+Failure event generates when service call attempt fails.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4673
+ 0
+ 0
+ 13056
+ 0
+ 0x8020000000000000
+
+ 1099777
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ NT Local Security Authority / Authentication Service
+ LsaRegisterLogonProcess()
+ SeTcbPrivilege
+ 0x1f0
+ C:\\Windows\\System32\\lsass.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested privileged operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested privileged operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Service**:
+
+- **Server** \[Type = UnicodeString\]: contains the name of the Windows subsystem calling the routine. Subsystems examples are:
+
+ - Security
+
+ - Security Account Manager
+
+ - NT Local Security Authority / Authentication Service
+
+ - SC Manager
+
+ - Win32 SystemShutdown module
+
+ - LSA
+
+- **Service Name** \[Type = UnicodeString\] \[Optional\]: supplies a name of the privileged subsystem service or function. For example, "RESET RUNTIME LOCAL SECURITY" might be specified by a **Local Security Authority** service used to update the local security policy database or **LsaRegisterLogonProcess()** might be specified by a **NT Local Security Authority / Authentication Service** used to register new logon process.
+
+**Process:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted to call the privileged service. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Service Request Information**:
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were requested. The possible privileges depend on the subcategory, either **Audit Non Sensitive Privilege Use** or **Audit Sensitive Privilege Use**, as shown in the following two tables:
+
+| **Subcategory of event** | **Privilege Name:
User Right Group Policy Name** | **Description** |
+|-----------------------------------|----------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Audit Non Sensitive Privilege Use | **SeChangeNotifyPrivilege:
**Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| Audit Non Sensitive Privilege Use | **SeCreateGlobalPrivilege:
**Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| Audit Non Sensitive Privilege Use | **SeCreatePagefilePrivilege:
**Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| Audit Non Sensitive Privilege Use | **SeCreatePermanentPrivilege:
**Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| Audit Non Sensitive Privilege Use | **SeCreateSymbolicLinkPrivilege:
**Create symbolic links | Required to create a symbolic link. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseBasePriorityPrivilege:
**Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseQuotaPrivilege:
**Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseWorkingSetPrivilege:
**Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| Audit Non Sensitive Privilege Use | **SeLockMemoryPrivilege:
**Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| Audit Non Sensitive Privilege Use | **SeMachineAccountPrivilege:
**Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| Audit Non Sensitive Privilege Use | **SeManageVolumePrivilege:
**Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| Audit Non Sensitive Privilege Use | **SeProfileSingleProcessPrivilege:
**Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| Audit Non Sensitive Privilege Use | **SeRelabelPrivilege:
**Modify an object label | Required to modify the mandatory integrity level of an object. |
+| Audit Non Sensitive Privilege Use | **SeRemoteShutdownPrivilege:
**Force shutdown from a remote system | Required to shut down a system using a network request. |
+| Audit Non Sensitive Privilege Use | **SeShutdownPrivilege:
**Shut down the system | Required to shut down a local system. |
+| Audit Non Sensitive Privilege Use | **SeSyncAgentPrivilege:
**Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| Audit Non Sensitive Privilege Use | **SeSystemProfilePrivilege:
**Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| Audit Non Sensitive Privilege Use | **SeSystemtimePrivilege:
**Change the system time | Required to modify the system time. With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs.
If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| Audit Non Sensitive Privilege Use | **SeTimeZonePrivilege:
**Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| Audit Non Sensitive Privilege Use | **SeTrustedCredManAccessPrivilege:
**Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| Audit Non Sensitive Privilege Use | **SeUndockPrivilege:
**Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+
+| **Subcategory of event** | **Privilege Name:
User Right Group Policy Name** | **Description** |
+|-------------------------------|-----------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Audit Sensitive Privilege Use | **SeAssignPrimaryTokenPrivilege:
**Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process. With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| Audit Sensitive Privilege Use | **SeAuditPrivilege:
**Generate security audits | With this privilege, the user can add entries to the security log. |
+| Audit Sensitive Privilege Use | **SeCreateTokenPrivilege:
**Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs. When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| Audit Sensitive Privilege Use | **SeDebugPrivilege:
**Debug programs | Required to debug and adjust the memory of a process owned by another account. With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| Audit Sensitive Privilege Use | **SeImpersonatePrivilege:
**Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| Audit Sensitive Privilege Use | **SeLoadDriverPrivilege:
**Load and unload device drivers | Required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| Audit Sensitive Privilege Use | **SeLockMemoryPrivilege:
**Lock pages in memory | Required to lock physical pages in memory. With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| Audit Sensitive Privilege Use | **SeSystemEnvironmentPrivilege:
**Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| Audit Sensitive Privilege Use | **SeTcbPrivilege:
**Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base. This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| Audit Sensitive Privilege Use | **SeEnableDelegationPrivilege:
**Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation. With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+
+## Security Monitoring Recommendations
+
+For 4673(S, F): A privileged service was called.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Monitor for this event where “**Subject\\Security ID**” is *not* one of these well-known security principals: LOCAL SYSTEM, NETWORK SERVICE, LOCAL SERVICE, and where “**Subject\\Security ID**” is not an administrative account that is expected to have the listed **Privileges**. Especially monitor Failure events.
+
+- If you need to monitor events related to specific Windows subsystems (“**Service\\Server**”), for example **NT Local Security Authority / Authentication Service** or **Security Account Manager**, monitor this event for the corresponding “**Service\\Server**.”
+
+- If you need to monitor events related to specific Windows security services or functions (“**Service\\Service Name**”), for example **LsaRegisterLogonProcess()**, monitor this event for the corresponding “**Service\\Service Name**.”
+
+
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- For a specific “**Subject\\Security ID**,” if there is a defined list of allowed privileges, monitor for “**Privileges**” that it should not be able to use.
+
+- If you have a list of specific user rights which should never be used, or used only by a few accounts (for example, SeDebugPrivilege), trigger an alert for those “**Privileges**.”
+
+- If you have a list of specific user rights for which every use must be reported or monitored (for example, SeRemoteShutdownPrivilege), trigger an alert for those “**Privileges**.”
+
diff --git a/windows/keep-secure/event-4674.md b/windows/keep-secure/event-4674.md
new file mode 100644
index 0000000000..3693ca894f
--- /dev/null
+++ b/windows/keep-secure/event-4674.md
@@ -0,0 +1,224 @@
+---
+title: 4674(S, F) An operation was attempted on a privileged object. (Windows 10)
+description: Describes security event 4674(S, F) An operation was attempted on a privileged object.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4674(S, F): An operation was attempted on a privileged object.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md) and [Audit Non Sensitive Privilege Use](audit-non-sensitive-privilege-use.md)
+
+***Event Description:***
+
+This event generates when an attempt is made to perform privileged operations on a protected subsystem object after the object is already opened.
+
+This event generates, for example, when SeShutdownPrivilege, SeRemoteShutdownPrivilege, or SeSecurityPrivilege is used.
+
+Failure event generates when operation attempt fails.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4674
+ 0
+ 0
+ 13056
+ 0
+ 0x8010000000000000
+
+ 1099680
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ LSA
+ -
+ -
+ 0x0
+ 16777216
+ SeSecurityPrivilege
+ 0x1f0
+ C:\\Windows\\System32\\lsass.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested privileged operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested privileged operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\] \[Optional\]: Contains the name of the Windows subsystem calling the routine. Subsystems examples are:
+
+ - Security
+
+ - Security Account Manager
+
+ - NT Local Security Authority / Authentication Service
+
+ - SC Manager
+
+ - Win32 SystemShutdown module
+
+ - LSA
+
+- **Object Type** \[Type = UnicodeString\] \[Optional\]: The type of an object that was accessed during the operation.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | SC\_MANAGER OBJECT |
+| Key | WaitablePort | Callback | |
+| Job | Port | FilterConnectionPort | |
+| ALPC Port | Semaphore | Adapter | |
+
+- **Object Name** \[Type = UnicodeString\] \[Optional\]: the name of the object that was accessed during the operation.
+
+- **Object Handle** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “4656: A handle to an object was requested” event in appropriate/other subcategory. This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted the operation on the privileged object. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Requested Operation**:
+
+- **Desired Access** \[Type = UnicodeString\]: The desired access mask. This mask depends on **Object Server** and **Object Type** parameters values. The value of this parameter is in decimal format. There is no detailed information about this parameter in this document. If **Desired Access** is not presented, then this parameter will have “**0**” value.
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were requested. The possible privileges depend on the subcategory, either **Audit Non Sensitive Privilege Use** or **Audit Sensitive Privilege Use**, as shown in the following two tables:
+
+| **Subcategory of event** | **Privilege Name:
User Right Group Policy Name** | **Description** |
+|-----------------------------------|----------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Audit Non Sensitive Privilege Use | **SeChangeNotifyPrivilege:
**Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| Audit Non Sensitive Privilege Use | **SeCreateGlobalPrivilege:
**Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| Audit Non Sensitive Privilege Use | **SeCreatePagefilePrivilege:
**Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| Audit Non Sensitive Privilege Use | **SeCreatePermanentPrivilege:
**Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| Audit Non Sensitive Privilege Use | **SeCreateSymbolicLinkPrivilege:
**Create symbolic links | Required to create a symbolic link. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseBasePriorityPrivilege:
**Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseQuotaPrivilege:
**Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| Audit Non Sensitive Privilege Use | **SeIncreaseWorkingSetPrivilege:
**Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| Audit Non Sensitive Privilege Use | **SeLockMemoryPrivilege:
**Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| Audit Non Sensitive Privilege Use | **SeMachineAccountPrivilege:
**Add workstations to domain | With this privilege, the user can create a computer account. This privilege is valid only on domain controllers. |
+| Audit Non Sensitive Privilege Use | **SeManageVolumePrivilege:
**Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| Audit Non Sensitive Privilege Use | **SeProfileSingleProcessPrivilege:
**Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| Audit Non Sensitive Privilege Use | **SeRelabelPrivilege:
**Modify an object label | Required to modify the mandatory integrity level of an object. |
+| Audit Non Sensitive Privilege Use | **SeRemoteShutdownPrivilege:
**Force shutdown from a remote system | Required to shut down a system using a network request. |
+| Audit Non Sensitive Privilege Use | **SeShutdownPrivilege:
**Shut down the system | Required to shut down a local system. |
+| Audit Non Sensitive Privilege Use | **SeSyncAgentPrivilege:
**Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| Audit Non Sensitive Privilege Use | **SeSystemProfilePrivilege:
**Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| Audit Non Sensitive Privilege Use | **SeSystemtimePrivilege:
**Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| Audit Non Sensitive Privilege Use | **SeTimeZonePrivilege:
**Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| Audit Non Sensitive Privilege Use | **SeTrustedCredManAccessPrivilege:
**Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| Audit Non Sensitive Privilege Use | **SeUndockPrivilege:
**Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+
+| **Subcategory of event** | **Privilege Name:
User Right Group Policy Name** | **Description** |
+|-------------------------------|----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Audit Sensitive Privilege Use | **SeAssignPrimaryTokenPrivilege:
**Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| Audit Sensitive Privilege Use | **SeAuditPrivilege:
**Generate security audits | With this privilege, the user can add entries to the security log. |
+| Audit Sensitive Privilege Use | **SeBackupPrivilege:
**Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system. This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL.
The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| Audit Sensitive Privilege Use | **SeCreateTokenPrivilege:
**Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| Audit Sensitive Privilege Use | **SeDebugPrivilege:
**Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right.
This user right provides complete access to sensitive and critical operating system components. |
+| Audit Sensitive Privilege Use | **SeImpersonatePrivilege:
**Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| Audit Sensitive Privilege Use | **SeLoadDriverPrivilege:
**Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| Audit Sensitive Privilege Use | **SeLockMemoryPrivilege:
**Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| Audit Sensitive Privilege Use | **SeRestorePrivilege:
**Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| Audit Sensitive Privilege Use | **SeSecurityPrivilege:
**Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. A user with this privilege can also view and clear the security log. |
+| Audit Sensitive Privilege Use | **SeSystemEnvironmentPrivilege:
**Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| Audit Sensitive Privilege Use | **SeTakeOwnershipPrivilege:
**Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+
+## Security Monitoring Recommendations
+
+For 4674(S, F): An operation was attempted on a privileged object.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Monitor for this event where “**Subject\\Security ID**” is *not* one of these well-known security principals: LOCAL SYSTEM, NETWORK SERVICE, LOCAL SERVICE, and where “**Subject\\Security ID**” is not an administrative account that is expected to have the listed **Privileges**. Especially monitor Failure events.
+
+
+
+- If you need to monitor events related to specific Windows subsystems (“**Object Server**”), for example **LSA** or **Security Account Manager**, monitor this event for the corresponding “**Object Server**.”
+
+- If you need to monitor events related to specific Windows object types (“**Object Type**”), for example **File** or **Key**, monitor this event for the corresponding “**Object Type**.”
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+
+
+- If you know that specific “**Subject\\Security ID**” should only be able to use the privileges in a pre-defined list, monitor for events in which “**Subject\\Security ID**” used “**Privileges**” that are not on that list.
+
+
+
+- If you have a list of specific user rights which should never be used, or used only by a few accounts (for example, SeDebugPrivilege), trigger an alert for those “**Privileges**.”
+
+- If you have a list of specific user rights for which every use must be reported or monitored (for example, SeRemoteShutdownPrivilege), trigger an alert for those “**Privileges**.”
+
diff --git a/windows/keep-secure/event-4675.md b/windows/keep-secure/event-4675.md
new file mode 100644
index 0000000000..de11244f51
--- /dev/null
+++ b/windows/keep-secure/event-4675.md
@@ -0,0 +1,61 @@
+---
+title: 4675(S) SIDs were filtered. (Windows 10)
+description: Describes security event 4675(S) SIDs were filtered.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4675(S): SIDs were filtered.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when SIDs were filtered for specific Active Directory trust.
+
+See more information about SID filtering here: .
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Logon](audit-logon.md)
+
+***Event Schema:***
+
+*SIDs were filtered.*
+
+*Target Account:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+
+*Trust Information:*
+
+> *Trust Direction:%4*
+>
+> *Trust Attributes:%5*
+>
+> *Trust Type:%6*
+>
+> *TDO Domain SID:%7*
+>
+> *Filtered SIDs:%8*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- If you need to monitor all SID filtering events/operations for specific or all Active Directory trusts, you can use this event to get all required information.
+
diff --git a/windows/keep-secure/event-4688.md b/windows/keep-secure/event-4688.md
new file mode 100644
index 0000000000..9c62824cd3
--- /dev/null
+++ b/windows/keep-secure/event-4688.md
@@ -0,0 +1,212 @@
+---
+title: 4688(S) A new process has been created. (Windows 10)
+description: Describes security event 4688(S) A new process has been created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4688(S): A new process has been created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Process Creation](audit-process-creation.md)
+
+***Event Description:***
+
+This event generates every time a new process starts.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+ 2814
+
+
+ Security
+ WIN-GG82ULGC9GO.contoso.local
+
+
+-
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ CONTOSO
+ 0x3e7
+ 0x2bc
+ C:\\Windows\\System32\\rundll32.exe
+ %%1938
+ 0xe74
+
+ S-1-5-21-1377283216-344919071-3415362939-1104
+ dadmin
+ CONTOSO
+ 0x4a5af0
+ C:\\Windows\\explorer.exe
+ S-1-16-8192
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+- 1 - Windows Server 2012 R2, Windows 8.1.
+
+ - Added “Process Command Line” field.
+
+- 2 - Windows 10.
+
+ - **Subject** renamed to **Creator Subject**.
+
+ - Added “**Target Subject**” section.
+
+ - Added “**Mandatory Label**” field.
+
+ - Added “**Creator Process Name**” field.
+
+***Field Descriptions:***
+
+**Creator Subject** \[Value for versions 0 and 1 – **Subject**\]**:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create process” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create process” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Subject** \[Version 2\]**:**
+
+> **Note** This event includes the principal of the process creator, but this is not always sufficient if the target context is different from the creator context. In that situation, the subject specified in the process termination event does not match the subject in the process creation event even though both events refer to the same process ID. Therefore, in addition to including the creator of the process, we will also include the target principal when the creator and target do not share the same logon.
+
+- **Security ID** \[Type = SID\] \[Version 2\]**:** SID of target account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\] \[Version 2\]**:** the name of the target account.
+
+- **Account Domain** \[Type = UnicodeString\] \[Version 2\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\] \[Version 2\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information:**
+
+- **New Process ID** \[Type = Pointer\]: hexadecimal Process ID of the new process. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+> If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+- **New Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the new process.
+
+- **Token Elevation Type** \[Type = UnicodeString\]**: **
+
+ - **TokenElevationTypeDefault (1):** Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account (for which UAC disabled by default), service account or local system account.
+
+ - **TokenElevationTypeFull (2):** Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
+
+ - **TokenElevationTypeLimited (3):** Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
+
+- **Mandatory Label** \[Version 2\] \[Type = SID\]**:** SID of [integrity label](https://msdn.microsoft.com/en-us/library/windows/desktop/bb648648(v=vs.85).aspx) which was assigned to the new process. Can have one of the following values:
+
+| SID | RID | RID label | Meaning |
+|--------------|------------|----------------------------------------------|------------------------|
+| S-1-16-0 | 0x00000000 | SECURITY\_MANDATORY\_UNTRUSTED\_RID | Untrusted. |
+| S-1-16-4096 | 0x00001000 | SECURITY\_MANDATORY\_LOW\_RID | Low integrity. |
+| S-1-16-8192 | 0x00002000 | SECURITY\_MANDATORY\_MEDIUM\_RID | Medium integrity. |
+| S-1-16-8448 | 0x00002100 | SECURITY\_MANDATORY\_MEDIUM\_PLUS\_RID | Medium high integrity. |
+| S-1-16-12288 | 0X00003000 | SECURITY\_MANDATORY\_HIGH\_RID | High integrity. |
+| S-1-16-16384 | 0x00004000 | SECURITY\_MANDATORY\_SYSTEM\_RID | System integrity. |
+| S-1-16-20480 | 0x00005000 | SECURITY\_MANDATORY\_PROTECTED\_PROCESS\_RID | Protected process. |
+
+- **Creator Process ID** \[Type = Pointer\]**:** hexadecimal Process ID of the process which ran the new process. If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+> You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Creator Process Name** \[Version 2\] \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+- **Process Command Line** \[Version 1, 2\] \[Type = UnicodeString\]**:** contains the name of executable and arguments which were passed to it. You must enable “Administrative Templates\\System\\Audit Process Creation\\Include command line in process creation events” group policy to include command line in process creation events:
+
+
+
+ By default **Process Command Line** field is empty.
+
+## Security Monitoring Recommendations
+
+For 4688(S): A new process has been created.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor all events with the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor all events with the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Creator Subject\\Security ID”** and **“Target Subject\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor the specific events for the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** for names that don’t comply with naming conventions. |
+
+- If you have a pre-defined “**New** **Process Name**” or **“Creator Process Name**” for the process reported in this event, monitor all events with “**New** **Process Name**” or **“Creator Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**New** **Process Name**” or **“Creator Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example “**mimikatz**” or “**cain.exe**”), check for these substrings in “**New** **Process Name**” or **“Creator Process Name**.”
+
+- It can be unusual for a process to run using a local account in either **Creator Subject\\Security ID** or in **Target** **Subject\\Security ID**.
+
+- Monitor for **Token Elevation Type** with value **TokenElevationTypeDefault (1)** when **Subject\\Security ID** lists a real user account, for example when **Account Name** doesn’t contain the $ symbol**.** Typically this means that UAC is disabled for this account for some reason.
+
+- Monitor for **Token Elevation Type** with value **TokenElevationTypeDefault (2)** on standard workstations, when **Subject\\Security ID** lists a real user account, for example when **Account Name** doesn’t contain the $ symbol**.** This means that a user ran a program using administrative privileges.
+
+- You can also monitor for **Token Elevation Type** with value **TokenElevationTypeDefault (2)** on standard workstations, when a computer object was used to run the process, but that computer object is not the same computer where the event occurs.
+
+- If you need to monitor all new processes with a specific Mandatory Label, for example S-1-16-20480 (Protected process), check the “**Mandatory Label**” in this event.
+
diff --git a/windows/keep-secure/event-4689.md b/windows/keep-secure/event-4689.md
new file mode 100644
index 0000000000..9acfebcd83
--- /dev/null
+++ b/windows/keep-secure/event-4689.md
@@ -0,0 +1,119 @@
+---
+title: 4689(S) A process has exited. (Windows 10)
+description: Describes security event 4689(S) A process has exited.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4689(S): A process has exited.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Process Termination](audit-process-termination.md)
+
+***Event Description:***
+
+This event generates every time a process has exited.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4689
+ 0
+ 0
+ 13313
+ 0
+ 0x8020000000000000
+
+ 187030
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x31365
+ 0x0
+ 0xfb0
+ C:\\Windows\\System32\\notepad.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “terminate process” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “terminate process” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the ended/terminated process. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md)(S): A new process has been created” **New Process ID** on this computer.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the executable name of the exited/terminated process.
+
+- **Exit Status** \[Type = HexInt32\]**:** hexadecimal exit code of exited/terminated process. This exit code is unique for every application, check application documentation for more details. The exit code value for a process reflects the specific convention implemented by the application developer for that process.
+
+## Security Monitoring Recommendations
+
+For 4689(S): A process has exited.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If you have a critical processes list for the computer, with the requirement that these processes must always run and not stop, you can monitor **Process Name** field in [4689](event-4689.md) events for these process names.
+
diff --git a/windows/keep-secure/event-4690.md b/windows/keep-secure/event-4690.md
new file mode 100644
index 0000000000..c96c508880
--- /dev/null
+++ b/windows/keep-secure/event-4690.md
@@ -0,0 +1,118 @@
+---
+title: 4690(S) An attempt was made to duplicate a handle to an object. (Windows 10)
+description: Describes security event 4690(S) An attempt was made to duplicate a handle to an object.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4690(S): An attempt was made to duplicate a handle to an object.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Handle Manipulation](audit-handle-manipulation.md)
+
+***Event Description:***
+
+This event generates if an attempt was made to duplicate a handle to an object.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4690
+ 0
+ 0
+ 12807
+ 0
+ 0x8020000000000000
+
+ 338632
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ 0x438
+ 0x674
+ 0xd9c
+ 0x4
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to duplicate a handle to an object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to duplicate a handle to an object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Source Handle Information:**
+
+- **Source Handle ID** \[Type = Pointer\]: hexadecimal value of a handle which was duplicated. This field can help you correlate this event with other events, for example “4663: An attempt was made to access an object” in [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), [Audit Removable Storage](audit-removable-storage.md) or [Audit SAM](audit-sam.md) subcategories.
+
+- **Source Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which opened the **Source Handle ID** before it was duplicated. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+**New Handle Information:**
+
+- **Target Handle ID** \[Type = Pointer\]: hexadecimal value of the new handle (the copy of **Source Handle ID**). This field can help you correlate this event with other events, for example “4663: An attempt was made to access an object” in [Audit File System](audit-file-system.md), [Audit Kernel Object](audit-kernel-object.md), [Audit Registry](audit-registry.md), [Audit Removable Storage](audit-removable-storage.md) or [Audit SAM](audit-sam.md) subcategories.
+
+- **Target Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which opened the **Target Handle ID**. Process ID (PID) is a number used by the operating system to uniquely identify an active process. You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID** field.
+
+## Security Monitoring Recommendations
+
+For 4690(S): An attempt was made to duplicate a handle to an object.
+
+- Typically this event has little to no security relevance and is hard to parse or analyze. There is no recommendation for this event, unless you know exactly what you need to monitor with it.
+
+- This event can be used to track all actions or operations related to a specific object handle.
+
diff --git a/windows/keep-secure/event-4691.md b/windows/keep-secure/event-4691.md
new file mode 100644
index 0000000000..ed50802c98
--- /dev/null
+++ b/windows/keep-secure/event-4691.md
@@ -0,0 +1,135 @@
+---
+title: 4691(S) Indirect access to an object was requested. (Windows 10)
+description: Describes security event 4691(S) Indirect access to an object was requested.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4691(S): Indirect access to an object was requested.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event indicates that indirect access to an object was requested.
+
+These events are generated for [ALPC Ports](https://msdn.microsoft.com/en-us/library/windows/desktop/aa964738(v=vs.85).aspx) access request actions.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4691
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344382
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x36509
+ ALPC Port
+ \\Sessions\\2\\Windows\\DwmApiPort
+ %%4464
+ 0x1
+ 0xe60
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested an access to the object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested an access to the object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object for which access was requested.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: full path and name of the object for which access was requested.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the access was requested. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+**Access Request Information:**
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were requested by **Subject\\Security ID**. These access rights depend on **Object Type**. “Table 13. File access codes.” contains information about the most common access rights for file system objects. For information about ALPC ports access rights, use or other informational resources.
+
+- **Access Mask** \[Type = HexInt32\]: hexadecimal mask for the operation that was requested or performed. See “Table 13. File access codes.” for more information about file access rights. For information about ALPC ports access rights, use or other informational resources.
+
+## Security Monitoring Recommendations
+
+For 4691(S): Indirect access to an object was requested.
+
+- Typically this event has little to no security relevance and is hard to parse or analyze. There is no recommendation for this event, unless you know exactly what you need to monitor with ALPC Ports.
+
diff --git a/windows/keep-secure/event-4692.md b/windows/keep-secure/event-4692.md
new file mode 100644
index 0000000000..a298a2a73e
--- /dev/null
+++ b/windows/keep-secure/event-4692.md
@@ -0,0 +1,126 @@
+---
+title: 4692(S, F) Backup of data protection master key was attempted. (Windows 10)
+description: Describes security event 4692(S, F) Backup of data protection master key was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4692(S, F): Backup of data protection master key was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit DPAPI Activity](audit-dpapi-activity.md)
+
+***Event Description:***
+
+This event generates every time that a backup is attempted for the [DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx) Master Key.
+
+When a computer is a member of a domain, DPAPI has a backup mechanism to allow unprotection of the data. When a Master Key is generated, DPAPI communicates with a domain controller. Domain controllers have a domain-wide public/private key pair, associated solely with DPAPI. The local DPAPI client gets the domain controller public key from a domain controller by using a mutually authenticated and privacy protected RPC call. The client encrypts the Master Key with the domain controller public key. It then stores this backup Master Key along with the Master Key protected by the user's password.
+
+Periodically, a domain-joined machine will try to send an RPC request to a domain controller to back up the user’s master key so that the user can recover secrets in case his or her password has to be reset. Although the user's keys are stored in the user profile, a domain controller must be contacted to encrypt the master key with a domain recovery key.
+
+This event also generates every time a new DPAPI Master Key is generated, for example.
+
+This event generates on domain controllers, member servers, and workstations.
+
+Failure event generates when a Master Key backup operation fails for some reason.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4692
+ 0
+ 0
+ 13314
+ 0
+ 0x8020000000000000
+
+ 176964
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-500
+ ladmin
+ CONTOSO
+ 0x30c08
+ 16cfaea0-dbe3-4d92-9523-d494edb546bc
+
+ 806a0350-aeb1-4c56-91f9-ef16cf759291
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested backup operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested backup operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Key Information:**
+
+- **Key Identifier** \[Type = UnicodeString\]: unique identifier of a master key which backup was created. The Master Key is used, with some additional data, to generate an actual symmetric session key to encrypt\\decrypt the data using DPAPI. All of user's Master Keys are located in user profile -> %APPDATA%\\Roaming\\Microsoft\\Windows\\Protect\\%SID% folder. The name of every Master Key file is it’s ID.
+
+- **Recovery Server** \[Type = UnicodeString\]: the name (typically – DNS name) of the computer that you contacted to back up your Master Key. For domain joined machines, it’s typically a name of a domain controller. This parameter might not be captured in the event, and in that case will be empty.
+
+- **Recovery Key ID** \[Type = UnicodeString\]**:** unique identifier of a recovery key. The recovery key is generated when a user chooses to create a Password Reset Disk (PRD) from the user's Control Panel or when first Master Key is generated. First, DPAPI generates a RSA public/private key pair, which is the recovery key. In this field you will see unique Recovery key ID which was used for Master key backup operation.
+
+ For Failure events this field is typically empty.
+
+**Status Information:**
+
+- **Status Code** \[Type = HexInt32\]**:** hexadecimal unique status code of performed operation. For Success events this field is typically “**0x0**”. To see the meaning of status code you need to convert it to decimal value and us “**net helpmsg STATUS\_CODE**” command to see the description for specific STATUS\_CODE. Here is an example of “net helpmsg” command output for status code 0x3A:
+
+> \[Net helpmsg 58 illustration](images/net-helpmsg-58.png)
+
+## Security Monitoring Recommendations
+
+For 4692(S, F): Backup of data protection master key was attempted.
+
+- This event is typically an informational event and it is difficult to detect any malicious activity using this event. It’s mainly used for DPAPI troubleshooting.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
diff --git a/windows/keep-secure/event-4693.md b/windows/keep-secure/event-4693.md
new file mode 100644
index 0000000000..21b507d0f4
--- /dev/null
+++ b/windows/keep-secure/event-4693.md
@@ -0,0 +1,127 @@
+---
+title: 4693(S, F) Recovery of data protection master key was attempted. (Windows 10)
+description: Describes security event 4693(S, F) Recovery of data protection master key was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4693(S, F): Recovery of data protection master key was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit DPAPI Activity](audit-dpapi-activity.md)
+
+***Event Description:***
+
+This event generates every time that recovery is attempted for a [DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx) Master Key.
+
+While unprotecting data, if DPAPI cannot use the Master Key protected by the user's password, it sends the backup Master Key to a domain controller by using a mutually authenticated and privacy protected RPC call. The domain controller then decrypts the Master Key with its private key and sends it back to the client by using the same protected RPC call. This protected RPC call is used to ensure that no one listening on the network can get the Master Key.
+
+This event generates on domain controllers, member servers, and workstations.
+
+Failure event generates when a Master Key restore operation fails for some reason.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4693
+ 0
+ 0
+ 13314
+ 0
+ 0x8020000000000000
+
+ 175809
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d7c
+ 0445c766-75f0-4de7-82ad-d9d97aad59f6
+ 0x5c005c
+ DC01.contoso.local
+
+ 0x380000
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “recover” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “recover” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Key Information:**
+
+- **Key Identifier** \[Type = UnicodeString\]**:** unique identifier of a master key which was recovered. The Master Key is used, with some additional data, to generate an actual symmetric session key to encrypt\\decrypt the data using DPAPI. All of user's Master Keys are located in user profile -> %APPDATA%\\Roaming\\Microsoft\\Windows\\Protect\\%SID% folder. The name of every Master Key file is it’s ID.
+
+- **Recovery Server** \[Type = UnicodeString\]: the name (typically – DNS name) of the computer that you contacted to recover your Master Key. For domain joined machines, it’s typically a name of a domain controller.
+
+> **Note** In this event Recovery Server field contains information from Recovery Reason field.
+
+- **Recovery Key ID** \[Type = UnicodeString\]**:** unique identifier of a recovery key. The recovery key is generated when a user chooses to create a Password Reset Disk (PRD) from the user's Control Panel or when first Master Key is generated. First, DPAPI generates a RSA public/private key pair, which is the recovery key. In this field you will see unique Recovery key ID which was used for Master key recovery operation. This parameter might not be captured in the event, and in that case will be empty.
+
+- **Recovery Reason** \[Type = HexInt32\]: hexadecimal code of recovery reason.
+
+> **Note** In this event Recovery Reason field contains information from Recovery Server field.
+
+**Status Information:**
+
+- **Status Code** \[Type = HexInt32\]**:** hexadecimal unique status code. For Success events this field is typically “**0x380000**”.
+
+## Security Monitoring Recommendations
+
+For 4693(S, F): Recovery of data protection master key was attempted.
+
+- This event is typically an informational event and it is difficult to detect any malicious activity using this event. It’s mainly used for DPAPI troubleshooting.
+
+- For domain joined computers, **Recovery Reason** should typically be a domain controller DNS name.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
diff --git a/windows/keep-secure/event-4694.md b/windows/keep-secure/event-4694.md
new file mode 100644
index 0000000000..930eef2a3b
--- /dev/null
+++ b/windows/keep-secure/event-4694.md
@@ -0,0 +1,63 @@
+---
+title: 4694(S, F) Protection of auditable protected data was attempted. (Windows 10)
+description: Describes security event 4694(S, F) Protection of auditable protected data was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4694(S, F): Protection of auditable protected data was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates if [DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx) [**CryptProtectData**](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380261(v=vs.85).aspx)() function was used with **CRYPTPROTECT\_AUDIT** flag (dwFlags) enabled.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit DPAPI Activity](audit-dpapi-activity.md)
+
+***Event Schema:***
+
+*Protection of auditable protected data was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Protected Data:*
+
+> *Data Description:%6*
+>
+> *Key Identifier:%5*
+>
+> *Protected Data Flags:%7*
+>
+> *Protection Algorithms:%8*
+
+*Status Information:*
+
+> *Status Code:%9*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
+- This event is typically an informational event and it is difficult to detect any malicious activity using this event. It’s mainly used for DPAPI troubleshooting.
+
diff --git a/windows/keep-secure/event-4695.md b/windows/keep-secure/event-4695.md
new file mode 100644
index 0000000000..ce3643a78f
--- /dev/null
+++ b/windows/keep-secure/event-4695.md
@@ -0,0 +1,63 @@
+---
+title: 4695(S, F) Unprotection of auditable protected data was attempted. (Windows 10)
+description: Describes security event 4695(S, F) Unprotection of auditable protected data was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4695(S, F): Unprotection of auditable protected data was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates if [DPAPI](https://msdn.microsoft.com/en-us/library/ms995355.aspx) [CryptUnprotectData](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380882(v=vs.85).aspx)() function was used to unprotect “auditable” data that was encrypted using [**CryptProtectData**](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380261(v=vs.85).aspx)() function with **CRYPTPROTECT\_AUDIT** flag (dwFlags) enabled.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit DPAPI Activity](audit-dpapi-activity.md)
+
+***Event Schema:***
+
+*Unprotection of auditable protected data was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Protected Data:*
+
+> *Data Description:%6*
+>
+> *Key Identifier:%5*
+>
+> *Protected Data Flags:%7*
+>
+> *Protection Algorithms:%8*
+
+*Status Information:*
+
+> *Status Code:%9*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
+- This event is typically an informational event and it is difficult to detect any malicious activity using this event. It’s mainly used for DPAPI troubleshooting.
+
diff --git a/windows/keep-secure/event-4696.md b/windows/keep-secure/event-4696.md
new file mode 100644
index 0000000000..5ef396c31e
--- /dev/null
+++ b/windows/keep-secure/event-4696.md
@@ -0,0 +1,163 @@
+---
+title: 4696(S) A primary token was assigned to process. (Windows 10)
+description: Describes security event 4696(S) A primary token was assigned to process.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4696(S): A primary token was assigned to process.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Process Creation](audit-process-creation.md)
+
+***Event Description:***
+
+This event generates every time a process runs using the non-current access token, for example, UAC elevated token, RUN AS different user actions, scheduled task with defined user, services, and so on.
+
+***IMPORTANT*:** this event is deprecated starting from Windows 7 and Windows 2008 R2.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4696
+ 0
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+ 561
+
+
+ Security
+ Win2008.contoso.local
+
+
+-
+ S-1-5-18
+ WIN2008$
+ CONTOSO
+ 0x3e7
+ S-1-5-18
+ dadmin
+ CONTOSO
+ 0x1c8c5
+ 0xf40
+ C:\\Windows\\System32\\WerFault.exe
+ 0x698
+ C:\\Windows\\System32\\svchost.exe
+
+
+
+```
+
+***Required Server Roles:*** this event is deprecated starting from Windows 7 and Windows 2008 R2.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “assign token to process” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “assign token to process” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which started the new process with the new security token. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]: full path and the name of the executable for the process which ran the new process with new security token.
+
+**Target Process:**
+
+- **Target Process ID** \[Type = Pointer\]**:** hexadecimal Process ID of the new process with new security token. If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+> You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Target Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the new process.
+
+**New Token Information:**
+
+- **Security ID** \[Type = SID\]**:** SID of account through which the security token will be assigned to the new process. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account through which the security token will be assigned to the new process.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+## Security Monitoring Recommendations
+
+For 4696(S): A primary token was assigned to process.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and **“New Token Information\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor **“Subject\\Security ID”** or **“New Token Information\\Security ID”** for names that don’t comply with naming conventions. |
+
+- If you have a pre-defined “**Process Name**” or “**Target Process Name**” for the process reported in this event, monitor all events with “**Process Name**” or “**Target Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” or “**Target Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**” or “**Target Process Name**”.
+
+- It can be uncommon if process runs using local account.
+
diff --git a/windows/keep-secure/event-4697.md b/windows/keep-secure/event-4697.md
new file mode 100644
index 0000000000..b5bd6dc109
--- /dev/null
+++ b/windows/keep-secure/event-4697.md
@@ -0,0 +1,156 @@
+---
+title: 4697(S) A service was installed in the system. (Windows 10)
+description: Describes security event 4697(S) A service was installed in the system.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4697(S): A service was installed in the system.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security System Extension](audit-security-system-extension.md)
+
+***Event Description:***
+
+This event generates when new service was installed in the system.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4697
+ 0
+ 0
+ 12289
+ 0
+ 0x8020000000000000
+
+ 2778
+
+
+ Security
+ WIN-GG82ULGC9GO.contoso.local
+
+
+-
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ CONTOSO
+ 0x3e7
+ AppHostSvc
+ %windir%\\system32\\svchost.exe -k apphost
+ 0x20
+ 2
+ localSystem
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was used to install the service. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was used to install the service.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Service Information:**
+
+- **Service Name** \[Type = UnicodeString\]: the name of installed service.
+
+
+
+- **Service File Name** \[Type = UnicodeString\]: This is the fully rooted path to the file that the Service Control Manager will execute to start the service. If command-line parameters are specified as part of the image path, those are logged.
+
+ Note that this is the path to the file when the service is created. If the path is changed afterwards, the change is not logged. This would have to be tracked via Process Create events.
+
+- **Service Type** \[Type = HexInt32\]: Indicates the [type](https://msdn.microsoft.com/en-us/library/tfdtdw0e(v=vs.110).aspx?cs-save-lang=1&cs-lang=csharp#code-snippet-1) of service that was registered with the Service Control Manager. It can be one of the following:
+
+| Value | Service Type | Description |
+|-------|---------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x1 | Kernel Driver | A Kernel device driver such as a hard disk or other low-level hardware device driver. |
+| 0x2 | File System Driver | A file system driver, which is also a Kernel device driver. |
+| 0x8 | Recognizer Driver | A file system driver used during startup to determine the file systems present on the system. |
+| 0x10 | Win32 Own Process | A Win32 program that can be started by the Service Controller and that obeys the service control protocol. This type of Win32 service runs in a process by itself (this is the most common). |
+| 0x20 | Win32 Share Process | A Win32 service that can share a process with other Win32 services.
(see: |
+| 0x110 | Interactive Own Process | A service that should be run as a standalone process and can communicate with the desktop.
(see: ) |
+| 0x120 | Interactive Share Process | A service that can share address space with other services of the same type and can communicate with the desktop. |
+
+- **Service Start Type** \[Type = HexInt32\]: The service start type can have one of the following values (see: :
+
+| Value | Service Type | Description |
+|-------|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | Boot | A device driver started by the system loader. This value is valid only for driver services. |
+| 1 | System | A device driver started by the IoInitSystem() function. This value is valid only for driver services. |
+| 2 | Automatic | A service started automatically by the service control manager during system startup. |
+| 2 | Automatic Delayed | A service started after all auto-start services have started, plus a delay. Delayed Auto Start services are started one at a time in a serial fashion. |
+| 3 | Manual | Manual start. A service started by the service control manager when a process calls the StartService function. |
+| 4 | Disabled | A service that cannot be started. Attempts to start the service result in the error code ERROR\_SERVICE\_DISABLED. |
+
+Most services installed are configured to **Auto Load**, so that they start automatically after Services.exe process is started.
+
+- **Service Account** \[Type = UnicodeString\]: The security context that the service will run as when started. Note that this is what was configured when the service was installed, if the account is changed later that is not logged.
+
+ The service account parameter is only populated if the service type is a "Win32 Own Process" or "Win32 Share Process" (displayed as "User Mode Service."). Kernel drivers do not have a service account name logged.
+
+ If a service (Win32 Own/Share process) is installed but no account is supplied, then LocalSystem is used.
+
+ The token performing the logon is inspected, and if it has a SID then that SID value is populated in the event (in the System/Security node), if not, then it is blank.
+
+## Security Monitoring Recommendations
+
+For 4697(S): A service was installed in the system.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- We recommend monitoring for this event, especially on high value assets or computers, because a new service installation should be planned and expected. Unexpected service installation should trigger an alert.
+
+- Monitor for all events where **“Service File Name”** is not located in **%windir%** or **“Program Files/Program Files (x86)”** folders. Typically new services are located in these folders.
+
+
+
+- Report all “**Service Type**” equals “**0x1**”, “**0x2**” or “**0x8**”. These service types start first and have almost unlimited access to the operating system from the beginning of operating system startup. These types are very rarely installed.
+
+- Report all “**Service Start Type**” equals “**0**” or “**1**”. These service start types are used by drivers, which have unlimited access to the operating system.
+
+- Report all “**Service Start Type**” equals “**4**”. It is not common to install a new service in the **Disabled** state.
+
+- Report all “**Service Account**” not equals “**localSystem**”, “**localService**” or “**networkService**” to identify services which are running under a user account.
+
diff --git a/windows/keep-secure/event-4698.md b/windows/keep-secure/event-4698.md
new file mode 100644
index 0000000000..4829ecd989
--- /dev/null
+++ b/windows/keep-secure/event-4698.md
@@ -0,0 +1,110 @@
+---
+title: 4698(S) A scheduled task was created. (Windows 10)
+description: Describes security event 4698(S) A scheduled task was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4698(S): A scheduled task was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates every time a new scheduled task is created.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4698
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344740
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\Microsoft\\StartListener
+ 2015-09-22T19:03:06.9258653 CONTOSO\\dadmin LeastPrivilege CONTOSO\\dadmin InteractiveToken IgnoreNew true true true false false true false true true false false false P3D 7 C:\\Documents\\listener.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create scheduled task” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create scheduled task” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Task Information**:
+
+- **Task Name** \[Type = UnicodeString\]**:** new scheduled task name. The format of this value is “\\task\_path\\task\_name”, where task\_path is a path in Microsoft **Task Scheduler** tree starting from “**Task Scheduler Library**” node:
+
+
+
+- **Task Content** \[Type = UnicodeString\]: the [XML](https://msdn.microsoft.com/en-us/library/aa286548.aspx) content of the new task. For more information about the XML format for scheduled tasks, see “[XML Task Definition Format](https://msdn.microsoft.com/en-us/library/cc248308.aspx).”
+
+## Security Monitoring Recommendations
+
+For 4698(S): A scheduled task was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- We recommend monitoring all scheduled task creation events, especially on critical computers or devices. Scheduled tasks are often used by malware to stay in the system after reboot or for other malicious actions.
+
+- Monitor for new tasks located in the **Task Scheduler Library** root node, that is, where **Task Name** looks like ‘\\TASK\_NAME’. Scheduled tasks that are created manually or by malware are often located in the **Task Scheduler Library** root node.
+
+- In the new task, if the **Task Content:** XML contains **<LogonType>Password</LogonType>** value, trigger an alert. In this case, the password for the account that will be used to run the scheduled task will be saved in Credential Manager in cleartext format, and can be extracted using Administrative privileges.
+
diff --git a/windows/keep-secure/event-4699.md b/windows/keep-secure/event-4699.md
new file mode 100644
index 0000000000..f5e298828f
--- /dev/null
+++ b/windows/keep-secure/event-4699.md
@@ -0,0 +1,110 @@
+---
+title: 4699(S) A scheduled task was deleted. (Windows 10)
+description: Describes security event 4699(S) A scheduled task was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4699(S): A scheduled task was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates every time a scheduled task was deleted.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4699
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344827
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\Microsoft\\My
+ 2015-08-25T13:56:10.5315552 CONTOSO\\dadmin LeastPrivilege CONTOSO\\dadmin Password IgnoreNew false true false false false true false true true false false false PT0S 7 C:\\Windows\\notepad.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete scheduled task” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete scheduled task” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Task Information**:
+
+- **Task Name** \[Type = UnicodeString\]**:** deleted scheduled task name. The format of this value is “\\task\_path\\task\_name”, where task\_path is a path in Microsoft **Task Scheduler** tree starting from “**Task Scheduler Library**” node:
+
+
+
+- **Task Content** \[Type = UnicodeString\]: the [XML](https://msdn.microsoft.com/en-us/library/aa286548.aspx) of the deleted task. Here “[XML Task Definition Format](https://msdn.microsoft.com/en-us/library/cc248308.aspx)” you can read more about the XML format for scheduled tasks.
+
+## Security Monitoring Recommendations
+
+For 4699(S): A scheduled task was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- We recommend monitoring all scheduled task deletion events, especially on critical computers or devices. Scheduled tasks are often used by malware to stay in the system after reboot or for other malicious actions. However, this event does not often happen.
+
+- Monitor for deleted tasks located in the **Task Scheduler Library** root node, that is, where **Task Name** looks like ‘\\TASK\_NAME’. Scheduled tasks that are created manually or by malware are often located in the **Task Scheduler Library** root node. Deletion of such tasks can be a sign of malicious activity.
+
+- If a highly critical scheduled task exists on some computers, and it should never be deleted, monitor for [4699](event-4699.md) events with the corresponding **Task Name**.
+
diff --git a/windows/keep-secure/event-4700.md b/windows/keep-secure/event-4700.md
new file mode 100644
index 0000000000..f0af1f518a
--- /dev/null
+++ b/windows/keep-secure/event-4700.md
@@ -0,0 +1,106 @@
+---
+title: 4700(S) A scheduled task was enabled. (Windows 10)
+description: Describes security event 4700(S) A scheduled task was enabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4700(S): A scheduled task was enabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates every time a scheduled task is enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4700
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344861
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\Microsoft\\StartListener
+ 2015-09-22T19:03:06.9258653 CONTOSO\\dadmin LeastPrivilege CONTOSO\\dadmin InteractiveToken IgnoreNew true true true false false true false true true false false false P3D 7 C:\\Documents\\listener.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enable scheduled task” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enable scheduled task” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Task Information**:
+
+- **Task Name** \[Type = UnicodeString\]**:** enabled scheduled task name. The format of this value is “\\task\_path\\task\_name”, where task\_path is a path in Microsoft **Task Scheduler** tree starting from “**Task Scheduler Library**” node:
+
+
+
+- **Task Content** \[Type = UnicodeString\]: the [XML](https://msdn.microsoft.com/en-us/library/aa286548.aspx) of the enabled task. Here “[XML Task Definition Format](https://msdn.microsoft.com/en-us/library/cc248308.aspx)” you can read more about the XML format for scheduled tasks.
+
+## Security Monitoring Recommendations
+
+For 4700(S): A scheduled task was enabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If a highly critical scheduled task exists on some computers, and for some reason it should never be enabled, monitor for [4700](event-4700.md) events with the corresponding **Task Name**.
+
diff --git a/windows/keep-secure/event-4701.md b/windows/keep-secure/event-4701.md
new file mode 100644
index 0000000000..fcecfb76bd
--- /dev/null
+++ b/windows/keep-secure/event-4701.md
@@ -0,0 +1,106 @@
+---
+title: 4701(S) A scheduled task was disabled. (Windows 10)
+description: Describes security event 4701(S) A scheduled task was disabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4701(S): A scheduled task was disabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates every time a scheduled task is disabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4701
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344860
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\Microsoft\\StartListener
+ 2015-09-22T19:03:06.9258653 CONTOSO\\dadmin LeastPrivilege CONTOSO\\dadmin InteractiveToken IgnoreNew true true true false false true false true false false false false P3D 7 C:\\Documents\\listener.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enable scheduled task” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enable scheduled task” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Task Information**:
+
+- **Task Name** \[Type = UnicodeString\]**:** disabled scheduled task name. The format of this value is “\\task\_path\\task\_name”, where task\_path is a path in Microsoft **Task Scheduler** tree starting from “**Task Scheduler Library**” node:
+
+
+
+- **Task Content** \[Type = UnicodeString\]: the [XML](https://msdn.microsoft.com/en-us/library/aa286548.aspx) of the disabled task. Here “[XML Task Definition Format](https://msdn.microsoft.com/en-us/library/cc248308.aspx)” you can read more about the XML format for scheduled tasks.
+
+## Security Monitoring Recommendations
+
+For 4701(S): A scheduled task was disabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If a highly critical scheduled task exists on some computers, and it should never be disabled, monitor for [4701](event-4701.md) events with the corresponding **Task Name**.
+
diff --git a/windows/keep-secure/event-4702.md b/windows/keep-secure/event-4702.md
new file mode 100644
index 0000000000..3c3e7535dc
--- /dev/null
+++ b/windows/keep-secure/event-4702.md
@@ -0,0 +1,108 @@
+---
+title: 4702(S) A scheduled task was updated. (Windows 10)
+description: Describes security event 4702(S) A scheduled task was updated.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4702(S): A scheduled task was updated.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates every time scheduled task was updated/changed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+ 344863
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x364eb
+ \\Microsoft\\StartListener
+ 2015-09-22T19:03:06.9258653 CONTOSO\\dadmin HighestAvailable CONTOSO\\dadmin InteractiveToken IgnoreNew true true true false false true false true true false false false P3D 7 C:\\Documents\\listener.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change/update scheduled task” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change/update scheduled task” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Task Information**:
+
+- **Task Name** \[Type = UnicodeString\]**:** updated/changed scheduled task name. The format of this value is “\\task\_path\\task\_name”, where task\_path is a path in Microsoft **Task Scheduler** tree starting from “**Task Scheduler Library**” node:
+
+
+
+- **Task New Content** \[Type = UnicodeString\]: the new [XML](https://msdn.microsoft.com/en-us/library/aa286548.aspx) for the updated task. Here “[XML Task Definition Format](https://msdn.microsoft.com/en-us/library/cc248308.aspx)” you can read more about the XML format for scheduled tasks.
+
+## Security Monitoring Recommendations
+
+For 4702(S): A scheduled task was updated.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Monitor for updated scheduled tasks located in the **Task Scheduler Library** root node, that is, where **Task Name** looks like ‘\\TASK\_NAME’. Scheduled tasks that are created manually or by malware are often located in the **Task Scheduler Library** root node.
+
+- In the updated scheduled task, if the **Task Content:** XML contains **<LogonType>Password</LogonType>** value, trigger an alert. In this case, the password for the account that will be used to run the scheduled task will be saved in Credential Manager in cleartext format, and can be extracted using Administrative privileges.
+
diff --git a/windows/keep-secure/event-4703.md b/windows/keep-secure/event-4703.md
new file mode 100644
index 0000000000..e6ab98abc4
--- /dev/null
+++ b/windows/keep-secure/event-4703.md
@@ -0,0 +1,194 @@
+---
+title: 4703(S) A user right was adjusted. (Windows 10)
+description: Describes security event 4703(S) A user right was adjusted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4703(S): A user right was adjusted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates when [token privileges](https://msdn.microsoft.com/en-us/library/windows/desktop/aa446619(v=vs.85).aspx) were enabled or disabled for a specific account’s token.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+Token privileges provide the ability to take certain system-level actions that you only need to do at particular moments. For example, anybody can restart a computer, but the operating system doesn’t enable that privilege by default. Instead, the privilege is enabled when you click **Shutdown**. You can check the current state of the user’s token privileges using the **whoami /priv** command:
+
+
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4703
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 5245
+
+
+ Security
+ WIN-GG82ULGC9GO.contoso.local
+
+
+-
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ CONTOSO
+ 0x3e7
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ CONTOSO
+ 0x3e7
+ C:\\Windows\\System32\\svchost.exe
+ 0x270
+ SeAssignPrimaryTokenPrivilege SeIncreaseQuotaPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeSystemtimePrivilege SeBackupPrivilege SeRestorePrivilege SeShutdownPrivilege SeSystemEnvironmentPrivilege SeUndockPrivilege SeManageVolumePrivilege
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enable” or “disable” operation for **Target Account** privileges. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enable” or “disable” operation for **Target Account** privileges.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which privileges were enabled or disabled. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which privileges were enabled or disabled.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that enabled or disabled token privileges. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+
+
+- **Enabled Privileges** \[Type = UnicodeString\]**:** the list of enabled user rights. This event generates only for *user* rights, not logon rights. Here is the list of possible user rights:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+**Disabled Privileges** \[Type = UnicodeString\]**:** the list of disabled user rights. See possible values in the table above.
+
+## Security Monitoring Recommendations
+
+For 4703(S): A user right was adjusted.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\Security ID**” that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. Also check the “**Target Account\\Security ID**” and **“Enabled Privileges”** to see what was enabled. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about.
Also check **“Target Account\\Security ID”** to see whether the change in privileges should be made on that computer for that account. |
+| **User rights that should be restricted or monitored**: You might have a list of user rights that you want to restrict or monitor. | Monitor this event and compare the **“Enabled Privileges”** to your list of user rights. Trigger an alert for user rights that should not be enabled, especially on high-value servers or other computers.
For example, you might have **SeDebugPrivilege** on a list of user rights to be restricted. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4704.md b/windows/keep-secure/event-4704.md
new file mode 100644
index 0000000000..06708cb228
--- /dev/null
+++ b/windows/keep-secure/event-4704.md
@@ -0,0 +1,156 @@
+---
+title: 4704(S) A user right was assigned. (Windows 10)
+description: Describes security event 4704(S) A user right was assigned.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4704(S): A user right was assigned.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates every time local user right policy is changed and user right was assigned to an account.
+
+You will see unique event for every user.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4704
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 1049866
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ SeAuditPrivilege SeIncreaseWorkingSetPrivilege
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to local user right policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to local user right policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Account Name** \[Type = SID\]: the SID of security principal for which user rights were assigned. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**New Right: **
+
+- **User Right** \[Type = UnicodeString\]: the list of assigned user rights. This event generates only for *user* rights, not logon rights. Here is the list of possible user rights:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+
+## Security Monitoring Recommendations
+
+For 4704(S): A user right was assigned.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Actions typically performed by the SYSTEM account**: This event and certain other events should be monitored to see if they are triggered by any account other than SYSTEM. | Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\ Account Name**” that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. Also check the “**Target Account\\Account Name**” and **“New Right”** to see what was enabled. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about.
Also check **“Target Account\\ Account Name”** to see whether the change in rights should be made on that computer for that account. |
+| **User rights that should be restricted or monitored**: You might have a list of user rights that you want to restrict or monitor. | Monitor this event and compare the “**New Right\\User Right**” to your list of user rights, to see whether the right should be assigned to **“Target Account\\Account Name**.” Trigger an alert for user rights that should not be enabled, especially on high-value servers or other computers.
For example, your list of restricted rights might say that only administrative accounts should have **SeAuditPrivilege**. As another example, your list might say that no accounts should have **SeTcbPrivilege** or **SeDebugPrivilege**. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4705.md b/windows/keep-secure/event-4705.md
new file mode 100644
index 0000000000..475c72b108
--- /dev/null
+++ b/windows/keep-secure/event-4705.md
@@ -0,0 +1,155 @@
+---
+title: 4705(S) A user right was removed. (Windows 10)
+description: Describes security event 4705(S) A user right was removed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4705(S): A user right was removed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates every time local user right policy is changed and user right was removed from an account.
+
+You will see unique event for every user.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4705
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 1049867
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ SeTimeZonePrivilege
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to local user right policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to local user right policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Account Name** \[Type = SID\]: the SID of security principal for which user rights were removed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Removed Right: **
+
+- **User Right** \[Type = UnicodeString\]: the list of removed user rights. This event generates only for *user* rights, not logon rights. Here is the list of possible user rights:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+## Security Monitoring Recommendations
+
+For 4705(S): A user right was removed.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Actions typically performed by the SYSTEM account**: This event and certain other events should be monitored to see if they are triggered by any account other than SYSTEM. | Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\Account Name**” that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
If you have specific user rights policies, for example, a whitelist of accounts that can perform certain actions, monitor this event to confirm that it was appropriate that the “**Removed Right**” was removed from “**Target** **Account\\Account Name**.” |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Target Account\\Account Name”** to see whether the account type is as expected.
For example, if some accounts have critical user rights which should never be removed, monitor this event for the **“Target** **Account\\Account Name”** and the appropriate rights.
As another example, if non-administrative accounts should never be granted certain user rights (for example, **SeAuditPrivilege**), you might monitor this event, because a right can be removed only after it was previously granted. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Target Account\\Account Name**” to see whether user rights should be removed from that account (or whether that account should have any rights on that computer).
For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Removed Right**” should be removed from “**Target** **Account\\Account Name**” in each case. |
+| **User rights that should be restricted**: You might have a list of user rights that you want to monitor. | Monitor this event and compare the **“Removed Right”** to your list of restricted rights.
Monitor this event to discover the removal of a right that should never have been granted (for example, SeTcbPrivilege), so that you can investigate further. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4706.md b/windows/keep-secure/event-4706.md
new file mode 100644
index 0000000000..92a9152b46
--- /dev/null
+++ b/windows/keep-secure/event-4706.md
@@ -0,0 +1,149 @@
+---
+title: 4706(S) A new trust was created to a domain. (Windows 10)
+description: Describes security event 4706(S) A new trust was created to a domain.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4706(S): A new trust was created to a domain.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when a new trust was created to a domain.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4706
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049759
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ corp.contoso.local
+ S-1-5-21-2226861337-2836268956-2433141405
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3e99d6
+ 2
+ 3
+ 32
+ %%1796
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create domain trust” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create domain trust” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Trusted Domain:**
+
+- **Domain Name** \[Type = UnicodeString\]**:** the name of new trusted domain.
+
+- **Domain ID** \[Type = SID\]**:** SID of new trusted domain. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Trust Information:**
+
+- **Trust Type** \[Type = UInt32\]**:** the type of new trust. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 1 | TRUST\_TYPE\_DOWNLEVEL | The domain controller of the trusted domain is a computer running an operating system earlier than Windows 2000. |
+| 2 | TRUST\_TYPE\_UPLEVEL | The domain controller of the trusted domain is a computer running Windows 2000 or later. |
+| 3 | TRUST\_TYPE\_MIT | The trusted domain is running a non-Windows, RFC4120-compliant Kerberos distribution. This type of trust is distinguished in that (1) a [SID](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_83f2020d-0804-4840-a5ac-e06439d50f8d) is not required for the [TDO](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_f2ceef4e-999b-4276-84cd-2e2829de5fc4), and (2) the default key types include the DES-CBC and DES-CRC encryption types (see [\[RFC4120\]](http://go.microsoft.com/fwlink/?LinkId=90458) section 8.1). |
+| 4 | TRUST\_TYPE\_DCE | The trusted domain is a DCE realm. Historical reference, this value is not used in Windows. |
+
+- **Trust Direction** \[Type = UInt32\]**:** the direction of new trust. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|---------------------------------|-------------------------------------------------------------------------------------------------------------|
+| 0 | TRUST\_DIRECTION\_DISABLED | The trust relationship exists, but it has been disabled. |
+| 1 | TRUST\_DIRECTION\_INBOUND | The trusted domain trusts the primary domain to perform operations such as name lookups and authentication. |
+| 2 | TRUST\_DIRECTION\_OUTBOUND | The primary domain trusts the trusted domain to perform operations such as name lookups and authentication. |
+| 3 | TRUST\_DIRECTION\_BIDIRECTIONAL | Both domains trust one another for operations such as name lookups and authentication. |
+
+- **Trust Attributes** \[Type = UInt32\]**:** the decimal value of attributes for new trust. You need convert decimal value to hexadecimal and find it in the table below. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x1 | TRUST\_ATTRIBUTE\_NON\_TRANSITIVE | If this bit is set, then the trust cannot be used transitively. For example, if domain A trusts domain B, which in turn trusts domain C, and the A<-->B trust has this attribute set, then a client in domain A cannot authenticate to a server in domain C over the A<-->B<-->C trust linkage. |
+| 0x2 | TRUST\_ATTRIBUTE\_UPLEVEL\_ONLY | If this bit is set in the attribute, then only Windows 2000 operating system and newer clients may use the trust link. [Netlogon](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_70771a5a-04a3-447d-981b-e03098808c32) does not consume [trust objects](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_e81f6436-01d2-4311-93a4-4316bb67eabd) that have this flag set. |
+| 0x4 | TRUST\_ATTRIBUTE\_QUARANTINED\_DOMAIN | If this bit is set, the trusted domain is quarantined and is subject to the rules of [SID](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_83f2020d-0804-4840-a5ac-e06439d50f8d) Filtering as described in [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section [4.1.2.2](https://msdn.microsoft.com/en-us/library/cc237940.aspx). |
+| 0x8 | TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE | If this bit is set, the trust link is a [cross-forest trust](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_86f3dbf2-338f-462e-8c5b-3c8e05798dbc) [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) between the root domains of two [forests](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_fd104241-4fb3-457c-b2c4-e0c18bb20b62), both of which are running in a [forest functional level](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_b3240417-ca43-4901-90ec-fde55b32b3b8) of DS\_BEHAVIOR\_WIN2003 or greater.
Only evaluated on Windows Server 2003 operating system, Windows Server 2008 operating system, Windows Server 2008 R2 operating system, Windows Server 2012 operating system, Windows Server 2012 R2 operating system, and Windows Server 2016 Technical Preview operating system.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x10 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION | If this bit is set, then the trust is to a domain or forest that is not part of the [organization](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_6fae7775-5232-4206-b452-f298546ab54f). The behavior controlled by this bit is explained in [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) section [3.3.5.7.5](https://msdn.microsoft.com/en-us/library/cc233949.aspx) and [\[MS-APDS\]](https://msdn.microsoft.com/en-us/library/cc223948.aspx) section [3.1.5](https://msdn.microsoft.com/en-us/library/cc223991.aspx).
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x20 | TRUST\_ATTRIBUTE\_WITHIN\_FOREST | If this bit is set, then the trusted domain is within the same forest.
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview. |
+| 0x40 | TRUST\_ATTRIBUTE\_TREAT\_AS\_EXTERNAL | If this bit is set, then a cross-forest trust to a domain is to be treated as an external trust for the purposes of SID Filtering. Cross-forest trusts are more stringently [filtered](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_ffbe7b55-8e84-4f41-a18d-fc29191a4cda) than external trusts. This attribute relaxes those cross-forest trusts to be equivalent to external trusts. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section 4.1.2.2.
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview.
Only evaluated if SID Filtering is used.
Only evaluated on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x80 | TRUST\_ATTRIBUTE\_USES\_RC4\_ENCRYPTION | This bit is set on trusts with the [trustType](https://msdn.microsoft.com/en-us/library/cc220955.aspx) set to TRUST\_TYPE\_MIT, which are capable of using RC4 keys. Historically, MIT Kerberos distributions supported only DES and 3DES keys ([\[RFC4120\]](http://go.microsoft.com/fwlink/?LinkId=90458), [\[RFC3961\]](http://go.microsoft.com/fwlink/?LinkId=90450)). MIT 1.4.1 adopted the RC4HMAC encryption type common to Windows 2000 [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx), so trusted domains deploying later versions of the MIT distribution required this bit. For more information, see "Keys and Trusts", section [6.1.6.9.1](https://msdn.microsoft.com/en-us/library/cc223782.aspx).
Only evaluated on TRUST\_TYPE\_MIT |
+| 0x200 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION\_NO\_TGT\_DELEGATION | If this bit is set, tickets granted under this trust MUST NOT be trusted for delegation. The behavior controlled by this bit is as specified in [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) section 3.3.5.7.5.
Only supported on Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview. |
+| 0x400 | TRUST\_ATTRIBUTE\_PIM\_TRUST | If this bit and the TATE bit are set, then a cross-forest trust to a domain is to be treated as Privileged Identity Management trust for the purposes of SID Filtering. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section 4.1.2.2.
Evaluated only on Windows Server 2016 Technical Preview
Evaluated only if SID Filtering is used.
Evaluated only on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.
Can be set only if the forest and the trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WINTHRESHOLD or greater. |
+
+- **SID Filtering** \[Type = UnicodeString\]: [SID Filtering](https://technet.microsoft.com/en-us/library/cc772633(v=ws.10).aspx) state for the new trust:
+
+ - Enabled
+
+ - Disabled
+
+## Security Monitoring Recommendations
+
+For 4706(S): A new trust was created to a domain.
+
+- Any changes related to Active Directory domain trusts (especially creation of the new trust) must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4707.md b/windows/keep-secure/event-4707.md
new file mode 100644
index 0000000000..7698e07d9f
--- /dev/null
+++ b/windows/keep-secure/event-4707.md
@@ -0,0 +1,104 @@
+---
+title: 4707(S) A trust to a domain was removed. (Windows 10)
+description: Describes security event 4707(S) A trust to a domain was removed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4707(S): A trust to a domain was removed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when a domain trust was removed.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4707
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049754
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ FABRIKAM
+ S-1-5-21-2226861337-2836268956-2433141405
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3e99d6
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “remove domain trust” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “remove domain trust” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Domain Information:**
+
+- **Domain Name** \[Type = UnicodeString\]**:** the name of removed trusted domain.
+
+- **Domain ID** \[Type = SID\]**:** SID of removed trusted domain. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+## Security Monitoring Recommendations
+
+For 4707(S): A trust to a domain was removed.
+
+- Any changes related to Active Directory domain trusts (especially trust removal) must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4713.md b/windows/keep-secure/event-4713.md
new file mode 100644
index 0000000000..46884472bc
--- /dev/null
+++ b/windows/keep-secure/event-4713.md
@@ -0,0 +1,111 @@
+---
+title: 4713(S) Kerberos policy was changed. (Windows 10)
+description: Describes security event 4713(S) Kerberos policy was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4713(S): Kerberos policy was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when [Kerberos policy](https://technet.microsoft.com/en-us/library/cc782061(v=ws.10).aspx) was changed.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4713
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049772
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ KerMaxT: 0x10c388d000 (0x861c46800); KerMaxR: 0x19254d38000 (0xc92a69c000);
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to Kerberos policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to Kerberos policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Changes Made** \[Type = UnicodeString\]**:** '--' means no changes, otherwise each change is shown as: Parameter\_Name: new\_value (old\_value). Here is a list of possible parameter names:
+
+| Parameter Name | Description |
+|----------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| KerProxy | 1. Maximum tolerance for computer clock synchronization.
To convert the **KerProxy** to minutes you need to:
Convert the value to decimal value.
Divide value by 600000000. |
+| KerMaxR | 1. Maximum lifetime for user ticket renewal.
To convert the **KerProxy** to days you need to:
Convert the value to decimal value.
Divide value by 864000000000. |
+| KerMaxT | 1. Maximum lifetime for user ticket.
To convert the **KerMaxT** to hours you need to:
Convert the value to decimal value.
Divide value by 36000000000. |
+| KerMinT | 1. Maximum lifetime for service ticket.
To convert the **KerMinT** to minutes you need to:
Convert the value to decimal value.
Divide value by 600000000. |
+| KerOpts | - Enforce user logon restrictions:
0x80 – Enabled
0x0 - Disabled |
+
+This event shows changes in “Kerberos policy”. Here is location of Kerberos policies in Group Policy management console:
+
+
+
+## Security Monitoring Recommendations
+
+For 4713(S): Kerberos policy was changed.
+
+- Any changes in Kerberos policy reported by current event must be monitored and an alert should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4714.md b/windows/keep-secure/event-4714.md
new file mode 100644
index 0000000000..c113a6acf4
--- /dev/null
+++ b/windows/keep-secure/event-4714.md
@@ -0,0 +1,73 @@
+---
+title: 4714(S) Encrypted data recovery policy was changed. (Windows 10)
+description: Describes security event 4714(S) Encrypted data recovery policy was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4714(S): Encrypted data recovery policy was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates when a Data Recovery Agent group policy for Encrypting File System ([EFS](https://technet.microsoft.com/en-us/library/cc700811.aspx)) has changed.
+
+This event generates when a Data Recovery Agent certificate or [Data Recovery Agent policy](https://technet.microsoft.com/en-us/library/cc778208(v=ws.10).aspx) was changed for the computer or device.
+
+In the background, this event generates when the [\\HKLM\\Software\\Policies\\Microsoft\\SystemCertificates\\EFS\\EfsBlob](https://msdn.microsoft.com/en-us/library/cc232284.aspx) registry value is changed during a Group Policy update.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4714
+ 0
+ 0
+ 13573
+ 0
+ 0x8020000000000000
+
+ 1080883
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 13
+ SubjectUserSid
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4714(S): Encrypted data recovery policy was changed.
+
+- We recommend monitoring this event and if the change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4715.md b/windows/keep-secure/event-4715.md
new file mode 100644
index 0000000000..5bee7b5421
--- /dev/null
+++ b/windows/keep-secure/event-4715.md
@@ -0,0 +1,216 @@
+---
+title: 4715(S) The audit policy (SACL) on an object was changed. (Windows 10)
+description: Describes security event 4715(S) The audit policy (SACL) on an object was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4715(S): The audit policy (SACL) on an object was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time local audit policy security descriptor changes.
+
+This event is always logged regardless of the "Audit Policy Change" sub-category setting.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4715
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049425
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x11ae30
+ D:(A;;DCSWRPDTRC;;;BA)(D;;DCSWRPDTRC;;;SY)S:NO\_ACCESS\_CONTROL
+ D:(A;;DCSWRPDTRC;;;BA)(A;;DCSWRPDTRC;;;SY)S:NO\_ACCESS\_CONTROL
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change local audit policy security descriptor (SACL)” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change local audit policy security descriptor (SACL)” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Audit Policy Change:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the old Security Descriptor Definition Language (SDDL) value for the audit policy.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** new Security Descriptor Definition Language (SDDL) value for the audit policy.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4715(S): The audit policy (SACL) on an object was changed.
+
+- Monitor for all events of this type, especially on high value assets or computers, because any change of the local audit policy security descriptor should be planned. If this action was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4716.md b/windows/keep-secure/event-4716.md
new file mode 100644
index 0000000000..bef6704947
--- /dev/null
+++ b/windows/keep-secure/event-4716.md
@@ -0,0 +1,151 @@
+---
+title: 4716(S) Trusted domain information was modified. (Windows 10)
+description: Describes security event 4716(S) Trusted domain information was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4716(S): Trusted domain information was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when the trust was modified.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4716
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049763
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x138eb0
+ -
+ S-1-5-21-2226861337-2836268956-2433141405
+ 2
+ 3
+ 32
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify domain trust settings” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify domain trust settings” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Trusted Domain:**
+
+- **Domain Name** \[Type = UnicodeString\]**:** the name of changed trusted domain. If this attribute was not changed, then it will have “**-**“ value.
+
+- **Domain ID** \[Type = SID\]**:** SID of changed trusted domain. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**New Trust Information:**
+
+- **Trust Type** \[Type = UInt32\]**:** the type of new trust. If this attribute was not changed, then it will have “**-**“ value or its old value. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 1 | TRUST\_TYPE\_DOWNLEVEL | The domain controller of the trusted domain is a computer running an operating system earlier than Windows 2000. |
+| 2 | TRUST\_TYPE\_UPLEVEL | The domain controller of the trusted domain is a computer running Windows 2000 or later. |
+| 3 | TRUST\_TYPE\_MIT | The trusted domain is running a non-Windows, RFC4120-compliant Kerberos distribution. This type of trust is distinguished in that (1) a [SID](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_83f2020d-0804-4840-a5ac-e06439d50f8d) is not required for the [TDO](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_f2ceef4e-999b-4276-84cd-2e2829de5fc4), and (2) the default key types include the DES-CBC and DES-CRC encryption types (see [\[RFC4120\]](http://go.microsoft.com/fwlink/?LinkId=90458) section 8.1). |
+| 4 | TRUST\_TYPE\_DCE | The trusted domain is a DCE realm. Historical reference, this value is not used in Windows. |
+
+- **Trust Direction** \[Type = UInt32\]**:** the direction of new trust. If this attribute was not changed, then it will have “**-**“ value or its old value. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|---------------------------------|-------------------------------------------------------------------------------------------------------------|
+| 0 | TRUST\_DIRECTION\_DISABLED | The trust relationship exists, but it has been disabled. |
+| 1 | TRUST\_DIRECTION\_INBOUND | The trusted domain trusts the primary domain to perform operations such as name lookups and authentication. |
+| 2 | TRUST\_DIRECTION\_OUTBOUND | The primary domain trusts the trusted domain to perform operations such as name lookups and authentication. |
+| 3 | TRUST\_DIRECTION\_BIDIRECTIONAL | Both domains trust one another for operations such as name lookups and authentication. |
+
+- **Trust Attributes** \[Type = UInt32\]**:** the decimal value of attributes for new trust. You need convert decimal value to hexadecimal and find it in the table below. If this attribute was not changed, then it will have “**-**“ value or its old value. The following table contains possible values for this field:
+
+| Value | Attribute Value | Description |
+|-------|------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x1 | TRUST\_ATTRIBUTE\_NON\_TRANSITIVE | If this bit is set, then the trust cannot be used transitively. For example, if domain A trusts domain B, which in turn trusts domain C, and the A<-->B trust has this attribute set, then a client in domain A cannot authenticate to a server in domain C over the A<-->B<-->C trust linkage. |
+| 0x2 | TRUST\_ATTRIBUTE\_UPLEVEL\_ONLY | If this bit is set in the attribute, then only Windows 2000 operating system and newer clients may use the trust link. [Netlogon](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_70771a5a-04a3-447d-981b-e03098808c32) does not consume [trust objects](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_e81f6436-01d2-4311-93a4-4316bb67eabd) that have this flag set. |
+| 0x4 | TRUST\_ATTRIBUTE\_QUARANTINED\_DOMAIN | If this bit is set, the trusted domain is quarantined and is subject to the rules of [SID](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_83f2020d-0804-4840-a5ac-e06439d50f8d) Filtering as described in [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section [4.1.2.2](https://msdn.microsoft.com/en-us/library/cc237940.aspx). |
+| 0x8 | TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE | If this bit is set, the trust link is a [cross-forest trust](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_86f3dbf2-338f-462e-8c5b-3c8e05798dbc) [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) between the root domains of two [forests](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_fd104241-4fb3-457c-b2c4-e0c18bb20b62), both of which are running in a [forest functional level](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_b3240417-ca43-4901-90ec-fde55b32b3b8) of DS\_BEHAVIOR\_WIN2003 or greater.
Only evaluated on Windows Server 2003 operating system, Windows Server 2008 operating system, Windows Server 2008 R2 operating system, Windows Server 2012 operating system, Windows Server 2012 R2 operating system, and Windows Server 2016 Technical Preview operating system.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x10 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION | If this bit is set, then the trust is to a domain or forest that is not part of the [organization](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_6fae7775-5232-4206-b452-f298546ab54f). The behavior controlled by this bit is explained in [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) section [3.3.5.7.5](https://msdn.microsoft.com/en-us/library/cc233949.aspx) and [\[MS-APDS\]](https://msdn.microsoft.com/en-us/library/cc223948.aspx) section [3.1.5](https://msdn.microsoft.com/en-us/library/cc223991.aspx).
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x20 | TRUST\_ATTRIBUTE\_WITHIN\_FOREST | If this bit is set, then the trusted domain is within the same forest.
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview. |
+| 0x40 | TRUST\_ATTRIBUTE\_TREAT\_AS\_EXTERNAL | If this bit is set, then a cross-forest trust to a domain is to be treated as an external trust for the purposes of SID Filtering. Cross-forest trusts are more stringently [filtered](https://msdn.microsoft.com/en-us/library/cc223126.aspx#gt_ffbe7b55-8e84-4f41-a18d-fc29191a4cda) than external trusts. This attribute relaxes those cross-forest trusts to be equivalent to external trusts. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section 4.1.2.2.
Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview.
Only evaluated if SID Filtering is used.
Only evaluated on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.
Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
+| 0x80 | TRUST\_ATTRIBUTE\_USES\_RC4\_ENCRYPTION | This bit is set on trusts with the [trustType](https://msdn.microsoft.com/en-us/library/cc220955.aspx) set to TRUST\_TYPE\_MIT, which are capable of using RC4 keys. Historically, MIT Kerberos distributions supported only DES and 3DES keys ([\[RFC4120\]](http://go.microsoft.com/fwlink/?LinkId=90458), [\[RFC3961\]](http://go.microsoft.com/fwlink/?LinkId=90450)). MIT 1.4.1 adopted the RC4HMAC encryption type common to Windows 2000 [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx), so trusted domains deploying later versions of the MIT distribution required this bit. For more information, see "Keys and Trusts", section [6.1.6.9.1](https://msdn.microsoft.com/en-us/library/cc223782.aspx).
Only evaluated on TRUST\_TYPE\_MIT |
+| 0x200 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION\_NO\_TGT\_DELEGATION | If this bit is set, tickets granted under this trust MUST NOT be trusted for delegation. The behavior controlled by this bit is as specified in [\[MS-KILE\]](https://msdn.microsoft.com/en-us/library/cc233855.aspx) section 3.3.5.7.5.
Only supported on Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 Technical Preview. |
+| 0x400 | TRUST\_ATTRIBUTE\_PIM\_TRUST | If this bit and the TATE bit are set, then a cross-forest trust to a domain is to be treated as Privileged Identity Management trust for the purposes of SID Filtering. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/en-us/library/cc237917.aspx) section 4.1.2.2.
Evaluated only on Windows Server 2016 Technical Preview
Evaluated only if SID Filtering is used.
Evaluated only on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.
Can be set only if the forest and the trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WINTHRESHOLD or greater. |
+
+- **SID Filtering** \[Type = UnicodeString\]: [SID Filtering](https://technet.microsoft.com/en-us/library/cc772633(v=ws.10).aspx) state for the new trust:
+
+ - Enabled
+
+ - Disabled
+
+ If this attribute was not changed, then it will have “**-**“ value or its old value.
+
+## Security Monitoring Recommendations
+
+For 4716(S): Trusted domain information was modified.
+
+- Any changes in Active Directory domain trust settings must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4717.md b/windows/keep-secure/event-4717.md
new file mode 100644
index 0000000000..a6fc571002
--- /dev/null
+++ b/windows/keep-secure/event-4717.md
@@ -0,0 +1,130 @@
+---
+title: 4717(S) System security access was granted to an account. (Windows 10)
+description: Describes security event 4717(S) System security access was granted to an account.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4717(S): System security access was granted to an account.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates every time local [logon user right policy](https://technet.microsoft.com/en-us/library/cc728212(v=ws.10).aspx) is changed and logon right was granted to an account.
+
+You will see unique event for every user if logon user rights were granted to multiple accounts.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4717
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049777
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ SeInteractiveLogonRight
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to local logon right user policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to local logon right user policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Account Modified:**
+
+- **Account Name** \[Type = SID\]: the SID of the security principal for which logon right was granted. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Access Granted: **
+
+- **Access Right** \[Type = UnicodeString\]: the name of granted logon right. This event generates only for [logon rights](https://technet.microsoft.com/en-us/library/cc728212(v=ws.10).aspx), which are as follows:
+
+| Value | Group Policy Name |
+|-----------------------------------|-----------------------------------------------|
+| SeNetworkLogonRight | Access this computer from the network |
+| SeRemoteInteractiveLogonRight | Allow logon through Terminal Services |
+| SeDenyNetworkLogonRight | Deny access to this computer from the network |
+| SeDenyBatchLogonRight | Deny logon as a batch job |
+| SeDenyServiceLogonRight | Deny logon as a service |
+| SeDenyInteractiveLogonRight | Deny logon locally |
+| SeDenyRemoteInteractiveLogonRight | Deny logon through Terminal Services |
+| SeBatchLogonRight | Log on as a batch job |
+| SeServiceLogonRight | Log on as a service |
+| SeInteractiveLogonRight | Log on locally |
+
+## Security Monitoring Recommendations
+
+For 4717(S): System security access was granted to an account.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Actions typically performed by the SYSTEM account**: This event and certain other events should be monitored to see if they are triggered by any account other than SYSTEM. | Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
If you have specific user logon rights policies, for example, a whitelist of accounts that can log on to certain computers, monitor this event to confirm that any “**Access Right**” was granted only to the appropriate “**Account Modified\\Account Name**.” |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** to see whether the account type is as expected.
For example, if non-service accounts should never be granted certain logon rights (for example, **SeServiceLogonRight**), monitor this event for those accounts and rights. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Account Modified\\Account Name**” to see whether logon rights should be granted to that account.
For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Access Right**” should be granted to “**Account Modified\\Account Name**” in each case. |
+| **Logon rights that should be restricted**: You might have a list of user logon rights that you want to monitor (for example, **SeServiceLogonRight**). | Monitor this event and compare the **“Access Right”** to your list of restricted rights. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4718.md b/windows/keep-secure/event-4718.md
new file mode 100644
index 0000000000..a3dce890af
--- /dev/null
+++ b/windows/keep-secure/event-4718.md
@@ -0,0 +1,130 @@
+---
+title: 4718(S) System security access was removed from an account. (Windows 10)
+description: Describes security event 4718(S) System security access was removed from an account.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4718(S): System security access was removed from an account.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates every time local [logon user right policy](https://technet.microsoft.com/en-us/library/cc728212(v=ws.10).aspx) is changed and logon right was removed from an account.
+
+You will see unique event for every user if logon user rights were removed for multiple accounts.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4718
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049773
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ SeInteractiveLogonRight
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to local logon right user policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to local logon right user policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Account Modified:**
+
+- **Account Name** \[Type = SID\]: the SID of the security principal for which logon right was removed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Access Removed: **
+
+- **Access Right** \[Type = UnicodeString\]: the name of removed logon right. This event generates only for [logon rights](https://technet.microsoft.com/en-us/library/cc728212(v=ws.10).aspx), which are as follows:
+
+| Value | Group Policy Name |
+|-----------------------------------|-----------------------------------------------|
+| SeNetworkLogonRight | Access this computer from the network |
+| SeRemoteInteractiveLogonRight | Allow logon through Terminal Services |
+| SeDenyNetworkLogonRight | Deny access to this computer from the network |
+| SeDenyBatchLogonRight | Deny logon as a batch job |
+| SeDenyServiceLogonRight | Deny logon as a service |
+| SeDenyInteractiveLogonRight | Deny logon locally |
+| SeDenyRemoteInteractiveLogonRight | Deny logon through Terminal Services |
+| SeBatchLogonRight | Log on as a batch job |
+| SeServiceLogonRight | Log on as a service |
+| SeInteractiveLogonRight | Log on locally |
+
+## Security Monitoring Recommendations
+
+For 4718(S): System security access was removed from an account.
+
+| **Type of monitoring required** | **Recommendation** |
+|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Actions typically performed by the SYSTEM account**: This event and certain other events should be monitored to see if they are triggered by any account other than SYSTEM. | Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
If you have specific user logon rights policies, for example, a whitelist of accounts that can log on to certain computers, monitor this event to confirm that it was appropriate that the “**Access Right**” was removed from “**Account Modified\\Account Name**.” |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** to see whether the account type is as expected.
For example, if critical remote network service accounts have user logon rights which should never be removed (for example, **SeNetworkLogonRight**), monitor this event for the **“Account Modified\\Account Name”** and the appropriate rights.
As another example, if non-service accounts should never be granted certain logon rights (for example, **SeServiceLogonRight**), you might monitor this event, because a right can be removed only after it was previously granted. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Account Modified\\Account Name**” to see whether logon rights should be removed from that account.
For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Access Right**” should be removed from “**Account Modified\\Account Name**” in each case. |
+| **Logon rights that should be restricted**: You might have a list of user logon rights that you want to monitor (for example, **SeServiceLogonRight**).
**“Deny” rights that should not be removed**: Your organization might use “Deny” rights that should not be removed, for example, SeDenyRemoteInteractiveLogonRight. | - Monitor this event and compare the **“Access Right”** to your list of restricted rights.
Monitor this event to discover the removal of a right that should never have been granted, so that you can investigate further.
You can also monitor this event to discover the removal of “Deny” rights. When these rights are removed, it could be an approved action, done by mistake, or part of malicious activity. These rights include:
SeDenyNetworkLogonRight:
SeDenyBatchLogonRight
SeDenyServiceLogonRight
SeDenyInteractiveLogonRight
SeDenyRemoteInteractiveLogonRight |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4719.md b/windows/keep-secure/event-4719.md
new file mode 100644
index 0000000000..58d6ee111c
--- /dev/null
+++ b/windows/keep-secure/event-4719.md
@@ -0,0 +1,163 @@
+---
+title: 4719(S) System audit policy was changed. (Windows 10)
+description: Describes security event 4719(S) System audit policy was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4719(S): System audit policy was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates when the computer's audit policy changes.
+
+This event is always logged regardless of the "Audit Policy Change" sub-category setting.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4719
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049418
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ %%8274
+ %%12807
+ {0CCE9223-69AE-11D9-BED3-505054503030}
+ %%8448, %%8450
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to local audit policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to local audit policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Audit Policy Change:**
+
+- **Category:** the name of auditing Category which subcategory was changed. Possible values:
+
+ - Account Logon
+
+ - Account Management
+
+ - Detailed Tracking
+
+ - DS Access
+
+ - Logon/Logoff
+
+ - Object Access
+
+ - Policy Change
+
+ - Privilege Use
+
+ - System
+
+- **Subcategory:** the name of auditing Subcategory which was changed. Possible values:
+
+| Credential Validation | Process Termination | Network Policy Server |
+|------------------------------------|----------------------------------------|--------------------------------|
+| Kerberos Authentication Service | RPC Events | Other Logon/Logoff Events |
+| Kerberos Service Ticket Operations | Detailed Directory Service Replication | Special Logon |
+| Other Logon/Logoff Events | Directory Service Access | Application Generated |
+| Application Group Management | Directory Service Changes | Certification Services |
+| Computer Account Management | Directory Service Replication | Detailed File Share |
+| Distribution Group Management | Account Lockout | File Share |
+| Other Account Management Events | IPsec Extended Mode | File System |
+| Security Group Management | IPsec Main Mode | Filtering Platform Connection |
+| User Account Management | IPsec Quick Mode | Filtering Platform Packet Drop |
+| DPAPI Activity | Logoff | Handle Manipulation |
+| Process Creation | Logon | Kernel Object |
+| Other Object Access Events | Filtering Platform Policy Change | IPsec Driver |
+| Registry | MPSSVC Rule-Level Policy Change | Other System Events |
+| SAM | Other Policy Change Events | Security State Change |
+| Policy Change | Non-Sensitive Privilege Use | Security System Extension |
+| Authentication Policy Change | Sensitive Privilege Use | System Integrity |
+| Authorization Policy Change | Other Privilege Use Events | Plug and Play Events |
+| Group Membership | | |
+
+- **Subcategory GUID:** the unique subcategory GUID. To see Subcategory GUIDs you can use this command: **auditpol /list /subcategory:\* /v**.
+
+
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Changes:** changes which were made for **“Subcategory”**. Possible values:
+
+ - Success removed
+
+ - Failure removed
+
+ - Success added
+
+ - Failure added
+
+ It can be also a combination of any of the items above, separated by coma.
+
+## Security Monitoring Recommendations
+
+For 4719(S): System audit policy was changed.
+
+- Monitor for all events of this type, especially on high value assets or computers, because any change in local audit policy should be planned. If this action was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4720.md b/windows/keep-secure/event-4720.md
new file mode 100644
index 0000000000..7ef1a7b270
--- /dev/null
+++ b/windows/keep-secure/event-4720.md
@@ -0,0 +1,288 @@
+---
+title: 4720(S) A user account was created. (Windows 10)
+description: Describes security event 4720(S) A user account was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4720(S): A user account was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time a new user object is created.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4720
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175408
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ksmith
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6609
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30dc2
+ -
+ ksmith
+ Ken Smith
+ ksmith@contoso.local
+ -
+ -
+ -
+ -
+ -
+ %%1794
+ %%1794
+ 513
+ -
+ 0x0
+ 0x15
+ %%2080 %%2082 %%2084
+ -
+ -
+ %%1793
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create user account” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create user account” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**New Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of created user account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the user account that was created. For example: dadmin.
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain name of created user account. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local accounts, this field will contain the name of the computer to which this new account belongs, for example: “Win81”.
+
+**Attributes:**
+
+- **SAM Account Name** \[Type = UnicodeString\]: logon name for account used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). The value of **sAMAccountName** attribute of new user object. For example: ksmith. For local account this field contains the name of new user account.
+
+- **Display Name** \[Type = UnicodeString\]: the value of **displayName** attribute of new user object. It is a name displayed in the address book for a particular account .This is usually the combination of the user's first name, middle initial, and last name. For example, Ken Smith. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. Local accounts contain **Full Name** attribute in this field, but for new local accounts this field typically has value “**<value not set>**”.
+
+- **User Principal Name** \[Type = UnicodeString\]: internet-style login name for the account, based on the Internet standard RFC 822. By convention this should map to the account's email name. This parameter contains the value of **userPrincipalName** attribute of new user object. For example, ksmith@contoso.local. For local users this field is not applicable and has value “**-**“. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Home Directory** \[Type = UnicodeString\]: user's home directory. If **homeDrive** attribute is set and specifies a drive letter, **homeDirectory** should be a UNC path. The path must be a network UNC of the form \\\\Server\\Share\\Directory. This parameter contains the value of **homeDirectory** attribute of new user object. For new local accounts this field typically has value “**<value not set>**”. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Home Drive** \[Type = UnicodeString\]**:** specifies the drive letter to which to map the UNC path specified by **homeDirectory** account’s attribute. The drive letter must be specified in the form “DRIVE\_LETTER:”. For example – “H:”. This parameter contains the value of **homeDrive** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”. For new local accounts this field typically has value “**<value not set>**”.
+
+- **Script Path** \[Type = UnicodeString\]**:** specifies the path of the account’s logon script. This parameter contains the value of **scriptPath** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”. For new local accounts this field typically has value “**<value not set>**”.
+
+- **Profile Path** \[Type = UnicodeString\]: specifies a path to the account's profile. This value can be a null string, a local absolute path, or a UNC path. This parameter contains the value of **profilePath** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”. For new local accounts this field typically has value “**<value not set>**”.
+
+- **User Workstations** \[Type = UnicodeString\]: contains the list of NetBIOS or DNS names of the computers from which the user can logon. Each computer name is separated by a comma. The name of a computer is the **sAMAccountName** property of a user object. This parameter contains the value of **userWorkstations** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”. For local users this field is not applicable and typically has value “**<value not set>**”.
+
+- **Password Last Set** \[Type = UnicodeString\]**:** last time the account’s password was modified. For manually created user account, using Active Directory Users and Computers snap-in, this field typically has value “**<never>”**. This parameter contains the value of **pwdLastSet** attribute of new user object.
+
+- **Account Expires** \[Type = UnicodeString\]: the date when the account expires. This parameter contains the value of **accountExpires** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”. For manually created local and domain user accounts this field typically has value “**<never>**”.
+
+- **Primary Group ID** \[Type = UnicodeString\]: Relative Identifier (RID) of user’s object primary group.
+
+> **Note** **Relative identifier (RID)** is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID) that uniquely identifies an account or group within a domain.
+
+Typically, **Primary Group** field for new user accounts has the following values:
+
+- 513 (Domain Users. For local accounts this RID means Users) – for domain and local users.
+
+ See this article for more information. This parameter contains the value of **primaryGroupID** attribute of new user object.
+
+
+
+- **Allowed To Delegate To** \[Type = UnicodeString\]: the list of SPNs to which this account can present delegated credentials. Can be changed using Active Directory Users and Computers management console in **Delegation** tab of user account, if this account has at least one SPN registered. This parameter contains the value of **AllowedToDelegateTo** attribute of new user object. For local user accounts this field is not applicable and typically has value “**-**“. For new domain user accounts it is typically has value “**-**“. See description of **AllowedToDelegateTo** field for “[4738](event-4738.md)(S): A user account was changed.” event for more details.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Old UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user account. **Old UAC value** always **“0x0”** for new user accounts. This parameter contains the previous value of **userAccountControl** attribute of user object.
+
+- **New UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user account. This parameter contains the value of **userAccountControl** attribute of new user object.
+
+To decode this value, you can go through the property value definitions in the “Table 7. User’s or Computer’s account UAC flags.” from largest to smallest. Compare each property value to the flags value in the event. If the flags value in the event is greater than or equal to the property value, then the property is "set" and applies to that event. Subtract the property value from the flags value in the event and note that the flag applies and then go on to the next flag.
+
+Here's an example: Flags value from event: 0x15
+
+Decoding:
+
+• PASSWD\_NOTREQD 0x0020
+
+• LOCKOUT 0x0010
+
+• HOMEDIR\_REQUIRED 0x0008
+
+• (undeclared) 0x0004
+
+• ACCOUNTDISABLE 0x0002
+
+• SCRIPT 0x0001
+
+0x0020 > 0x15, so PASSWD\_NOTREQD does not apply to this event
+
+0x10 < 0x15, so LOCKOUT applies to this event. 0x15 - 0x10 = 0x5
+
+0x4 < 0x5, so the undeclared value is set. We'll pretend it doesn't mean anything. 0x5 - 0x4 = 0x1
+
+0x2 > 0x1, so ACCOUNTDISABLE does not apply to this event
+
+0x1 = 0x1, so SCRIPT applies to this event. 0x1 - 0x1 = 0x0, we're done.
+
+So this UAC flags value decodes to: LOCKOUT and SCRIPT
+
+- **User Account Control** \[Type = UnicodeString\]**:** shows the list of changes in **userAccountControl** attribute. You will see a line of text for each change. For new user accounts, when the object for this account was created, the **userAccountControl** value was considered to be **“0x0”**, and then it was changed from **“0x0”** to the real value for the account's **userAccountControl** attribute. See possible values in the table below. In the “User Account Control field text” column, you can see the text that will be displayed in the **User Account Control** field in 4720 event.
+
+| Flag Name | userAccountControl in hexadecimal | userAccountControl in decimal | Description | User Account Control field text |
+|------------------------------------|-----------------------------------|-------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------|
+| SCRIPT | 0x0001 | 1 | The logon script will be run. | Changes of this flag do not show in 4720 events. |
+| ACCOUNTDISABLE | 0x0002 | 2 | The user account is disabled. | Account Disabled
Account Enabled |
+| Undeclared | 0x0004 | 4 | This flag is undeclared. | Changes of this flag do not show in 4720 events. |
+| HOMEDIR\_REQUIRED | 0x0008 | 8 | The home folder is required. | 'Home Directory Required' - Enabled
'Home Directory Required' - Disabled |
+| LOCKOUT | 0x0010 | 16 | | Changes of this flag do not show in 4720 events. |
+| PASSWD\_NOTREQD | 0x0020 | 32 | No password is required. | 'Password Not Required' - Enabled
'Password Not Required' - Disabled |
+| PASSWD\_CANT\_CHANGE | 0x0040 | 64 | The user cannot change the password. This is a permission on the user's object. | Changes of this flag do not show in 4720 events. |
+| ENCRYPTED\_TEXT\_PWD\_ALLOWED | 0x0080 | 128 | The user can send an encrypted password.
Can be set using “Store password using reversible encryption” checkbox. | 'Encrypted Text Password Allowed' - Disabled
'Encrypted Text Password Allowed' - Enabled |
+| TEMP\_DUPLICATE\_ACCOUNT | 0x0100 | 256 | This is an account for users whose primary account is in another domain. This account provides user access to this domain, but not to any domain that trusts this domain. This is sometimes referred to as a local user account. | Cannot be set for computer account. |
+| NORMAL\_ACCOUNT | 0x0200 | 512 | This is a default account type that represents a typical user. | 'Normal Account' - Disabled
'Normal Account' - Enabled |
+| INTERDOMAIN\_TRUST\_ACCOUNT | 0x0800 | 2048 | This is a permit to trust an account for a system domain that trusts other domains. | Cannot be set for computer account. |
+| WORKSTATION\_TRUST\_ACCOUNT | 0x1000 | 4096 | This is a computer account for a computer that is running Microsoft Windows NT 4.0 Workstation, Microsoft Windows NT 4.0 Server, Microsoft Windows 2000 Professional, or Windows 2000 Server and is a member of this domain. | 'Workstation Trust Account' - Disabled
'Workstation Trust Account' - Enabled |
+| SERVER\_TRUST\_ACCOUNT | 0x2000 | 8192 | This is a computer account for a domain controller that is a member of this domain. | 'Server Trust Account' - Enabled
'Server Trust Account' - Disabled |
+| DONT\_EXPIRE\_PASSWORD | 0x10000 | 65536 | Represents the password, which should never expire on the account.
Can be set using “Password never expires” checkbox. | 'Don't Expire Password' - Disabled
'Don't Expire Password' - Enabled |
+| MNS\_LOGON\_ACCOUNT | 0x20000 | 131072 | This is an MNS logon account. | 'MNS Logon Account' - Disabled
'MNS Logon Account' - Enabled |
+| SMARTCARD\_REQUIRED | 0x40000 | 262144 | When this flag is set, it forces the user to log on by using a smart card. | 'Smartcard Required' - Disabled
'Smartcard Required' - Enabled |
+| TRUSTED\_FOR\_DELEGATION | 0x80000 | 524288 | When this flag is set, the service account (the user or computer account) under which a service runs is trusted for Kerberos delegation. Any such service can impersonate a client requesting the service. To enable a service for Kerberos delegation, you must set this flag on the userAccountControl property of the service account.
If you enable Kerberos constraint or unconstraint delegation or disable these types of delegation in Delegation tab you will get this flag changed. | 'Trusted For Delegation' - Enabled
'Trusted For Delegation' - Disabled |
+| NOT\_DELEGATED | 0x100000 | 1048576 | When this flag is set, the security context of the user is not delegated to a service even if the service account is set as trusted for Kerberos delegation.
Can be set using “Account is sensitive and cannot be delegated” checkbox. | 'Not Delegated' - Disabled
'Not Delegated' - Enabled |
+| USE\_DES\_KEY\_ONLY | 0x200000 | 2097152 | Restrict this principal to use only Data Encryption Standard (DES) encryption types for keys.
Can be set using “Use Kerberos DES encryption types for this account” checkbox. | 'Use DES Key Only' - Disabled
'Use DES Key Only' - Enabled |
+| DONT\_REQ\_PREAUTH | 0x400000 | 4194304 | This account does not require Kerberos pre-authentication for logging on.
Can be set using “Do not require Kerberos preauthentication” checkbox. | 'Don't Require Preauth' - Disabled
'Don't Require Preauth' - Enabled |
+| PASSWORD\_EXPIRED | 0x800000 | 8388608 | The user's password has expired. | Changes of this flag do not show in 4720 events. |
+| TRUSTED\_TO\_AUTH\_FOR\_DELEGATION | 0x1000000 | 16777216 | The account is enabled for delegation. This is a security-sensitive setting. Accounts that have this option enabled should be tightly controlled. This setting lets a service that runs under the account assume a client's identity and authenticate as that user to other remote servers on the network.
If you enable Kerberos protocol transition delegation or disable this type of delegation in Delegation tab you will get this flag changed. | 'Trusted To Authenticate For Delegation' - Disabled
'Trusted To Authenticate For Delegation' - Enabled |
+| PARTIAL\_SECRETS\_ACCOUNT | 0x04000000 | 67108864 | The account is a read-only domain controller (RODC). This is a security-sensitive setting. Removing this setting from an RODC compromises security on that server. | No information. |
+
+For new, manually created, domain or local user accounts typical flags are:
+
+- Account Disabled
+
+- 'Password Not Required' - Enabled
+
+- 'Normal Account' – Enabled
+
+ After new user creation event you will typically see couple of “[4738](event-4738.md): A user account was changed.” events with new flags:
+
+- 'Password Not Required' – Disabled
+
+- Account Enabled
+
+
+
+- **User Parameters** \[Type = UnicodeString\]: if you change any setting using Active Directory Users and Computers management console in Dial-in tab of user’s account properties, then you will see **<value changed, but not displayed>** in this field in “[4738](event-4738.md): A user account was changed.” This parameter might not be captured in the event, and in that case appears as “-”. For new local accounts this field typically has value “**<value not set>**”.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. This parameter contains the value of **sIDHistory** attribute of new user object. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Logon Hours** \[Type = UnicodeString\]: hours that the account is allowed to logon to the domain. The value of **logonHours** attribute of new user object. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. You will typically see “**<value not set>**” value for new manually created user accounts in event 4720. For new local accounts this field is not applicable and typically has value “**All**”.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4720(S): A user account was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Some organizations monitor every [4720](event-4720.md) event.
+
+- Consider whether to track the following fields and values:
+
+| **Field and value to track** | **Reason to track** |
+|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **SAM Account Name** is empty or - | This field must contain the user account name. If it is empty or **-**, it might indicate an anomaly. |
+| **User Principal Name** is empty or - | Typically this field should not be empty for new user accounts. If it is empty or **-**, it might indicate an anomaly. |
+| **Home Directory** is not -
**Home Drive** is not -
**Script Path** is not -
**Profile Path** is not -
**User Workstations** is not - | Typically these fields are **-** for new user accounts. Other values might indicate an anomaly and should be monitored.
For local accounts these fields should display **<value not set>**. |
+| **Password Last Set** is **<never>** | This typically means this is a manually created user account, which you might need to monitor. |
+| **Password Last Set** is a time in the future | This might indicate an anomaly. |
+| **Account Expires** is not **<never>** | Typically this field is **<never>** for new user accounts. Other values might indicate an anomaly and should be monitored. |
+| **Primary Group ID** is not 513 | Typically, the **Primary Group** value is 513 for domain and local users. Other values should be monitored. |
+| **Allowed To Delegate To** is not - | Typically this field is **-** for new user accounts. Other values might indicate an anomaly and should be monitored. |
+| **Old UAC Value** is not 0x0 | Typically this field is **0x0** for new user accounts. Other values might indicate an anomaly and should be monitored. |
+| **SID History** is not - | This field will always be set to - unless the account was migrated from another domain. |
+| **Logon Hours** value other than **<value not set>** or** “All”** | This should always be **<value not set>** for new domain user accounts, and **“All”** for new local user accounts. |
+
+- Consider whether to track the following user account control flags:
+
+| **User account control flag to track** | **Information about the flag** |
+|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **'Normal Account'** – Disabled | Should not be disabled for user accounts. |
+| **'Encrypted Text Password Allowed'** – Enabled
**'Smartcard Required'** – Enabled
**'Not Delegated'** – Enabled
**'Use DES Key Only'** – Enabled
**'Don't Require Preauth'** – Enabled
**'Trusted To Authenticate For Delegation'** – Enabled | By default, these flags should not be enabled for new user accounts created with the “Active Directory Users and Computers” snap-in. |
+| **'Server Trust Account'** – Enabled | Should never be enabled for user accounts. Applies only to domain controller (computer) accounts. |
+| **'Don't Expire Password'** – Enabled | Should be monitored for critical accounts, or all accounts if your organization does not allow this flag. By default, this flag should not be enabled for new user accounts created with the “Active Directory Users and Computers” snap-in. |
+| **'Trusted For Delegation'** – Enabled | By default, this flag should not be enabled for new user accounts created with the “Active Directory Users and Computers” snap-in. It is enabled by default only for new domain controllers. |
+
diff --git a/windows/keep-secure/event-4722.md b/windows/keep-secure/event-4722.md
new file mode 100644
index 0000000000..aaf7fa9ca4
--- /dev/null
+++ b/windows/keep-secure/event-4722.md
@@ -0,0 +1,123 @@
+---
+title: 4722(S) A user account was enabled. (Windows 10)
+description: Describes security event 4722(S) A user account was enabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4722(S): A user account was enabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time user or computer object is enabled.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+For computer accounts, this event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4722
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175716
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Auditor
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enable account” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enable account” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was enabled. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was enabled.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+## Security Monitoring Recommendations
+
+For 4722(S): A user account was enabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a high-value domain or local account for which you need to monitor every change, monitor all [4722](event-4722.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have domain or local accounts that should never be enabled, you can monitor all [4722](event-4722.md) events with the “**Target Account\\Security ID”** fields that correspond to the accounts.
+
+- We recommend monitoring all [4722](event-4722.md) events for local accounts, because these accounts usually do not change often. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
diff --git a/windows/keep-secure/event-4723.md b/windows/keep-secure/event-4723.md
new file mode 100644
index 0000000000..f59314b77b
--- /dev/null
+++ b/windows/keep-secure/event-4723.md
@@ -0,0 +1,134 @@
+---
+title: 4723(S, F) An attempt was made to change an account's password. (Windows 10)
+description: Describes security event 4723(S, F) An attempt was made to change an account's password.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4723(S, F): An attempt was made to change an account's password.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time a user attempts to change his or her password.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+For domain accounts, a Failure event generates if new password fails to meet the password policy.
+
+For local accounts, a Failure event generates if new password fails to meet the password policy or old password is wrong.
+
+For domain accounts if old password was wrong, then “[4771](event-4771.md): Kerberos pre-authentication failed” or “[4776](event-4776.md): The computer attempted to validate the credentials for an account” will be generated on domain controller if specific subcategories were enabled on it.
+
+Typically you will see 4723 events with the same **Subject\\Security ID** and **Target Account\\Security ID** fields, which is normal behavior.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4723
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175722
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ dadmin
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x1a9b76
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to change Target’s Account password. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to change Target’s Account password.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:** account for which the password change was requested.
+
+- **Security ID** \[Type = SID\]**:** SID of account for which the password change was requested. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which the password change was requested.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4723(S, F): An attempt was made to change an account's password.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a high-value domain or local user account for which you need to monitor every password change attempt, monitor all [4723](event-4723.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have a high-value domain or local account for which you need to monitor every change, monitor all [4723](event-4723.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have domain or local accounts for which the password should never be changed, you can monitor all [4723](event-4723.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
diff --git a/windows/keep-secure/event-4724.md b/windows/keep-secure/event-4724.md
new file mode 100644
index 0000000000..b71a0364cc
--- /dev/null
+++ b/windows/keep-secure/event-4724.md
@@ -0,0 +1,131 @@
+---
+title: 4724(S, F) An attempt was made to reset an account's password. (Windows 10)
+description: Describes security event 4724(S, F) An attempt was made to reset an account's password.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4724(S, F): An attempt was made to reset an account's password.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time an account attempted to reset the password for another account.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+For domain accounts, a Failure event generates if the new password fails to meet the password policy.
+
+A Failure event does NOT generate if user gets “Access Denied” while doing the password reset procedure.
+
+This event also generates if a computer account reset procedure was performed.
+
+For local accounts, a Failure event generates if the new password fails to meet the local password policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4724
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175740
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ User1
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-1107
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to reset Target’s Account password. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to reset Target’s Account password.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:** account for which password reset was requested.
+
+- **Security ID** \[Type = SID\]**:** SID of account for which password reset was requested. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which password reset was requested.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+## Security Monitoring Recommendations
+
+For 4724(S, F): An attempt was made to reset an account's password.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a high-value domain or local user account for which you need to monitor every password reset attempt, monitor all [4724](event-4724.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have a high-value domain or local account for which you need to monitor every change, monitor all [4724](event-4724.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have domain or local accounts for which the password should never be reset, you can monitor all [4724](event-4724.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- We recommend monitoring all [4724](event-4724.md) events for local accounts, because their passwords usually do not change often. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
diff --git a/windows/keep-secure/event-4725.md b/windows/keep-secure/event-4725.md
new file mode 100644
index 0000000000..e9e4393343
--- /dev/null
+++ b/windows/keep-secure/event-4725.md
@@ -0,0 +1,123 @@
+---
+title: 4725(S) A user account was disabled. (Windows 10)
+description: Describes security event 4725(S) A user account was disabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4725(S): A user account was disabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time user or computer object is disabled.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+For computer accounts, this event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4725
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175714
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Auditor
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “disable account” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “disable account” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was disabled. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was disabled.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+## Security Monitoring Recommendations
+
+For 4725(S): A user account was disabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a high-value domain or local account for which you need to monitor every change, monitor all [4725](event-4725.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have domain or local accounts that should never be disabled (for example, service accounts), you can monitor all [4725](event-4725.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- We recommend monitoring all [4725](event-4725.md) events for local accounts, because these accounts usually do not change often. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
diff --git a/windows/keep-secure/event-4726.md b/windows/keep-secure/event-4726.md
new file mode 100644
index 0000000000..605e5be4b1
--- /dev/null
+++ b/windows/keep-secure/event-4726.md
@@ -0,0 +1,126 @@
+---
+title: 4726(S) A user account was deleted. (Windows 10)
+description: Describes security event 4726(S) A user account was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4726(S): A user account was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time user object was deleted.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4726
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175720
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ksmith
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6609
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete user account” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete user account” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was deleted. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was deleted.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4726(S): A user account was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a high-value domain or local account for which you need to monitor every change (or deletion), monitor all [4726](event-4726.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- If you have a domain or local account that should never be deleted (for example, service accounts), monitor all [4726](event-4726.md) events with the **“Target Account\\Security ID”** that corresponds to the account.
+
+- We recommend monitoring all [4726](event-4726.md) events for local accounts, because these accounts typically are not deleted often. This is especially relevant for critical servers, administrative workstations, and other high value assets.
+
diff --git a/windows/keep-secure/event-4731.md b/windows/keep-secure/event-4731.md
new file mode 100644
index 0000000000..3edf72933e
--- /dev/null
+++ b/windows/keep-secure/event-4731.md
@@ -0,0 +1,134 @@
+---
+title: 4731(S) A security-enabled local group was created. (Windows 10)
+description: Describes security event 4731(S) A security-enabled local group was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4731(S): A security-enabled local group was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time a new security-enabled (security) local group was created.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4731
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 174849
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ AccountOperators
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6605
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3031e
+ -
+ AccountOperators
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**New Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of created group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was created. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the created group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+**Attributes:**
+
+- **SAM Account Name** \[Type = UnicodeString\]: This is a name of new group used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). The value of **sAMAccountName** attribute of new group object. For example: ServiceDesk. For local groups it is simply a name of new group.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. This parameter contains the value of **sIDHistory** attribute of new group object. This parameter might not be captured in the event, and in that case appears as “-”. For local groups it is not applicable and always has “**-**“ value.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4731(S): A security-enabled local group was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor each time a new security group is created, to see who created the group and when, monitor this event.
+
+- If you need to monitor the creation of local security groups on different servers, and you use Windows Event Forwarding to collect events in a central location, check “**New Group\\Group Domain.**” It should not be the name of the domain, but instead should be the computer name.
+
+- If your organization has naming conventions for account names, monitor “**Attributes\\SAM Account Name”** for names that don’t comply with the naming conventions.
+
diff --git a/windows/keep-secure/event-4732.md b/windows/keep-secure/event-4732.md
new file mode 100644
index 0000000000..be676a7515
--- /dev/null
+++ b/windows/keep-secure/event-4732.md
@@ -0,0 +1,158 @@
+---
+title: 4732(S) A member was added to a security-enabled local group. (Windows 10)
+description: Describes security event 4732(S) A member was added to a security-enabled local group.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4732(S): A member was added to a security-enabled local group.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time a new member was added to a security-enabled (security) local group.
+
+This event generates on domain controllers, member servers, and workstations.
+
+For every added member you will get separate 4732 event.
+
+You will typically see “[4735](event-4735.md): A security-enabled local group was changed.” event without any changes in it prior to 4732 event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4732
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 174856
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=eadmin,CN=Users,DC=contoso,DC=local
+ S-1-5-21-3457937927-2839227994-823803824-500
+ AccountOperators
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6605
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3031e
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “add member to the group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “add member to the group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Member:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was added to the group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]: distinguished name of account that was added to the group. For example: “CN=Auditor,CN=Users,DC=contoso,DC=local”. For local groups this field typically has “**-**“ value, even if new member is a domain account. For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “-”.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of the group to which new member was added. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group to which new member was added. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the group to which the new member was added. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4732(S): A member was added to a security-enabled local group.
+
+| **Type of monitoring required** | **Recommendation** |
+|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Addition of members to local or domain security groups:** You might need to monitor the addition of members to local or domain security groups. | If you need to monitor each time a member is added to a local or domain security group, to see who added the member and when, monitor this event.
Typically, this event is used as an informational event, to be reviewed if needed. |
+| **High-value local or domain security groups:** You might have a list of critical local or domain security groups in the organization, and need to specifically monitor these groups for the addition of new members (or for other changes).
Examples of critical local or domain groups are built-in local administrators group, domain admins, enterprise admins, and so on. | Monitor this event with the “**Group\\Group Name”** values that correspond to the high-value local or domain security groups. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+| **Mismatch between type of account (user or computer) and the group it was added to**: You might want to monitor to ensure that a computer account was not added to a group intended for users, or a user account was not added to a group intended for computers. | Monitor the type of account added to the group to see if it matches what the group is intended for. |
+
diff --git a/windows/keep-secure/event-4733.md b/windows/keep-secure/event-4733.md
new file mode 100644
index 0000000000..5b4c8ee111
--- /dev/null
+++ b/windows/keep-secure/event-4733.md
@@ -0,0 +1,164 @@
+---
+title: 4733(S) A member was removed from a security-enabled local group. (Windows 10)
+description: Describes security event 4733(S) A member was removed from a security-enabled local group.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4733(S): A member was removed from a security-enabled local group.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time member was removed from security-enabled (security) local group.
+
+This event generates on domain controllers, member servers, and workstations.
+
+For every removed member you will get separate 4733 event.
+
+You will typically see “[4735](event-4735.md): A security-enabled local group was changed.” event without any changes in it prior to 4733 event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4733
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 175037
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=Auditor,CN=Users,DC=contoso,DC=local
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ AccountOperators
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6605
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x35e38
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “remove member from the group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “remove member from the group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Member:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was removed from the group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]: distinguished name of account that was removed from the group. For example: “CN=Auditor,CN=Users,DC=contoso,DC=local”. For local groups this field typically has “**-**“ value, even if removed member is a domain account. For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “-”.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of the group from which the member was removed. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group from which the member was removed. For example: ServiceDesk
+
+
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the group from which the member was removed. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4733(S): A member was removed from a security-enabled local group.
+
+| **Type of monitoring required** | **Recommendation** |
+|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Removal of members from local or domain security groups:** You might need to monitor the removal of members from local or domain security groups. | If you need to monitor each time a member is removed from a local or domain security group, to see who added the member and when, monitor this event.
Typically, this event is used as an informational event, to be reviewed if needed. |
+| **High-value local or domain security groups:** You might have a list of critical local or domain security groups in the organization, and need to specifically monitor these groups for the removal of members (or for other changes).
Examples of critical local or domain groups are built-in local administrators group, domain admins, enterprise admins, and so on. | Monitor this event with the “**Group\\Group Name”** values that correspond to the high-value local or domain security groups. |
+| **Local or domain security groups with required members**: You might need to ensure that for certain local or domain security groups, particular members are never removed. | Monitor this event with the “**Group\\Group Name”** that corresponds to the group of interest, and the **“Member\\Security ID”** of the members who should not be removed. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4734.md b/windows/keep-secure/event-4734.md
new file mode 100644
index 0000000000..5ee0ad8db7
--- /dev/null
+++ b/windows/keep-secure/event-4734.md
@@ -0,0 +1,126 @@
+---
+title: 4734(S) A security-enabled local group was deleted. (Windows 10)
+description: Describes security event 4734(S) A security-enabled local group was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4734(S): A security-enabled local group was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time security-enabled (security) local group is deleted.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4734
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 175039
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ AccountOperators
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6605
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x35e38
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of deleted group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was deleted. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the deleted group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4734(S): A security-enabled local group was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical local or domain security groups in the organization, and need to specifically monitor these groups for any change, especially group deletion, monitor events with the “**Group\\Group Name”** values that correspond to the critical local or domain security groups. Examples of critical local or domain groups are built-in local administrators group, domain admins, enterprise admins, and so on.
+
+- If you need to monitor each time a local or domain security group is deleted, to see who deleted it and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
diff --git a/windows/keep-secure/event-4735.md b/windows/keep-secure/event-4735.md
new file mode 100644
index 0000000000..56b28b5e54
--- /dev/null
+++ b/windows/keep-secure/event-4735.md
@@ -0,0 +1,152 @@
+---
+title: 4735(S) A security-enabled local group was changed. (Windows 10)
+description: Describes security event 4735(S) A security-enabled local group was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4735(S): A security-enabled local group was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time a security-enabled (security) local group is changed.
+
+This event generates on domain controllers, member servers, and workstations.
+
+Some changes do not invoke a 4735 event, for example, changes made using Active Directory Users and Computers management console in **Managed By** tab in group account properties.
+
+If you change the name of the group (SAM Account Name), you also get “[4781](event-4781.md): The name of an account was changed” if “[Audit User Account Management](audit-user-account-management.md)” subcategory success auditing is enabled.
+
+If you change the group type, you get a change event from the new group type auditing subcategory instead of 4735. If you need to monitor for group type changes, it is better to monitor for “[4764](event-4764.md): A group’s type was changed.” These events are generated for any group type when group type is changed. “[Audit Security Group Management](audit-security-group-management.md)” subcategory success auditing must be enabled.
+
+From 4735 event you can get information about changes of **sAMAccountName** and **sIDHistory** attributes or you will see that something changed, but will not be able to see what exactly changed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4735
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 174850
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ AccountOperators\_NEW
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6605
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3031e
+ -
+ AccountOperators\_NEW
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of changed group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** Sometimes you can see the **Group\\Security ID** field contains an old group name in Event Viewer (as you can see in the event example). That happens because Event Viewer caches names for SIDs that it has already resolved for the current session.
+
+> **Note** **Security ID** field has the same value as new group name (**Changed Attributes>SAM Account Name**). That is happens because event is generated after name was changed and SID resolves to the new name. It is always better to use SID instead of group names for queries or filtering of events, because you will know for sure that this the right object you are looking for or want to monitor.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was changed. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the changed group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Changed Attributes:**
+
+> **Note** If attribute was not changed it will have “-“ value.
+
+You might see a 4735 event without any changes inside, that is, where all Changed Attributes apear as “-“. This usually happens when a change is made to an attribute that is not listed in the event. In this case there is no way to determine which attribute was changed. For example, this would happen if you change the Description of a group object using the Active Directory Users and Computers administrative console. Also, if the [discretionary access control list](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) (DACL) is changed, a 4735 event will generate, but all attributes will be “-“.
+
+- **SAM Account Name** \[Type = UnicodeString\]: This is a new name of changed group used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). If the value of **sAMAccountName** attribute of group object was changed, you will see the new value here. For example: ServiceDesk. For local groups it is simply a new name of the group, if it was changed.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. If the value of **sIDHistory** attribute of group object was changed, you will see the new value here. For local groups it is not applicable and always has “**-**“ value.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4735(S): A security-enabled local group was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical local or domain security groups in the organization, and need to specifically monitor these groups for any change, monitor events with the “**Group\\Group Name”** values that correspond to the critical local or domain security groups.
+
+- If you need to monitor each time a member is added to a local or domain security group, to see who added the member and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
+- If your organization has naming conventions for account names, monitor “**Attributes\\SAM Account Name”** for names that don’t comply with the naming conventions.
+
diff --git a/windows/keep-secure/event-4738.md b/windows/keep-secure/event-4738.md
new file mode 100644
index 0000000000..4eeb20f066
--- /dev/null
+++ b/windows/keep-secure/event-4738.md
@@ -0,0 +1,291 @@
+---
+title: 4738(S) A user account was changed. (Windows 10)
+description: Describes security event 4738(S) A user account was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4738(S): A user account was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time user object is changed.
+
+This event generates on domain controllers, member servers, and workstations.
+
+For each change, a separate 4738 event will be generated.
+
+You might see this event without any changes inside, that is, where all **Changed Attributes** apear as “-“. This usually happens when a change is made to an attribute that is not listed in the event. In this case there is no way to determine which attribute was changed. For example, if the [discretionary access control list](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) (DACL) is changed, a 4738 event will generate, but all attributes will be “-“.
+
+Some changes do not invoke a 4738 event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4738
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175413
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ -
+ ksmith
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6609
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30dc2
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ 0x15
+ 0x211
+ %%2050 %%2089
+ -
+ -
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change user account” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change user account” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was changed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was changed.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+**Changed Attributes:**
+
+If attribute was not changed it will have “–“ value.
+
+Unfortunately, for local accounts, all fields, except changed attributes, will have previous values populated. Also, the User Account Control field will have values only if it was modified. Changed attributes will have new values, but it is hard to understand which attribute was really changed.
+
+- **SAM Account Name** \[Type = UnicodeString\]: logon name for account used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). If the value of **sAMAccountName** attribute of user object was changed, you will see the new value here. For example: ladmin. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Display Name** \[Type = UnicodeString\]: it is a name, displayed in the address book for a particular account. This is usually the combination of the user's first name, middle initial, and last name. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. If the value of **displayName** attribute of user object was changed, you will see the new value here. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **User Principal Name** \[Type = UnicodeString\]: internet-style login name for the account, based on the Internet standard RFC 822. By convention this should map to the account's email name. If the value of **userPrincipalName** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field is not applicable and always has “-“ value.
+
+- **Home Directory** \[Type = UnicodeString\]: user's home directory. If **homeDrive** attribute is set and specifies a drive letter, **homeDirectory** should be a UNC path. The path must be a network UNC of the form \\\\Server\\Share\\Directory. If the value of **homeDirectory** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Home Drive** \[Type = UnicodeString\]**:** specifies the drive letter to which to map the UNC path specified by **homeDirectory** account’s attribute. The drive letter must be specified in the form “DRIVE\_LETTER:”. For example – “H:”. If the value of **homeDrive** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Script Path** \[Type = UnicodeString\]**:** specifies the path of the account’s logon script. If the value of **scriptPath** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Profile Path** \[Type = UnicodeString\]: specifies a path to the account's profile. This value can be a null string, a local absolute path, or a UNC path. If the value of **profilePath** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **User Workstations** \[Type = UnicodeString\]: contains the list of NetBIOS or DNS names of the computers from which the user can logon. Each computer name is separated by a comma. The name of a computer is the **sAMAccountName** property of a computer object. If the value of **userWorkstations** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field is not applicable and always appears as “**<value not set>**.“
+
+- **Password Last Set** \[Type = UnicodeString\]**:** last time the account’s password was modified. If the value of **pwdLastSet** attribute of user object was changed, you will see the new value here. For example: 8/12/2015 11:41:39 AM. This value will be changed, for example, after manual user account password reset. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Account Expires** \[Type = UnicodeString\]: the date when the account expires. If the value of **accountExpires** attribute of user object was changed, you will see the new value here. . For example, “9/21/2015 12:00:00 AM”. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. For local accounts, this field always has some value—if the account's attribute was not changed it will contain the current value of the attribute.
+
+- **Primary Group ID** \[Type = UnicodeString\]: Relative Identifier (RID) of user’s object primary group.
+
+> **Note** **Relative identifier (RID)** is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID) that uniquely identifies an account or group within a domain.
+
+This field will contain some value if user’s object primary group was changed. You can change user’s primary group using Active Directory Users and Computers management console in the **Member Of** tab of user object properties. You will see a RID of new primary group as a field value. For example, RID 513 (Domain Users) is a default primary group for users.
+
+Typical **Primary Group** values for user accounts:
+
+- 513 (Domain Users. For local accounts this RID means Users) – for domain and local users.
+
+ See this article for more information. If the value of **primaryGroupID** attribute of user object was changed, you will see the new value here.
+
+
+
+- **AllowedToDelegateTo** \[Type = UnicodeString\]: the list of SPNs to which this account can present delegated credentials. Can be changed using Active Directory Users and Computers management console in **Delegation** tab of user account, if at least one SPN is registered for user account. If the SPNs list on **Delegation** tab of a user account was changed, you will see the new SPNs list in **AllowedToDelegateTo** field (note that you will see the new list instead of changes) of this event. This is an example of **AllowedToDelegateTo**:
+
+ - dcom/WIN2012
+
+ - dcom/WIN2012.contoso.local
+
+ If the value of **msDS-AllowedToDelegateTo** attribute of user object was changed, you will see the new value here.
+
+ The value can be “**<value not set>**”, for example, if delegation was disabled.
+
+ For local accounts, this field is not applicable and always has “-“ value.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Old UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user account. This parameter contains the previous value of **userAccountControl** attribute of user object.
+
+- **New UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user account. If the value of **userAccountControl** attribute of user object was changed, you will see the new value here.
+
+To decode this value, you can go through the property value definitions in the “Table 7. User’s or Computer’s account UAC flags.” from largest to smallest. Compare each property value to the flags value in the event. If the flags value in the event is greater than or equal to the property value, then the property is "set" and applies to that event. Subtract the property value from the flags value in the event and note that the flag applies and then go on to the next flag.
+
+Here's an example: Flags value from event: 0x15
+
+Decoding:
+
+• PASSWD\_NOTREQD 0x0020
+
+• LOCKOUT 0x0010
+
+• HOMEDIR\_REQUIRED 0x0008
+
+• (undeclared) 0x0004
+
+• ACCOUNTDISABLE 0x0002
+
+• SCRIPT 0x0001
+
+0x0020 > 0x15, so PASSWD\_NOTREQD does not apply to this event
+
+0x10 < 0x15, so LOCKOUT applies to this event. 0x15 - 0x10 = 0x5
+
+0x4 < 0x5, so the undeclared value is set. We'll pretend it doesn't mean anything. 0x5 - 0x4 = 0x1
+
+0x2 > 0x1, so ACCOUNTDISABLE does not apply to this event
+
+0x1 = 0x1, so SCRIPT applies to this event. 0x1 - 0x1 = 0x0, we're done.
+
+So this UAC flags value decodes to: LOCKOUT and SCRIPT
+
+- **User Account Control** \[Type = UnicodeString\]**:** shows the list of changes in **userAccountControl** attribute. You will see a line of text for each change. See possible values in here: “Table 7. User’s or Computer’s account UAC flags.”. In the “User Account Control field text” column, you can see the text that will be displayed in the **User Account Control** field in 4738 event.
+
+- **User Parameters** \[Type = UnicodeString\]: if you change any setting using Active Directory Users and Computers management console in Dial-in tab of user’s account properties, then you will see **<value changed, but not displayed>** in this field. For local accounts, this field is not applicable and always has “<value not set>“ value.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. If the value of **sIDHistory** attribute of user object was changed, you will see the new value here.
+
+- **Logon Hours** \[Type = UnicodeString\]: hours that the account is allowed to logon to the domain. If the value of **logonHours** attribute of user object was changed, you will see the new value here. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. Here is an example of this field:
+
+ Sunday 12:00 AM - 7:00 PM
+
+ Sunday 9:00 PM -Monday 1:00 PM
+
+ Monday 2:00 PM -Tuesday 6:00 PM
+
+ Tuesday 8:00 PM -Wednesday 10:00 AM
+
+ For local accounts this field is not applicable and typically has value “**All**”.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4738(S): A user account was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Some organizations monitor every [4738](event-4738.md) event.
+
+- If you have critical user computer accounts (for example, domain administrator accounts or service accounts) for which you need to monitor each change, monitor this event with the **“Target Account\\Account Name”** that corresponds to the critical account or accounts.
+
+- If you have user accounts for which any change in the services list on the **Delegation** tab should be monitored, monitor this event when **AllowedToDelegateTo** is not -. This value means the services list was changed.
+
+- Consider whether to track the following fields:
+
+| **Field to track** | **Reason to track** |
+|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Display Name**
**User Principal Name**
**Home Directory**
**Home Drive**
**Script Path**
**Profile Path**
**User Workstations**
**Password Last Set**
**Account Expires**
**Primary Group ID
Logon Hours** | We recommend monitoring all changes for these fields for critical domain and local accounts. |
+| **Primary Group ID** is not 513 | Typically, the **Primary Group** value is 513 for domain and local users. Other values should be monitored. |
+| For user accounts for which the services list (on the **Delegation** tab) should not be empty: **AllowedToDelegateTo** is marked **<value not set> ** | If **AllowedToDelegateTo** is marked **<value not set>** on user accounts that previously had a services list (on the **Delegation** tab), it means the list was cleared. |
+| **SID History** is not - | This field will always be set to - unless the account was migrated from another domain. |
+
+- Consider whether to track the following user account control flags:
+
+| **User account control flag to track** | **Information about the flag** |
+|---------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **'Normal Account'** – Disabled | Should not be disabled for user accounts. |
+| **'Password Not Required'** – Enabled | Should not typically be enabled for user accounts because it weakens security for the account. |
+| **'Encrypted Text Password Allowed'** – Enabled | Should not typically be enabled for user accounts because it weakens security for the account. |
+| **'Server Trust Account'** – Enabled | Should never be enabled for user accounts. Applies only to domain controller (computer) accounts. |
+| **'Don't Expire Password'** – Enabled | Should be monitored for critical accounts, or all accounts if your organization does not allow this flag. |
+| **'Smartcard Required'** – Enabled | Should be monitored for critical accounts. |
+| **'Password Not Required'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+| **'Encrypted Text Password Allowed'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+| **'Don't Expire Password'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+| **'Smartcard Required'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+| **'Trusted For Delegation'** – Enabled | Means that Kerberos Constraint or Unconstraint delegation was enabled for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Trusted For Delegation'** – Disabled | Means that Kerberos Constraint or Unconstraint delegation was disabled for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action.
Also, if you have a list of user accounts for which delegation is critical and should not be disabled, monitor this for those accounts. |
+| **'Trusted To Authenticate For Delegation'** – Enabled | Means that Protocol Transition delegation was enabled for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Trusted To Authenticate For Delegation'** – Disabled | Means that Protocol Transition delegation was disabled for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action.
Also, if you have a list of user accounts for which delegation is critical and should not be disabled, monitor this for those accounts. |
+| **'Not Delegated'** – Enabled | Means that **Account is sensitive and cannot be delegated** was checked for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Not Delegated'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” Means that **Account is sensitive and cannot be delegated** was unchecked for the user account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Use DES Key Only'** – Enabled | Should not typically be enabled for user accounts because it weakens security for the account’s Kerberos authentication. |
+| **'Don't Require Preauth'** – Enabled | Should not be enabled for user accounts because it weakens security for the account’s Kerberos authentication. |
+| **'Use DES Key Only'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+| **'Don't Require Preauth'** – Disabled | Should be monitored for all accounts where the setting should be “**Enabled**.” |
+
diff --git a/windows/keep-secure/event-4739.md b/windows/keep-secure/event-4739.md
new file mode 100644
index 0000000000..03f4def1f9
--- /dev/null
+++ b/windows/keep-secure/event-4739.md
@@ -0,0 +1,226 @@
+---
+title: 4739(S) Domain Policy was changed. (Windows 10)
+description: Describes security event 4739(S) Domain Policy was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4739(S): Domain Policy was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when one of the following changes was made to local computer security policy:
+
+- Computer’s “\\Security Settings\\Account Policies\\Account Lockout Policy” settings were modified.
+
+- Computer's “\\Security Settings\\Account Policies\\Password Policy” settings were modified.
+
+- "Network security: Force logoff when logon hours expire" group policy setting was changed.
+
+- Domain functional level was changed or some other attributes changed (see details in event description).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4739
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049781
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Password Policy
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ 13
+ -
+ -
+ -
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Change Type** \[Type = UnicodeString\]**:** the type of change which was made. The format is “**policy\_name** modified”. These are some possible values of **policy\_name**:
+
+| Value | Group Policy Name \\ Description |
+|-----------------|---------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Lockout Policy | Computer’s “\\Security Settings\\Account Policies\\Account Lockout Policy” settings were modified. |
+| Password Policy | Computer's “\\Security Settings\\Account Policies\\Password Policy” settings were modified. |
+| Logoff Policy | "[Network security: Force logoff when logon hours expire](https://technet.microsoft.com/en-us/library/jj852195.aspx)" group policy setting was changed. |
+| - | Machine Account Quota ([ms-DS-MachineAccountQuota](https://technet.microsoft.com/en-us/library/dd391926(v=ws.10).aspx)) domain attribute was modified. |
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to specific local policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to specific local policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Domain:**
+
+- **Domain Name** \[Type = UnicodeString\]**:** the name of domain for which policy changes were made.
+
+
+
+- **Domain ID** \[Type = SID\]**:** the SID of domain for which policy changes were made. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Changed Attributes:** For attributes which were not changed the value will be “**-**“.
+
+- **Min. Password Age** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Password Policy\\Minimum password age” group policy. Numeric value.
+
+
+
+- **Max. Password Age** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Password Policy\\Maximum password age” group policy. Numeric value.
+
+- **Force Logoff** \[Type = UnicodeString\]: “\\Security Settings\\Local Policies\\Security Options\\Network security: Force logoff when logon hours expire” group policy.
+
+- **Lockout Threshold** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Account Lockout Policy\\Account lockout threshold” group policy. Numeric value.
+
+- **Lockout Observation Window** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Account Lockout Policy\\Reset account lockout counter after” group policy. Numeric value.
+
+- **Lockout Duration** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Account Lockout Policy\\Account lockout duration” group policy. Numeric value.
+
+- **Password Properties** \[Type = UnicodeString\]:
+
+| Value | Group Policy settings |
+|-------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | \\Security Settings\\Account Policies\\Password Policy\\Store passwords using reversible encryption - Disabled.
\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements – Disabled. |
+| 1 | \\Security Settings\\Account Policies\\Password Policy\\Store passwords using reversible encryption - Disabled.
\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements – Enabled. |
+| 16 | \\Security Settings\\Account Policies\\Password Policy\\Store passwords using reversible encryption - Enabled.
\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements – Disabled. |
+| 17 | \\Security Settings\\Account Policies\\Password Policy\\Store passwords using reversible encryption - Enabled.
\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements – Enabled. |
+
+- **Min. Password Length** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Password Policy\\Minimum password length” group policy. Numeric value.
+
+- **Password History Length** \[Type = UnicodeString\]: “\\Security Settings\\Account Policies\\Password Policy\\Enforce password history” group policy. Numeric value.
+
+- **Machine Account Quota** \[Type = UnicodeString\]: [ms-DS-MachineAccountQuota](https://technet.microsoft.com/en-us/library/dd391926(v=ws.10).aspx) domain attribute was modified. Numeric value.
+
+- **Mixed Domain Mode** \[Type = UnicodeString\]: there is no information about this field in this document.
+
+- **Domain Behavior Version** \[Type = UnicodeString\]: [msDS-Behavior-Version](https://msdn.microsoft.com/en-us/library/cc223742.aspx) domain attribute was modified. Numeric value. Possible values:
+
+| Value | Identifier | Domain controller operating systems that are allowed in the domain |
+|-------|---------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | DS\_BEHAVIOR\_WIN2000 | Windows 2000 Server operating system
Windows Server 2003 operating system
Windows Server 2008 operating system
Windows Server 2008 R2 operating system
Windows Server 2012 operating system
Windows Server 2012 R2 operating system
Windows Server 2016 Technical Preview operating system |
+| 1 | DS\_BEHAVIOR\_WIN2003\_WITH\_MIXED\_DOMAINS | Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 2 | DS\_BEHAVIOR\_WIN2003 | Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 3 | DS\_BEHAVIOR\_WIN2008 | Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 4 | DS\_BEHAVIOR\_WIN2008R2 | Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 5 | DS\_BEHAVIOR\_WIN2012 | Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 6 | DS\_BEHAVIOR\_WIN2012R2 | Windows Server 2012 R2
Windows Server 2016 Technical Preview |
+| 7 | DS\_BEHAVIOR\_WINTHRESHOLD | Windows Server 2016 Technical Preview |
+
+- **OEM Information** \[Type = UnicodeString\]: there is no information about this field in this document.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in the table below:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Deleg**ation setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+## Security Monitoring Recommendations
+
+For 4739(S): Domain Policy was changed.
+
+- Any settings changes to “**Account Lockout Policy**”, “**Password Policy**”, or “**Network security: Force logoff when logon hours expire**”, plus any **domain functional level and attributes** changes that are reported by this event, must be monitored and an alert should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4740.md b/windows/keep-secure/event-4740.md
new file mode 100644
index 0000000000..813f534ba7
--- /dev/null
+++ b/windows/keep-secure/event-4740.md
@@ -0,0 +1,121 @@
+---
+title: 4740(S) A user account was locked out. (Windows 10)
+description: Describes security event 4740(S) A user account was locked out.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4740(S): A user account was locked out.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time a user account is locked out.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4740
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175703
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Auditor
+ WIN81
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the lockout operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the lockout operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Account That Was Locked Out:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was locked out. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was locked out.
+
+**Additional Information:**
+
+- **Caller Computer Name** \[Type = UnicodeString\]**:** the name of computer account from which logon attempt was received and after which target account was locked out. For example: WIN81.
+
+## Security Monitoring Recommendations
+
+For 4740(S): A user account was locked out.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- If you have high-value domain or local accounts (for example, domain administrator accounts) for which you need to monitor every lockout, monitor all [4740](event-4740.md) events with the **“Account That Was Locked Out \\Security ID”** values that correspond to the accounts.
+
+
+
+- If you have a high-value domain or local account for which you need to monitor every change, monitor all [4740](event-4740.md) events with the **“Account That Was Locked Out \\Security ID”** that corresponds to the account.
+
+- If the user account **“Account That Was Locked Out\\Security ID”** should not be used (for authentication attempts) from the **Additional Information\\Caller Computer Name**, then trigger an alert.
+
+- Monitor for all [4740](event-4740.md) events where **Additional Information\\Caller Computer Name** is not from your domain. However, be aware that even if the computer is not in your domain you will get the computer name instead of an IP address in the [4740](event-4740.md) event.
+
diff --git a/windows/keep-secure/event-4741.md b/windows/keep-secure/event-4741.md
new file mode 100644
index 0000000000..46734b980b
--- /dev/null
+++ b/windows/keep-secure/event-4741.md
@@ -0,0 +1,329 @@
+---
+title: 4741(S) A computer account was created. (Windows 10)
+description: Describes security event 4741(S) A computer account was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4741(S): A computer account was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Computer Account Management](audit-computer-account-management.md)
+
+***Event Description:***
+
+This event generates every time a new computer object is created.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4741
+ 0
+ 0
+ 13825
+ 0
+ 0x8020000000000000
+
+ 170254
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ WIN81$
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6116
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0xc88b2
+ -
+ WIN81$
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ 8/12/2015 11:41:39 AM
+ %%1794
+ 515
+ -
+ 0x0
+ 0x80
+ %%2087
+ -
+ -
+ %%1793
+ Win81.contoso.local
+ HOST/Win81.contoso.local RestrictedKrbHost/Win81.contoso.local HOST/WIN81 RestrictedKrbHost/WIN81
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create Computer object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create Computer object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**New Computer Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of created computer account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the computer account that was created. For example: WIN81$
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain name of created computer account. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+**Attributes:**
+
+- **SAM Account Name** \[Type = UnicodeString\]: logon name for account used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). The value of **sAMAccountName** attribute of new computer object. For example: WIN81$.
+
+- **Display Name** \[Type = UnicodeString\]: the value of **displayName** attribute of new computer object. It is a name displayed in the address book for a particular account (typically – user account). This is usually the combination of the user's first name, middle initial, and last name. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **User Principal Name** \[Type = UnicodeString\]: internet-style login name for the account, based on the Internet standard RFC 822. By convention this should map to the account's email name. This parameter contains the value of **userPrincipalName** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Home Directory** \[Type = UnicodeString\]: user's home directory. If **homeDrive** attribute is set and specifies a drive letter, **homeDirectory** should be a UNC path. The path must be a network UNC of the form \\\\Server\\Share\\Directory. This parameter contains the value of **homeDirectory** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Home Drive** \[Type = UnicodeString\]**:** specifies the drive letter to which to map the UNC path specified by **homeDirectory** account’s attribute. The drive letter must be specified in the form “DRIVE\_LETTER:”. For example – “H:”. This parameter contains the value of **homeDrive** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Script Path** \[Type = UnicodeString\]**:** specifies the path of the account's logon script. This parameter contains the value of **scriptPath** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Profile Path** \[Type = UnicodeString\]: specifies a path to the account's profile. This value can be a null string, a local absolute path, or a UNC path. This parameter contains the value of **profilePath** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **User Workstations** \[Type = UnicodeString\]: contains the list of NetBIOS or DNS names of the computers from which the user can logon. Each computer name is separated by a comma. The name of a computer is the **sAMAccountName** property of a computer object. This parameter contains the value of **userWorkstations** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Password Last Set** \[Type = UnicodeString\]**:** last time the account’s password was modified. For manually created computer account, using Active Directory Users and Computers snap-in, this field typically has value “**<never>”**. For computer account created during standard domain join procedure this field will contains time when computer object was created, because password creates during domain join procedure. For example: 8/12/2015 11:41:39 AM. This parameter contains the value of **pwdLastSet** attribute of new computer object.
+
+- **Account Expires** \[Type = UnicodeString\]: the date when the account expires. This parameter contains the value of **accountExpires** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Primary Group ID** \[Type = UnicodeString\]: Relative Identifier (RID) of computer’s object primary group.
+
+> **Note** **Relative identifier (RID)** is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID) that uniquely identifies an account or group within a domain.
+
+Typically, **Primary Group** field for new computer accounts has the following values:
+
+- 516 (Domain Controllers) – for domain controllers.
+
+- 521 (Read-only Domain Controllers) – for read-only domain controllers (RODC).
+
+- 515 (Domain Computers) – for member servers and workstations.
+
+ See this article for more information. This parameter contains the value of **primaryGroupID** attribute of new computer object.
+
+
+
+- **AllowedToDelegateTo** \[Type = UnicodeString\]: the list of SPNs to which this account can present delegated credentials. Can be changed using Active Directory Users and Computers management console in **Delegation** tab of computer account. Typically it is set to “**-“** for new computer objects. This parameter contains the value of **AllowedToDelegateTo** attribute of new computer object. See description of **AllowedToDelegateTo** field for “[4742](event-4742.md): A computer account was changed” event for more details.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Old UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user or computer account. **Old UAC value** always **“0x0”** for new computer accounts. This parameter contains the previous value of **userAccountControl** attribute of computer object.
+
+- **New UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user or computer account. This parameter contains the value of **userAccountControl** attribute of new computer object.
+
+To decode this value, you can go through the property value definitions in the “Table 7. User’s or Computer’s account UAC flags.” from largest to smallest. Compare each property value to the flags value in the event. If the flags value in the event is greater than or equal to the property value, then the property is "set" and applies to that event. Subtract the property value from the flags value in the event and note that the flag applies and then go on to the next flag.
+
+Here's an example: Flags value from event: 0x15
+
+Decoding:
+
+• PASSWD\_NOTREQD 0x0020
+
+• LOCKOUT 0x0010
+
+• HOMEDIR\_REQUIRED 0x0008
+
+• (undeclared) 0x0004
+
+• ACCOUNTDISABLE 0x0002
+
+• SCRIPT 0x0001
+
+0x0020 > 0x15, so PASSWD\_NOTREQD does not apply to this event
+
+0x10 < 0x15, so LOCKOUT applies to this event. 0x15 - 0x10 = 0x5
+
+0x4 < 0x5, so the undeclared value is set. We'll pretend it doesn't mean anything. 0x5 - 0x4 = 0x1
+
+0x2 > 0x1, so ACCOUNTDISABLE does not apply to this event
+
+0x1 = 0x1, so SCRIPT applies to this event. 0x1 - 0x1 = 0x0, we're done.
+
+So this UAC flags value decodes to: LOCKOUT and SCRIPT
+
+- **User Account Control** \[Type = UnicodeString\]**:** shows the list of changes in **userAccountControl** attribute. You will see a line of text for each change. For new computer accounts, when the object for this account was created, the **userAccountControl** value was considered to be **“0x0”**, and then it was changed from **“0x0”** to the real value for the account's **userAccountControl** attribute. See possible values in the table below. In the “User Account Control field text” column, you can see the text that will be displayed in the **User Account Control** field in 4741 event.
+
+| Flag Name | userAccountControl in hexadecimal | userAccountControl in decimal | Description | User Account Control field text |
+|-------------------------------------------------------------------------------|-----------------------------------|-------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------|
+| SCRIPT | 0x0001 | 1 | The logon script will be run. | Changes of this flag do not show in 4741 events. |
+| ACCOUNTDISABLE | 0x0002 | 2 | The user account is disabled. | Account Disabled
Account Enabled |
+| Undeclared | 0x0004 | 4 | This flag is undeclared. | Changes of this flag do not show in 4741 events. |
+| HOMEDIR\_REQUIRED | 0x0008 | 8 | The home folder is required. | 'Home Directory Required' - Enabled
'Home Directory Required' - Disabled |
+| LOCKOUT | 0x0010 | 16 | | Changes of this flag do not show in 4741 events. |
+| PASSWD\_NOTREQD | 0x0020 | 32 | No password is required. | 'Password Not Required' - Enabled
'Password Not Required' - Disabled |
+| PASSWD\_CANT\_CHANGE | 0x0040 | 64 | The user cannot change the password. This is a permission on the user's object. | Changes of this flag do not show in 4741 events. |
+| ENCRYPTED\_TEXT\_PWD\_ALLOWED | 0x0080 | 128 | The user can send an encrypted password.
Can be set using “Store password using reversible encryption” checkbox. | 'Encrypted Text Password Allowed' - Disabled
'Encrypted Text Password Allowed' - Enabled |
+| TEMP\_DUPLICATE\_ACCOUNT | 0x0100 | 256 | This is an account for users whose primary account is in another domain. This account provides user access to this domain, but not to any domain that trusts this domain. This is sometimes referred to as a local user account. | Cannot be set for computer account. |
+| NORMAL\_ACCOUNT | 0x0200 | 512 | This is a default account type that represents a typical user. | 'Normal Account' - Disabled
'Normal Account' - Enabled |
+| INTERDOMAIN\_TRUST\_ACCOUNT | 0x0800 | 2048 | This is a permit to trust an account for a system domain that trusts other domains. | Cannot be set for computer account. |
+| WORKSTATION\_TRUST\_ACCOUNT | 0x1000 | 4096 | This is a computer account for a computer that is running Microsoft Windows NT 4.0 Workstation, Microsoft Windows NT 4.0 Server, Microsoft Windows 2000 Professional, or Windows 2000 Server and is a member of this domain. | 'Workstation Trust Account' - Disabled
'Workstation Trust Account' - Enabled |
+| SERVER\_TRUST\_ACCOUNT | 0x2000 | 8192 | This is a computer account for a domain controller that is a member of this domain. | 'Server Trust Account' - Enabled
'Server Trust Account' - Disabled |
+| DONT\_EXPIRE\_PASSWORD | 0x10000 | 65536 | Represents the password, which should never expire on the account.
Can be set using “Password never expires” checkbox. | 'Don't Expire Password' - Disabled
'Don't Expire Password' - Enabled |
+| MNS\_LOGON\_ACCOUNT | 0x20000 | 131072 | This is an MNS logon account. | 'MNS Logon Account' - Disabled
'MNS Logon Account' - Enabled |
+| SMARTCARD\_REQUIRED | 0x40000 | 262144 | When this flag is set, it forces the user to log on by using a smart card. | 'Smartcard Required' - Disabled
'Smartcard Required' - Enabled |
+| TRUSTED\_FOR\_DELEGATION | 0x80000 | 524288 | When this flag is set, the service account (the user or computer account) under which a service runs is trusted for Kerberos delegation. Any such service can impersonate a client requesting the service. To enable a service for Kerberos delegation, you must set this flag on the userAccountControl property of the service account.
If you enable Kerberos constraint or unconstraint delegation or disable these types of delegation in Delegation tab you will get this flag changed. | 'Trusted For Delegation' - Enabled
'Trusted For Delegation' - Disabled |
+| NOT\_DELEGATED | 0x100000 | 1048576 | When this flag is set, the security context of the user is not delegated to a service even if the service account is set as trusted for Kerberos delegation.
Can be set using “Account is sensitive and cannot be delegated” checkbox. | 'Not Delegated' - Disabled
'Not Delegated' - Enabled |
+| USE\_DES\_KEY\_ONLY | 0x200000 | 2097152 | Restrict this principal to use only Data Encryption Standard (DES) encryption types for keys.
Can be set using “Use Kerberos DES encryption types for this account” checkbox. | 'Use DES Key Only' - Disabled
'Use DES Key Only' - Enabled |
+| DONT\_REQ\_PREAUTH | 0x400000 | 4194304 | This account does not require Kerberos pre-authentication for logging on.
Can be set using “Do not require Kerberos preauthentication” checkbox. | 'Don't Require Preauth' - Disabled
'Don't Require Preauth' - Enabled |
+| PASSWORD\_EXPIRED | 0x800000 | 8388608 | The user's password has expired. | Changes of this flag do not show in 4741 events. |
+| TRUSTED\_TO\_AUTH\_FOR\_DELEGATION | 0x1000000 | 16777216 | The account is enabled for delegation. This is a security-sensitive setting. Accounts that have this option enabled should be tightly controlled. This setting lets a service that runs under the account assume a client's identity and authenticate as that user to other remote servers on the network.
If you enable Kerberos protocol transition delegation or disable this type of delegation in Delegation tab you will get this flag changed. | 'Trusted To Authenticate For Delegation' - Disabled
'Trusted To Authenticate For Delegation' - Enabled |
+| PARTIAL\_SECRETS\_ACCOUNT | 0x04000000 | 67108864 | The account is a read-only domain controller (RODC). This is a security-sensitive setting. Removing this setting from an RODC compromises security on that server. | No information. |
+
+> Table 7. User’s or Computer’s account UAC flags.
+
+- **User Parameters** \[Type = UnicodeString\]: if you change any setting using Active Directory Users and Computers management console in Dial-in tab of computer’s account properties, then you will see **<value changed, but not displayed>** in this field in “[4742](event-4742.md)(S): A computer account was changed.” This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. This parameter contains the value of **sIDHistory** attribute of new computer object. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Logon Hours** \[Type = UnicodeString\]: hours that the account is allowed to logon to the domain. The value of **logonHours** attribute of new computer object. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. You will see **<value not set>** value for new created computer accounts in event 4741.
+
+- **DNS Host Name** \[Type = UnicodeString\]: name of computer account as registered in DNS. The value of **dNSHostName** attribute of new computer object. For manually created computer account objects this field has value “**-**“.
+
+- **Service Principal Names** \[Type = UnicodeString\]**:** The list of SPNs, registered for computer account. For new computer accounts it will typically contain HOST SPNs and RestrictedKrbHost SPNs. The value of **servicePrincipalName** attribute of new computer object. For manually created computer objects it is typically equals “**-**“. This is an example of **Service Principal Names** field for new domain joined workstation**:**
+
+ HOST/Win81.contoso.local
+
+ RestrictedKrbHost/Win81.contoso.local
+
+ HOST/WIN81
+
+ RestrictedKrbHost/WIN81
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in the table below:
+
+| Privilege Name | User Right Group Policy Name | Description |
+|---------------------------------|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| SeAssignPrimaryTokenPrivilege | Replace a process-level token | Required to assign the [*primary token*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721603(v=vs.85).aspx#_security_primary_token_gly) of a process.
With this privilege, the user can initiate a process to replace the default token associated with a started subprocess. |
+| SeAuditPrivilege | Generate security audits | With this privilege, the user can add entries to the security log. |
+| SeBackupPrivilege | Back up files and directories | - Required to perform backup operations.
With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system.
This privilege causes the system to grant all read access control to any file, regardless of the [*access control list*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721532(v=vs.85).aspx#_security_access_control_list_gly) (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held:
READ\_CONTROL
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_READ
FILE\_TRAVERSE |
+| SeChangeNotifyPrivilege | Bypass traverse checking | Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks.
With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. |
+| SeCreateGlobalPrivilege | Create global objects | Required to create named file mapping objects in the global namespace during Terminal Services sessions. |
+| SeCreatePagefilePrivilege | Create a pagefile | With this privilege, the user can create and change the size of a pagefile. |
+| SeCreatePermanentPrivilege | Create permanent shared objects | Required to create a permanent object.
This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege. |
+| SeCreateSymbolicLinkPrivilege | Create symbolic links | Required to create a symbolic link. |
+| SeCreateTokenPrivilege | Create a token object | Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs.
When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it. |
+| SeDebugPrivilege | Debug programs | Required to debug and adjust the memory of a process owned by another account.
With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components. |
+| SeEnableDelegationPrivilege | Enable computer and user accounts to be trusted for delegation | Required to mark user and computer accounts as trusted for delegation.
With this privilege, the user can set the **Trusted for Delegation** setting on a user or computer object.
The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the **Account cannot be delegated** account control flag set. |
+| SeImpersonatePrivilege | Impersonate a client after authentication | With this privilege, the user can impersonate other accounts. |
+| SeIncreaseBasePriorityPrivilege | Increase scheduling priority | Required to increase the base priority of a process.
With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. |
+| SeIncreaseQuotaPrivilege | Adjust memory quotas for a process | Required to increase the quota assigned to a process.
With this privilege, the user can change the maximum memory that can be consumed by a process. |
+| SeIncreaseWorkingSetPrivilege | Increase a process working set | Required to allocate more memory for applications that run in the context of users. |
+| SeLoadDriverPrivilege | Load and unload device drivers | Required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. |
+| SeLockMemoryPrivilege | Lock pages in memory | Required to lock physical pages in memory.
With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). |
+| SeMachineAccountPrivilege | Add workstations to domain | With this privilege, the user can create a computer account.
This privilege is valid only on domain controllers. |
+| SeManageVolumePrivilege | Perform volume maintenance tasks | Required to run maintenance tasks on a volume, such as remote defragmentation. |
+| SeProfileSingleProcessPrivilege | Profile single process | Required to gather profiling information for a single process.
With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes. |
+| SeRelabelPrivilege | Modify an object label | Required to modify the mandatory integrity level of an object. |
+| SeRemoteShutdownPrivilege | Force shutdown from a remote system | Required to shut down a system using a network request. |
+| SeRestorePrivilege | Restore files and directories | Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held:
WRITE\_DAC
WRITE\_OWNER
ACCESS\_SYSTEM\_SECURITY
FILE\_GENERIC\_WRITE
FILE\_ADD\_FILE
FILE\_ADD\_SUBDIRECTORY
DELETE
With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object. |
+| SeSecurityPrivilege | Manage auditing and security log | Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log.
With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys.
A user with this privilege can also view and clear the security log. |
+| SeShutdownPrivilege | Shut down the system | Required to shut down a local system. |
+| SeSyncAgentPrivilege | Synchronize directory service data | This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers.
With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization. |
+| SeSystemEnvironmentPrivilege | Modify firmware environment values | Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. |
+| SeSystemProfilePrivilege | Profile system performance | Required to gather profiling information for the entire system.
With this privilege, the user can use performance monitoring tools to monitor the performance of system processes. |
+| SeSystemtimePrivilege | Change the system time | Required to modify the system time.
With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. |
+| SeTakeOwnershipPrivilege | Take ownership of files or other objects | Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. |
+| SeTcbPrivilege | Act as part of the operating system | This privilege identifies its holder as part of the trusted computer base.
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. |
+| SeTimeZonePrivilege | Change the time zone | Required to adjust the time zone associated with the computer's internal clock. |
+| SeTrustedCredManAccessPrivilege | Access Credential Manager as a trusted caller | Required to access Credential Manager as a trusted caller. |
+| SeUndockPrivilege | Remove computer from docking station | Required to undock a laptop.
With this privilege, the user can undock a portable computer from its docking station without logging on. |
+| SeUnsolicitedInputPrivilege | Not applicable | Required to read unsolicited input from a [*terminal*](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721627(v=vs.85).aspx#_security_terminal_gly) device. |
+
+> Table 8. User Privileges.
+
+## Security Monitoring Recommendations
+
+For 4741(S): A computer account was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If your information security monitoring policy requires you to monitor computer account creation, monitor this event.
+
+- Consider whether to track the following fields and values:
+
+| **Field and value to track** | **Reason to track** |
+|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **SAM Account Name**: empty or - | This field must contain the computer account name. If it is empty or **-**, it might indicate an anomaly. |
+| **Display Name** is not -
**User Principal Name** is not -
**Home Directory** is not -
**Home Drive** is not -
**Script Path** is not -
**Profile Path** is not -
**User Workstations** is not -
**AllowedToDelegateTo** is not - | Typically these fields are **-** for new computer accounts. Other values might indicate an anomaly and should be monitored. |
+| **Password Last Set** is **<never>** | This typically means this is a manually created computer account, which you might need to monitor. |
+| **Account Expires** is not **<never>** | Typically this field is **<never>** for new computer accounts. Other values might indicate an anomaly and should be monitored. |
+| **Primary Group ID** is any value other than 515. | Typically, the **Primary Group ID** value is one of the following:
**516** for domain controllers
**521** for read only domain controllers (RODCs)
**515** for servers and workstations (domain computers)
If the **Primary Group ID** is 516 or 521, it is a new domain controller or RODC, and the event should be monitored.
If the value is not 516, 521, or 515, it is not a typical value and should be monitored. |
+| **Old UAC Value** is not 0x0 | Typically this field is **0x0** for new computer accounts. Other values might indicate an anomaly and should be monitored. |
+| **SID History** is not - | This field will always be set to - unless the account was migrated from another domain. |
+| **Logon Hours** value other than **<value not set>** | This should always be **<value not set>** for new computer accounts. |
+
+- Consider whether to track the following account control flags:
+
+| **User account control flag to track** | **Information about the flag** |
+|--------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **'Encrypted Text Password Allowed'** – Enabled | Should not be set for computer accounts. By default, it will not be set, and it cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Server Trust Account'** – Enabled | Should be enabled **only** for domain controllers. |
+| **'Don't Expire Password'** – Enabled | Should not be enabled for new computer accounts, because the password automatically changes every 30 days by default. For computer accounts, this flag cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Smartcard Required'** – Enabled | Should not be enabled for new computer accounts. |
+| **'Trusted For Delegation'** – Enabled | Should not be enabled for new member servers and workstations. It is enabled by default for new domain controllers. |
+| **'Not Delegated'** – Enabled | Should not be enabled for new computer accounts. |
+| **'Use DES Key Only'** – Enabled | Should not be enabled for new computer accounts. For computer accounts, it cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Don't Require Preauth'** – Enabled | Should not be enabled for new computer accounts. For computer accounts, it cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Trusted To Authenticate For Delegation'** – Enabled | Should not be enabled for new computer accounts by default. |
+
diff --git a/windows/keep-secure/event-4742.md b/windows/keep-secure/event-4742.md
new file mode 100644
index 0000000000..43b86b8649
--- /dev/null
+++ b/windows/keep-secure/event-4742.md
@@ -0,0 +1,295 @@
+---
+title: 4742(S) A computer account was changed. (Windows 10)
+description: Describes security event 4742(S) A computer account was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4742(S): A computer account was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Computer Account Management](audit-computer-account-management.md)
+
+***Event Description:***
+
+This event generates every time a computer object is changed.
+
+This event generates only on domain controllers.
+
+You might see the same values for **Subject**\\**Security ID** and **Computer Account That Was Changed**\\**Security ID** in this event. This usually happens when you reboot a computer after adding it to the domain (the change takes effect after the reboot).
+
+For each change, a separate 4742 event will be generated.
+
+Some changes do not invoke a 4742 event, for example, changes made using Active Directory Users and Computers management console in **Managed By** tab in computer account properties.
+
+You might see this event without any changes inside, that is, where all **Changed Attributes** apear as “-“. This usually happens when a change is made to an attribute that is not listed in the event. In this case there is no way to determine which attribute was changed. For example, this would happen if you change the **Description** of a group object using the Active Directory Users and Computers administrative console. Also, if the [discretionary access control list](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) (DACL) is changed, a 4742 event will generate, but all attributes will be “-“.
+
+***Important*:** If you manually change any user-related setting or attribute, for example if you set the SMARTCARD\_REQUIRED flag in **userAccountControl** for the computer account, then the **sAMAccountType** of the computer account will be changed to NORMAL\_USER\_ACCOUNT and you will get “[4738](event-4738.md): A user account was changed” instead of 4742 for this computer account. Essentially, the computer account will “become” a user account. For NORMAL\_USER\_ACCOUNT you will always get events from [Audit User Account Management](audit-user-account-management.md) subcategory. We strongly recommend that you avoid changing any user-related settings manually for computer objects.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4742
+ 0
+ 0
+ 13825
+ 0
+ 0x8020000000000000
+
+ 171754
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ -
+ WIN81$
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6116
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x2e80c
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ -
+ %%1793
+ 0x80
+ 0x2080
+ %%2093
+ -
+ -
+ -
+ -
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change Computer object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change Computer object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Computer Account That Was Changed:**
+
+- **Security ID** \[Type = SID\]**:** SID of changed computer account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the computer account that was changed. For example: WIN81$
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain name of changed computer account. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+**Changed Attributes:**
+
+> **Note** If attribute was not changed it will have “-“ value.
+
+- **SAM Account Name** \[Type = UnicodeString\]: logon name for account used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). If the value of **sAMAccountName** attribute of computer object was changed, you will see the new value here. For example: WIN8$.
+
+- **Display Name** \[Type = UnicodeString\]: it is a name displayed in the address book for a particular account (typically – user account). This is usually the combination of the user's first name, middle initial, and last name. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example. If the value of **displayName** attribute of computer object was changed, you will see the new value here.
+
+- **User Principal Name** \[Type = UnicodeString\]: internet-style login name for the account, based on the Internet standard RFC 822. By convention this should map to the account's email name. If the value of **userPrincipalName** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Home Directory** \[Type = UnicodeString\]: user's home directory. If **homeDrive** attribute is set and specifies a drive letter, **homeDirectory** should be a UNC path. The path must be a network UNC of the form \\\\Server\\Share\\Directory. If the value of **homeDirectory** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Home Drive** \[Type = UnicodeString\]**:** specifies the drive letter to which to map the UNC path specified by **homeDirectory** account’s attribute. The drive letter must be specified in the form “DRIVE\_LETTER:”. For example – “H:”. If the value of **homeDrive** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Script Path** \[Type = UnicodeString\]**:** specifies the path of the account’s logon script. If the value of **scriptPath** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Profile Path** \[Type = UnicodeString\]: specifies a path to the account's profile. This value can be a null string, a local absolute path, or a UNC path. If the value of **profilePath** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **User Workstations** \[Type = UnicodeString\]: contains the list of NetBIOS or DNS names of the computers from which the user can logon. Each computer name is separated by a comma. The name of a computer is the **sAMAccountName** property of a computer object. If the value of **userWorkstations** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Password Last Set** \[Type = UnicodeString\]**:** last time the account’s password was modified. If the value of **pwdLastSet** attribute of computer object was changed, you will see the new value here. For example: 8/12/2015 11:41:39 AM. This value will be changed, for example, after manual computer account reset action or automatically every 30 days by default for computer objects.
+
+- **Account Expires** \[Type = UnicodeString\]: the date when the account expires. If the value of **accountExpires** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **Primary Group ID** \[Type = UnicodeString\]: Relative Identifier (RID) of computer’s object primary group.
+
+> **Note** **Relative identifier (RID)** is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID) that uniquely identifies an account or group within a domain.
+
+This field will contain some value if computer’s object primary group was changed. You can change computer’s primary group using Active Directory Users and Computers management console in the **Member Of** tab of computer object properties. You will see a RID of new primary group as a field value. For example, 515 (Domain Computers) for workstations, is a default primary group.
+
+Typical **Primary Group** values for computer accounts:
+
+- 516 (Domain Controllers) – for domain controllers.
+
+- 521 (Read-only Domain Controllers) – read-only domain controllers (RODC).
+
+- 515 (Domain Computers) – servers and workstations.
+
+ See this article for more information. If the value of **primaryGroupID** attribute of computer object was changed, you will see the new value here.
+
+
+
+- **AllowedToDelegateTo** \[Type = UnicodeString\]: the list of SPNs to which this account can present delegated credentials. Can be changed using Active Directory Users and Computers management console in **Delegation** tab of computer account. If the SPNs list on **Delegation** tab of a computer account was changed, you will see the new SPNs list in **AllowedToDelegateTo** field (note that you will see the new list instead of changes) of this event. This is an example of **AllowedToDelegateTo**:
+
+ - dcom/WIN2012
+
+ - dcom/WIN2012.contoso.local
+
+ If the value of **msDS-AllowedToDelegateTo** attribute of computer object was changed, you will see the new value here.
+
+ The value can be **<value not set>**, for example, if delegation was disabled.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Old UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user or computer account. This parameter contains the previous value of **userAccountControl** attribute of computer object.
+
+- **New UAC Value** \[Type = UnicodeString\]: specifies flags that control password, lockout, disable/enable, script, and other behavior for the user or computer account. If the value of **userAccountControl** attribute of computer object was changed, you will see the new value here.
+
+To decode this value, you can go through the property value definitions in the “Table 7. User’s or Computer’s account UAC flags.” from largest to smallest. Compare each property value to the flags value in the event. If the flags value in the event is greater than or equal to the property value, then the property is "set" and applies to that event. Subtract the property value from the flags value in the event and note that the flag applies and then go on to the next flag.
+
+Here's an example: Flags value from event: 0x15
+
+Decoding:
+
+• PASSWD\_NOTREQD 0x0020
+
+• LOCKOUT 0x0010
+
+• HOMEDIR\_REQUIRED 0x0008
+
+• (undeclared) 0x0004
+
+• ACCOUNTDISABLE 0x0002
+
+• SCRIPT 0x0001
+
+0x0020 > 0x15, so PASSWD\_NOTREQD does not apply to this event
+
+0x10 < 0x15, so LOCKOUT applies to this event. 0x15 - 0x10 = 0x5
+
+0x4 < 0x5, so the undeclared value is set. We'll pretend it doesn't mean anything. 0x5 - 0x4 = 0x1
+
+0x2 > 0x1, so ACCOUNTDISABLE does not apply to this event
+
+0x1 = 0x1, so SCRIPT applies to this event. 0x1 - 0x1 = 0x0, we're done.
+
+So this UAC flags value decodes to: LOCKOUT and SCRIPT
+
+- **User Account Control** \[Type = UnicodeString\]**:** shows the list of changes in **userAccountControl** attribute. You will see a line of text for each change. See possible values in here: “Table 7. User’s or Computer’s account UAC flags.”. In the “User Account Control field text” column, you can see text that will be displayed in the **User Account Control** field in 4742 event.
+
+
+
+- **User Parameters** \[Type = UnicodeString\]: if you change any setting using Active Directory Users and Computers management console in Dial-in tab of computer’s account properties, then you will see **<value changed, but not displayed>** in this field.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. If the value of **sIDHistory** attribute of computer object was changed, you will see the new value here.
+
+- **Logon Hours** \[Type = UnicodeString\]: hours that the account is allowed to logon to the domain. If the value of **logonHours** attribute of computer object was changed, you will see the new value here. For computer objects, it is optional, and typically is not set. You can change this attribute by using Active Directory Users and Computers, or through a script, for example.
+
+- **DNS Host Name** \[Type = UnicodeString\]: name of computer account as registered in DNS. If the value of **dNSHostName** attribute of computer object was changed, you will see the new value here.
+
+
+
+- **Service Principal Names** \[Type = UnicodeString\]**:** The list of SPNs, registered for computer account. If the SPN list of a computer account changed, you will see the new SPN list in **Service Principal Names** field (note that you will see the new list instead of changes). If the value of **servicePrincipalName** attribute of computer object was changed, you will see the new value here.
+
+ Here is an example of **Service Principal Names** field for new domain joined workstation in event 4742 on domain controller, after workstation reboots**:**
+
+ HOST/Win81.contoso.local
+
+ RestrictedKrbHost/Win81.contoso.local
+
+ HOST/WIN81
+
+ RestrictedKrbHost/WIN81
+
+TERMSRV/Win81.contoso.local
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4742(S): A computer account was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have critical domain computer accounts (database servers, domain controllers, administration workstations, and so on) for which you need to monitor each change, monitor this event with the **“Computer Account That Was Changed\\Security ID”** that corresponds to the high-value account or accounts.
+
+- If you have computer accounts for which any change in the services list on the **Delegation** tab should be monitored, monitor this event when **AllowedToDelegateTo** is not -. This value means the services list was changed.
+
+- Consider whether to track the following fields and values:
+
+| **Field and value to track** | **Reason to track** |
+|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Display Name** is not -
**User Principal Name** is not -
**Home Directory** is not -
**Home Drive** is not -
**Script Path** is not -
**Profile Path** is not -
**User Workstations** is not -
**Account Expires** is not -
**Logon Hours** is not **-** | Typically these fields are **-** for computer accounts. Other values might indicate an anomaly and should be monitored. |
+| **Password Last Set** changes occur more often than usual | Changes that are more frequent than the default (typically once a month) might indicate an anomaly or attack. |
+| **Primary Group ID** is not 516, 521, or 515 | Typically, the **Primary Group ID** value is one of the following:
**516** for domain controllers
**521** for read only domain controllers (RODCs)
**515** for servers and workstations (domain computers)
Other values should be monitored. |
+| For computer accounts for which the services list (on the **Delegation** tab) should not be empty: **AllowedToDelegateTo** is marked **<value not set> ** | If **AllowedToDelegateTo** is marked **<value not set>** on computers that previously had a services list (on the **Delegation** tab), it means the list was cleared. |
+| **SID History** is not - | This field will always be set to - unless the account was migrated from another domain. |
+
+- Consider whether to track the following account control flags:
+
+| **User account control flag to track** | **Information about the flag** |
+|---------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **'Password Not Required'** – Enabled | Should not be set for computer accounts. Computer accounts typically require a password by default, except manually created computer objects. |
+| **'Encrypted Text Password Allowed'** – Enabled | Should not be set for computer accounts. By default, it will not be set, and it cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Server Trust Account'** – Enabled | Should be enabled **only** for domain controllers. |
+| **'Server Trust Account'** – Disabled | Should **not** be disabled for domain controllers. |
+| **'Don't Expire Password'** – Enabled | Should not be enabled for computer accounts, because the password automatically changes every 30 days by default. For computer accounts, this flag cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Smartcard Required'** – Enabled | Should not be enabled for computer accounts. |
+| **'Trusted For Delegation'** – Enabled | Means that Kerberos Constraint or Unconstraint delegation was enabled for the computer account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Trusted For Delegation'** – Disabled | Means that Kerberos Constraint or Unconstraint delegation was disabled for the computer account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action.
Also, if you have a list of computer accounts for which delegation is critical and should not be disabled, monitor this for those accounts. |
+| **'Trusted To Authenticate For Delegation'** – Enabled | Means that Protocol Transition delegation was enabled for the computer account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Trusted To Authenticate For Delegation'** – Disabled | Means that Protocol Transition delegation was disabled for the computer account. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action.
Also, if you have a list of computer accounts for which delegation is critical and should not be disabled, monitor this for those accounts. |
+| **'Not Delegated'** – Enabled | Means that **Account is sensitive and cannot be delegated** was selected for the computer account. For computer accounts, this flag cannot be set using the graphical interface. We recommend monitoring this to discover whether it is an approved action (done by an administrator), a mistake, or a malicious action. |
+| **'Use DES Key Only'** – Enabled | Should not be enabled for computer accounts. For computer accounts, it cannot be set in the account properties in Active Directory Users and Computers. |
+| **'Don't Require Preauth'** - Enabled | Should not be enabled for computer accounts. For computer accounts, it cannot be set in the account properties in Active Directory Users and Computers. |
+
diff --git a/windows/keep-secure/event-4743.md b/windows/keep-secure/event-4743.md
new file mode 100644
index 0000000000..69365e69e6
--- /dev/null
+++ b/windows/keep-secure/event-4743.md
@@ -0,0 +1,118 @@
+---
+title: 4743(S) A computer account was deleted. (Windows 10)
+description: Describes security event 4743(S) A computer account was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4743(S): A computer account was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Computer Account Management](audit-computer-account-management.md)
+
+***Event Description:***
+
+This event generates every time a computer object is deleted.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4743
+ 0
+ 0
+ 13825
+ 0
+ 0x8020000000000000
+
+ 172103
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ COMPUTERACCOUNT$
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6118
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete Computer object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete Computer object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Computer:**
+
+- **Security ID** \[Type = SID\]**:** SID of deleted computer account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the computer account that was deleted. For example: WIN81$
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain name of deleted computer account. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4743(S): A computer account was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have critical domain computer accounts (database servers, domain controllers, administration workstations, and so on) for which you need to monitor each action (especially deletion), monitor this event with the **“Target Computer\\Security ID”** or “**Target Computer\\Account Name**” that corresponds to the high-value account or accounts.
+
diff --git a/windows/keep-secure/event-4749.md b/windows/keep-secure/event-4749.md
new file mode 100644
index 0000000000..ebf569aae3
--- /dev/null
+++ b/windows/keep-secure/event-4749.md
@@ -0,0 +1,128 @@
+---
+title: 4749(S) A security-disabled global group was created. (Windows 10)
+description: Describes security event 4749(S) A security-disabled global group was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4749(S): A security-disabled global group was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Distribution Group Management](audit-distribution-group-management.md)
+
+***Event Description:***
+
+This event generates every time a new security-disabled (distribution) global group was created.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4749
+ 0
+ 0
+ 13827
+ 0
+ 0x8020000000000000
+
+ 172181
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ServiceDesk
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6119
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+ ServiceDesk
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of created group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was created. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]**:** domain name of created group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+**Attributes:**
+
+- **SAM Account Name** \[Type = UnicodeString\]: This is a name of new group used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). The value of **sAMAccountName** attribute of new group object. For example: ServiceDesk
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. This parameter contains the value of **sIDHistory** attribute of new group object. This parameter might not be captured in the event, and in that case appears as “-”.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4749(S): A security-disabled global group was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor each time a new distribution group is created, to see who created the group and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
+- If your organization has naming conventions for account names, monitor “**Attributes\\SAM Account Name”** for names that don’t comply with the naming conventions.
+
diff --git a/windows/keep-secure/event-4750.md b/windows/keep-secure/event-4750.md
new file mode 100644
index 0000000000..5feebeb1f2
--- /dev/null
+++ b/windows/keep-secure/event-4750.md
@@ -0,0 +1,148 @@
+---
+title: 4750(S) A security-disabled global group was changed. (Windows 10)
+description: Describes security event 4750(S) A security-disabled global group was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4750(S): A security-disabled global group was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Distribution Group Management](audit-distribution-group-management.md)
+
+***Event Description:***
+
+This event generates every time security-disabled (distribution) global group is changed.
+
+This event generates only on domain controllers.
+
+Some changes do not invoke a 4750 event, for example, changes made using the Active Directory Users and Computers management console in **Managed By** tab in group account properties.
+
+If you change the name of the group (SAM Account Name), you also get “[4781](event-4781.md): The name of an account was changed” if “[Audit User Account Management](audit-user-account-management.md)” subcategory success auditing is enabled.
+
+If you change the group type, you get a change event from the new group type auditing subcategory instead of 4750. If you need to monitor for group type changes, it is better to monitor for “[4764](event-4764.md): A group’s type was changed.” These events are generated for any group type when group type is changed. “[Audit Security Group Management](audit-security-group-management.md)” subcategory success auditing must be enabled.
+
+From 4750 event you can get information about changes of **sAMAccountName** and **sIDHistory** attributes or you will see that something changed, but will not be able to see what exactly changed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4750
+ 0
+ 0
+ 13827
+ 0
+ 0x8020000000000000
+
+ 172188
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ServiceDeskMain
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6119
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+ ServiceDeskMain
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of changed group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** Sometimes you can see the **Group\\Security ID** field contains an old group name in Event Viewer (as you can see in the event example). That happens because Event Viewer caches names for SIDs that it has already resolved for the current session.
+
+> **Note** **Security ID** field has the same value as new group name (**Changed Attributes>SAM Account Name**). That is happens because event is generated after name was changed and SID resolves to the new name. It is always better to use SID instead of group names for queries or filtering of events, because you will know for sure that this the right object you are looking for or want to monitor.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was changed. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]**:** domain name of changed group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Changed Attributes:**
+
+> **Note** If attribute was not changed it will have “-“ value.
+
+> **Note** You might see a 4750 event without any changes inside, that is, where all **Changed Attributes** appear as “-“. This usually happens when a change is made to an attribute that is not listed in the event. In this case there is no way to determine which attribute was changed. For example, this would happen if you change the Description of a group object using the Active Directory Users and Computers administrative console. Also, if the [discretionary access control list](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) (DACL) is changed, a 4750 event will generate, but all attributes will be “-“.
+
+- **SAM Account Name** \[Type = UnicodeString\]: This is a new name of changed group used to support clients and servers from previous versions of Windows (pre-Windows 2000 logon name). If the value of **sAMAccountName** attribute of group object was changed, you will see the new value here. For example: ServiceDesk.
+
+- **SID History** \[Type = UnicodeString\]: contains previous SIDs used for the object if the object was moved from another domain. Whenever an object is moved from one domain to another, a new SID is created and becomes the objectSID. The previous SID is added to the **sIDHistory** property. If the value of **sIDHistory** attribute of group object was changed, you will see the new value here.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4750(S): A security-disabled global group was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical distribution groups in the organization, and need to specifically monitor these groups for any change, monitor events with the “**Group\\Group Name”** values that correspond to the critical distribution groups.
+
+- If you need to monitor each time a member is added to a distribution group, to see who added the member and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
+- If your organization has naming conventions for account names, monitor “**Attributes\\SAM Account Name”** for names that don’t comply with the naming conventions.
+
diff --git a/windows/keep-secure/event-4751.md b/windows/keep-secure/event-4751.md
new file mode 100644
index 0000000000..600f534e40
--- /dev/null
+++ b/windows/keep-secure/event-4751.md
@@ -0,0 +1,161 @@
+---
+title: 4751(S) A member was added to a security-disabled global group. (Windows 10)
+description: Describes security event 4751(S) A member was added to a security-disabled global group.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4751(S): A member was added to a security-disabled global group.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Distribution Group Management](audit-distribution-group-management.md)
+
+***Event Description:***
+
+This event generates every time a new member was added to a security-disabled (distribution) global group.
+
+This event generates only on domain controllers.
+
+For every added member you will get separate 4751 event.
+
+You will typically see “[4750](event-4750.md): A security-disabled global group was changed.” event without any changes in it prior to 4751 event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4751
+ 0
+ 0
+ 13827
+ 0
+ 0x8020000000000000
+
+ 172221
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=Auditor,CN=Users,DC=contoso,DC=local
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ ServiceDeskSecond
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6119
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “add member to the group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “add member to the group” operation.
+
+
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Member:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was added to the group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]: distinguished name of account that was added to the group. For example: “CN=Auditor,CN=Users,DC=contoso,DC=local”. For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “-”.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of the group to which new member was added. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group to which new member was added. For example: ServiceDesk
+
+
+
+- **Group Domain** \[Type = UnicodeString\]**:** domain name of the group to which new member was added. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4751(S): A member was added to a security-disabled global group.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Addition of members to distribution groups:** You might need to monitor the addition of members to distribution groups. | If you need to monitor each time a member is added to a distribution group, to see who added the member and when, monitor this event.
Typically, this event is used as an informational event, to be reviewed if needed. |
+| **High-value distribution groups:** You might have a list of critical distribution groups in the organization, and need to specifically monitor these groups for the addition of new members (or for other changes). | Monitor this event with the “**Group\\Group Name”** values that correspond to the high-value distribution groups. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4752.md b/windows/keep-secure/event-4752.md
new file mode 100644
index 0000000000..d4d9463173
--- /dev/null
+++ b/windows/keep-secure/event-4752.md
@@ -0,0 +1,152 @@
+---
+title: 4752(S) A member was removed from a security-disabled global group. (Windows 10)
+description: Describes security event 4752(S) A member was removed from a security-disabled global group.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4752(S): A member was removed from a security-disabled global group.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Distribution Group Management](audit-distribution-group-management.md)
+
+***Event Description:***
+
+This event generates every time member was removed from the security-disabled (distribution) global group.
+
+This event generates only on domain controllers.
+
+For every removed member you will get separate 4752 event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4752
+ 0
+ 0
+ 13827
+ 0
+ 0x8020000000000000
+
+ 172229
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=Auditor,CN=Users,DC=contoso,DC=local
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ ServiceDeskSecond
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6119
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “remove member from the group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “remove member from the group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Member:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was removed from the group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]: distinguished name of account that was removed from the group. For example: “CN=Auditor,CN=Users,DC=contoso,DC=local”. For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “-”.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of the group from which the member was removed. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group from which the member was removed. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]**:** domain name of the group from which the member was removed. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4752(S): A member was removed from a security-disabled global group.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Removal of members from distribution groups:** You might need to monitor the removal of members from distribution groups. | If you need to monitor each time a member is removed from a distribution group, to see who removed the member and when, monitor this event.
Typically, this event is used as an informational event, to be reviewed if needed. |
+| **High-value distribution groups:** You might have a list of critical distribution groups in the organization, and need to specifically monitor these groups for the removal of members (or for other changes). | Monitor this event with the “**Group\\Group Name”** values that correspond to the high-value distribution groups. |
+| **Distribution groups with required members**: You might need to ensure that for certain distribution groups, particular members are never removed. | Monitor this event with the “**Group\\Group Name”** that corresponds to the group of interest, and the **“Member\\Security ID”** of the members who should not be removed. |
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
diff --git a/windows/keep-secure/event-4753.md b/windows/keep-secure/event-4753.md
new file mode 100644
index 0000000000..4aeb373191
--- /dev/null
+++ b/windows/keep-secure/event-4753.md
@@ -0,0 +1,124 @@
+---
+title: 4753(S) A security-disabled global group was deleted. (Windows 10)
+description: Describes security event 4753(S) A security-disabled global group was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4753(S): A security-disabled global group was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Distribution Group Management](audit-distribution-group-management.md)
+
+***Event Description:***
+
+This event generates every time security-disabled (distribution) global group is deleted.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4753
+ 0
+ 0
+ 13827
+ 0
+ 0x8020000000000000
+
+ 172230
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ServiceDeskSecond
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6119
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3007b
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete group” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete group” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of deleted group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group that was deleted. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]**:** domain name of deleted group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4753(S): A security-disabled global group was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical distribution groups in the organization, and need to specifically monitor these groups for any change, especially group deletion, monitor events with the “**Group\\Group Name”** values that correspond to the critical distribution groups.
+
+- If you need to monitor each time a distribution group is deleted, to see who deleted it and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
+
+
diff --git a/windows/keep-secure/event-4764.md b/windows/keep-secure/event-4764.md
new file mode 100644
index 0000000000..0fc3fa9b1c
--- /dev/null
+++ b/windows/keep-secure/event-4764.md
@@ -0,0 +1,142 @@
+---
+title: 4764(S) A group's type was changed. (Windows 10)
+description: Describes security event 4764(S) A group’s type was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4764(S): A group’s type was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates every time group’s type is changed.
+
+This event generates for both security and distribution groups.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4764
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 175221
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Security Enabled Local Group Changed to Security Disabled Local Group.
+ CompanyAuditors
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6608
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38200
+ -
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “change group type” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “change group type” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Change Type** \[Type = UnicodeString\]**:** contains three parts: “<Param1> **Changed To** <Param2>.”. These two parameters can have the following values (they cannot have the same value at the same time):
+
+- Security Disabled Local Group
+
+- Security Disabled Universal Group
+
+- Security Disabled Global Group
+
+- Security Enabled Local Group
+
+- Security Enabled Universal Group
+
+- Security Enabled Global Group
+
+**Group:**
+
+- **Security ID** \[Type = SID\]**:** SID of changed group. Event Viewer automatically tries to resolve SIDs and show the group name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name** \[Type = UnicodeString\]**:** the name of the group, which type was changed. For example: ServiceDesk
+
+- **Group Domain** \[Type = UnicodeString\]: domain or computer name of the changed group. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this new group belongs, for example: “Win81”.
+
+ - [Built-in groups](https://technet.microsoft.com/en-us/library/dn169025(v=ws.10).aspx): Builtin
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4764(S): A group’s type was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical local or domain groups in the organization, and need to specifically monitor these groups for any change, especially group type change, monitor events with the “**Group\\Group Name”** values that correspond to the critical distribution groups. Examples of critical local or domain groups are built-in local administrators group, domain admins, enterprise admins, critical distribution groups, and so on.
+
+- If you need to monitor each time any group’s type is changed, to see who changed it and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
diff --git a/windows/keep-secure/event-4765.md b/windows/keep-secure/event-4765.md
new file mode 100644
index 0000000000..261ed56dd4
--- /dev/null
+++ b/windows/keep-secure/event-4765.md
@@ -0,0 +1,69 @@
+---
+title: 4765(S) SID History was added to an account. (Windows 10)
+description: Describes security event 4765(S) SID History was added to an account.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4765(S): SID History was added to an account.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when [SID History](https://msdn.microsoft.com/en-us/library/ms679833(v=vs.85).aspx) was added to an account.
+
+See more information about SID History here: .
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Schema:***
+
+*SID History was added to an account.*
+
+*Subject:*
+
+> *Security ID:%6*
+>
+> *Account Name:%7*
+>
+> *Account Domain:%8*
+>
+> *Logon ID:%9*
+
+*Target Account:*
+
+> *Security ID:%5*
+>
+> *Account Name:%3*
+>
+> *Account Domain:%4*
+
+*Source Account:*
+
+> *Security ID:%2*
+>
+> *Account Name:%1*
+
+*Additional Information:*
+
+> *Privileges:%10*
+>
+> *SID List:%11*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4766.md b/windows/keep-secure/event-4766.md
new file mode 100644
index 0000000000..61ed78f50d
--- /dev/null
+++ b/windows/keep-secure/event-4766.md
@@ -0,0 +1,65 @@
+---
+title: 4766(F) An attempt to add SID History to an account failed. (Windows 10)
+description: Describes security event 4766(F) An attempt to add SID History to an account failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4766(F): An attempt to add SID History to an account failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when an attempt to add [SID History](https://msdn.microsoft.com/en-us/library/ms679833(v=vs.85).aspx) to an account failed.
+
+See more information about SID History here: .
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Schema:***
+
+*An attempt to add SID History to an account failed.*
+
+*Subject:*
+
+> *Security ID:-*
+>
+> *Account Name:%5*
+>
+> *Account Domain:%6*
+>
+> *Logon ID:%7*
+
+*Target Account:*
+
+> *Security ID:%4*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+
+*Source Account:*
+
+> *Account Name:%1*
+
+*Additional Information:*
+
+> *Privileges:%8*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4767.md b/windows/keep-secure/event-4767.md
new file mode 100644
index 0000000000..bad7f26588
--- /dev/null
+++ b/windows/keep-secure/event-4767.md
@@ -0,0 +1,117 @@
+---
+title: 4767(S) A user account was unlocked. (Windows 10)
+description: Describes security event 4767(S) A user account was unlocked.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4767(S): A user account was unlocked.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time a user account is unlocked.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4767
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175705
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Auditor
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the unlock operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the unlock operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that was unlocked. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that was unlocked.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+## Security Monitoring Recommendations
+
+For 4767(S): A user account was unlocked.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- We recommend monitoring all [4767](event-4767.md) events for local accounts.
+
diff --git a/windows/keep-secure/event-4768.md b/windows/keep-secure/event-4768.md
new file mode 100644
index 0000000000..f8b4558198
--- /dev/null
+++ b/windows/keep-secure/event-4768.md
@@ -0,0 +1,342 @@
+---
+title: 4768(S, F) A Kerberos authentication ticket (TGT) was requested. (Windows 10)
+description: Describes security event 4768(S, F) A Kerberos authentication ticket (TGT) was requested.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4768(S, F): A Kerberos authentication ticket (TGT) was requested.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Kerberos Authentication Service](audit-kerberos-authentication-service.md)
+
+***Event Description:***
+
+This event generates every time Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT).
+
+This event generates only on domain controllers.
+
+If TGT issue fails then you will see Failure event with **Result Code** field not equal to “**0x0**”.
+
+This event doesn't generate for **Result Codes**: 0x10, 0x17 and 0x18. Event “[4771](event-4771.md): Kerberos pre-authentication failed.” generates instead.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4768
+ 0
+ 0
+ 14339
+ 0
+ 0x8020000000000000
+
+ 166747
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ dadmin
+ CONTOSO.LOCAL
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ krbtgt
+ S-1-5-21-3457937927-2839227994-823803824-502
+ 0x40810010
+ 0x0
+ 0x12
+ 15
+ ::ffff:10.0.0.12
+ 49273
+ contoso-DC01-CA-1
+ 1D0000000D292FBE3C6CDDAFA200020000000D
+ 564DFAEE99C71D62ABC553E695BD8DBC46669413
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Account Information:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of account, for which (TGT) ticket was requested. Computer account name ends with **$** character.
+
+ - User account example: dadmin
+
+ - Computer account example: WIN81$
+
+- **Supplied Realm Name** \[Type = UnicodeString\]**:** the name of the Kerberos Realm that **Account Name** belongs to. This can appear in a variety of formats, including the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+> **Note** A **Kerberos Realm** is a set of managed nodes that share the same Kerberos database. The Kerberos database resides on the Kerberos master computer system, which should be kept in a physically secure room. Active Directory domain is the example of Kerberos Realm in the Microsoft Windows Active Directory world.
+
+- **User ID** \[Type = SID\]**:** SID of account for which (TGT) ticket was requested. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+ For example: CONTOSO\\dadmin or CONTOSO\\WIN81$.
+
+ - **NULL SID** – this value shows in [4768](event-4768.md) Failure events.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+**Service Information:**
+
+- **Service Name** \[Type = UnicodeString\]: the name of the service in the Kerberos Realm to which TGT request was sent. Typically has value “**krbtgt”** for TGT requests, which means Ticket Granting Ticket issuing service.
+
+ - For Failure events **Service Name** typically has the following format: **krbtgt/REALM\_NAME**. For example: krbtgt/CONTOSO.
+
+- **Service ID** \[Type = SID\]**:** SID of the service account in the Kerberos Realm to which TGT request was sent. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+ Domain controllers have a specific service account (**krbtgt**) that is used by the [Key Distribution Center](https://msdn.microsoft.com/en-us/library/windows/desktop/aa378170(v=vs.85).aspx) (KDC) service to issue Kerberos tickets. It has a built-in, pre-defined SID: S-1-5-21-[DOMAIN\_IDENTIFIER](https://technet.microsoft.com/en-us/library/cc962011.aspx)-502.
+
+ - **NULL SID** – this value shows in [4768](event-4768.md) Failure events.
+
+**Network Information:**
+
+- **Client Address** \[Type = UnicodeString\]**:** IP address of the computer from which the TGT request was received. Formats vary, and include the following:
+
+ - **IPv6** or **IPv4** address.
+
+ - **::ffff:IPv4\_address**.
+
+ - **::1** - localhost.
+
+- **Client Port** \[Type = UnicodeString\]: source port number of client network connection (TGT request connection).
+
+ - 0 for local (localhost) requests.
+
+**Additional information:**
+
+- **Ticket Options** \[Type = HexInt32\]: this is a set of different ticket flags in hexadecimal format.
+
+ Example:
+
+ - Ticket Options: 0x40810010
+
+ - Binary view: 01000000100000010000000000010000
+
+ - Using **MSB 0** bit numbering we have bit 1, 8, 15 and 27 set = Forwardable, Renewable, Canonicalize, Renewable-ok.
+
+> **Note** In the table below **“MSB 0”** bit numbering is used, because RFC documents use this style. In “MSB 0” style bit numbering begins from left.
+
+The most common values:
+
+- 0x40810010 - Forwardable, Renewable, Canonicalize, Renewable-ok
+
+- 0x40810000 - Forwardable, Renewable, Canonicalize
+
+- 0x60810010 - Forwardable, Forwarded, Renewable, Canonicalize, Renewable-ok
+
+| Bit | Flag Name | Description |
+|-------|--------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | Reserved | - |
+| 1 | Forwardable | (TGT only). Tells the ticket-granting service that it can issue a new TGT—based on the presented TGT—with a different network address based on the presented TGT. |
+| 2 | Forwarded | Indicates either that a TGT has been forwarded or that a ticket was issued from a forwarded TGT. |
+| 3 | Proxiable | (TGT only). Tells the ticket-granting service that it can issue tickets with a network address that differs from the one in the TGT. |
+| 4 | Proxy | Indicates that the network address in the ticket is different from the one in the TGT used to obtain the ticket. |
+| 5 | Allow-postdate | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 6 | Postdated | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 7 | Invalid | This flag indicates that a ticket is invalid, and it must be validated by the KDC before use. Application servers must reject tickets which have this flag set. |
+| 8 | Renewable | Used in combination with the End Time and Renew Till fields to cause tickets with long life spans to be renewed at the KDC periodically. |
+| 9 | Initial | Indicates that a ticket was issued using the authentication service (AS) exchange and not issued based on a TGT. |
+| 10 | Pre-authent | Indicates that the client was authenticated by the KDC before a ticket was issued. This flag usually indicates the presence of an authenticator in the ticket. It can also flag the presence of credentials taken from a smart card logon. |
+| 11 | Opt-hardware-auth | This flag was originally intended to indicate that hardware-supported authentication was used during pre-authentication. This flag is no longer recommended in the Kerberos V5 protocol. KDCs MUST NOT issue a ticket with this flag set. KDCs SHOULD NOT preserve this flag if it is set by another KDC. |
+| 12 | Transited-policy-checked | KILE MUST NOT check for transited domains on servers or a KDC. Application servers MUST ignore the TRANSITED-POLICY-CHECKED flag. |
+| 13 | Ok-as-delegate | The KDC MUST set the OK-AS-DELEGATE flag if the service account is trusted for delegation. |
+| 14 | Request-anonymous | KILE not use this flag. |
+| 15 | Name-canonicalize | In order to request referrals the Kerberos client MUST explicitly request the "canonicalize" KDC option for the AS-REQ or TGS-REQ. |
+| 16-25 | Unused | - |
+| 26 | Disable-transited-check | By default the KDC will check the transited field of a TGT against the policy of the local realm before it will issue derivative tickets based on the TGT. If this flag is set in the request, checking of the transited field is disabled. Tickets issued without the performance of this check will be noted by the reset (0) value of the TRANSITED-POLICY-CHECKED flag, indicating to the application server that the transited field must be checked locally. KDCs are encouraged but not required to honor
the DISABLE-TRANSITED-CHECK option.
Should not be in use, because Transited-policy-checked flag is not supported by KILE. |
+| 27 | Renewable-ok | The RENEWABLE-OK option indicates that a renewable ticket will be acceptable if a ticket with the requested life cannot otherwise be provided, in which case a renewable ticket may be issued with a renew-till equal to the requested end time. The value of the renew-till field may still be limited by local limits, or limits selected by the individual principal or server. |
+| 28 | Enc-tkt-in-skey | No information. |
+| 29 | Unused | - |
+| 30 | Renew | The RENEW option indicates that the present request is for a renewal. The ticket provided is encrypted in the secret key for the server on which it is valid. This option will only be honored if the ticket to be renewed has its RENEWABLE flag set and if the time in it’s renew-till field has not passed. The ticket to be renewed is passed in the padata field as part of the authentication header. |
+| 31 | Validate | This option is used only by the ticket-granting service. The VALIDATE option indicates that the request is to validate a postdated ticket. Should not be in use, because postdated tickets are not supported by KILE. |
+
+> Table 2. Kerberos ticket flags.
+
+> **Note** [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) **(Microsoft Kerberos Protocol Extension)** – Kerberos protocol extensions used in Microsoft operating systems. These extensions provide additional capability for authorization information including group memberships, interactive logon information, and integrity levels.
+
+- **Result Code** \[Type = HexInt32\]**:** hexadecimal result code of TGT issue operation. The “Table 3. TGT/TGS issue error codes.” contains the list of the most common error codes for this event.
+
+| Code | Code Name | Description | Possible causes |
+|------------------------------------------------------------|----------------------------------------|-----------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x0 | KDC\_ERR\_NONE | No error | No errors were found. |
+| 0x1 | KDC\_ERR\_NAME\_EXP | Client's entry in KDC database has expired | No information. |
+| 0x2 | KDC\_ERR\_SERVICE\_EXP | Server's entry in KDC database has expired | No information. |
+| 0x3 | KDC\_ERR\_BAD\_PVNO | Requested Kerberos version number not supported | No information. |
+| 0x4 | KDC\_ERR\_C\_OLD\_MAST\_KVNO | Client's key encrypted in old master key | No information. |
+| 0x5 | KDC\_ERR\_S\_OLD\_MAST\_KVNO | Server's key encrypted in old master key | No information. |
+| 0x6 | KDC\_ERR\_C\_PRINCIPAL\_UNKNOWN | Client not found in Kerberos database | The username doesn’t exist. |
+| 0x7 | KDC\_ERR\_S\_PRINCIPAL\_UNKNOWN | Server not found in Kerberos database | This error can occur if the domain controller cannot find the server’s name in Active Directory. This error is similar to KDC\_ERR\_C\_PRINCIPAL\_UNKNOWN except that it occurs when the server name cannot be found. |
+| 0x8 | KDC\_ERR\_PRINCIPAL\_NOT\_UNIQUE | Multiple principal entries in KDC database | This error occurs if duplicate principal names exist. Unique principal names are crucial for ensuring mutual authentication. Thus, duplicate principal names are strictly forbidden, even across multiple realms. Without unique principal names, the client has no way of ensuring that the server it is communicating with is the correct one. |
+| 0x9 | KDC\_ERR\_NULL\_KEY | The client or server has a null key (master key) | No master key was found for client or server. Usually it means that administrator should reset the password on the account. |
+| 0xA | KDC\_ERR\_CANNOT\_POSTDATE | Ticket (TGT) not eligible for postdating | This error can occur if a client requests postdating of a Kerberos ticket. Postdating is the act of requesting that a ticket’s start time be set into the future.
It also can occur if there is a time difference between the client and the KDC. |
+| 0xB | KDC\_ERR\_NEVER\_VALID | Requested start time is later than end time | There is a time difference between the KDC and the client. |
+| 0xC | KDC\_ERR\_POLICY | Requested start time is later than end time | This error is usually the result of logon restrictions in place on a user’s account. For example workstation restriction, smart card authentication requirement or logon time restriction. |
+| 0xD | KDC\_ERR\_BADOPTION | KDC cannot accommodate requested option | Impending expiration of a TGT.
The SPN to which the client is attempting to delegate credentials is not in its Allowed-to-delegate-to list |
+| 0xE | KDC\_ERR\_ETYPE\_NOTSUPP | KDC has no support for encryption type | In general, this error occurs when the KDC or a client receives a packet that it cannot decrypt. |
+| 0xF | KDC\_ERR\_SUMTYPE\_NOSUPP | KDC has no support for checksum type | The KDC, server, or client receives a packet for which it does not have a key of the appropriate encryption type. The result is that the computer is unable to decrypt the ticket. |
+| 0x10 | KDC\_ERR\_PADATA\_TYPE\_NOSUPP | KDC has no support for PADATA type (pre-authentication data) | Smart card logon is being attempted and the proper certificate cannot be located. This can happen because the wrong certification authority (CA) is being queried or the proper CA cannot be contacted.
It can also happen when a domain controller doesn’t have a certificate installed for smart cards (Domain Controller or Domain Controller Authentication templates).
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x11 | KDC\_ERR\_TRTYPE\_NO\_SUPP | KDC has no support for transited type | No information. |
+| 0x12 | KDC\_ERR\_CLIENT\_REVOKED | Client’s credentials have been revoked | This might be because of an explicit disabling or because of other restrictions in place on the account. For example: account disabled, expired, or locked out. |
+| 0x13 | KDC\_ERR\_SERVICE\_REVOKED | Credentials for server have been revoked | No information. |
+| 0x14 | KDC\_ERR\_TGT\_REVOKED | TGT has been revoked | Since the remote KDC may change its PKCROSS key while there are PKCROSS tickets still active, it SHOULD cache the old PKCROSS keys until the last issued PKCROSS ticket expires. Otherwise, the remote KDC will respond to a client with a KRB-ERROR message of type KDC\_ERR\_TGT\_REVOKED. See [RFC1510](https://www.ietf.org/proceedings/49/I-D/draft-ietf-cat-kerberos-pk-cross-07.txt) for more details. |
+| 0x15 | KDC\_ERR\_CLIENT\_NOTYET | Client not yet valid—try again later | No information. |
+| 0x16 | KDC\_ERR\_SERVICE\_NOTYET | Server not yet valid—try again later | No information. |
+| 0x17 | KDC\_ERR\_KEY\_EXPIRED | Password has expired—change password to reset | The user’s password has expired.
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x18 | KDC\_ERR\_PREAUTH\_FAILED | Pre-authentication information was invalid | The wrong password was provided.
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x19 | KDC\_ERR\_PREAUTH\_REQUIRED | Additional pre-authentication required | This error often occurs in UNIX interoperability scenarios. MIT-Kerberos clients do not request pre-authentication when they send a KRB\_AS\_REQ message. If pre-authentication is required (the default), Windows systems will send this error. Most MIT-Kerberos clients will respond to this error by giving the pre-authentication, in which case the error can be ignored, but some clients might not respond in this way. |
+| 0x1A | KDC\_ERR\_SERVER\_NOMATCH | KDC does not know about the requested server | No information. |
+| 0x1B | KDC\_ERR\_SVC\_UNAVAILABLE | KDC is unavailable | No information. |
+| 0x1F | KRB\_AP\_ERR\_BAD\_INTEGRITY | Integrity check on decrypted field failed | The authenticator was encrypted with something other than the session key. The result is that the client cannot decrypt the resulting message. The modification of the message could be the result of an attack or it could be because of network noise. |
+| 0x20 | KRB\_AP\_ERR\_TKT\_EXPIRED | The ticket has expired | The smaller the value for the “Maximum lifetime for user ticket” Kerberos policy setting, the more likely it is that this error will occur. Because ticket renewal is automatic, you should not have to do anything if you get this message. |
+| 0x21 | KRB\_AP\_ERR\_TKT\_NYV | The ticket is not yet valid | The ticket presented to the server is not yet valid (in relationship to the server time). The most probable cause is that the clocks on the KDC and the client are not synchronized.
If cross-realm Kerberos authentication is being attempted, then you should verify time synchronization between the KDC in the target realm and the KDC in the client realm, as well. |
+| 0x22 | KRB\_AP\_ERR\_REPEAT | The request is a replay | This error indicates that a specific authenticator showed up twice — the KDC has detected that this session ticket duplicates one that it has already received. |
+| 0x23 | KRB\_AP\_ERR\_NOT\_US | The ticket is not for us | The server has received a ticket that was meant for a different realm. |
+| 0x24 | KRB\_AP\_ERR\_BADMATCH | The ticket and authenticator do not match | The KRB\_TGS\_REQ is being sent to the wrong KDC.
There is an account mismatch during protocol transition. |
+| 0x25 | KRB\_AP\_ERR\_SKEW | The clock skew is too great | This error is logged if a client computer sends a timestamp whose value differs from that of the server’s timestamp by more than the number of minutes found in the “Maximum tolerance for computer clock synchronization” setting in Kerberos policy. |
+| 0x26 | KRB\_AP\_ERR\_BADADDR | Network address in network layer header doesn't match address inside ticket | Session tickets MAY include the addresses from which they are valid. This error can occur if the address of the computer sending the ticket is different from the valid address in the ticket. A possible cause of this could be an Internet Protocol (IP) address change. Another possible cause is when a ticket is passed through a proxy server or NAT. The client is unaware of the address scheme used by the proxy server, so unless the program caused the client to request a proxy server ticket with the proxy server's source address, the ticket could be invalid. |
+| 0x27 | KRB\_AP\_ERR\_BADVERSION | Protocol version numbers don't match (PVNO) | When an application receives a KRB\_SAFE message, it verifies it. If any error occurs, an error code is reported for use by the application.
The message is first checked by verifying that the protocol version and type fields match the current version and KRB\_SAFE, respectively. A mismatch generates a KRB\_AP\_ERR\_BADVERSION.
See [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) for more details. |
+| 0x28 | KRB\_AP\_ERR\_MSG\_TYPE | Message type is unsupported | This message is generated when target server finds that message format is wrong. This applies to KRB\_AP\_REQ, KRB\_SAFE, KRB\_PRIV and KRB\_CRED messages.
This error also generated if use of UDP protocol is being attempted with User-to-User authentication. |
+| 0x29 | KRB\_AP\_ERR\_MODIFIED | Message stream modified and checksum didn't match | The authentication data was encrypted with the wrong key for the intended server.
The authentication data was modified in transit by a hardware or software error, or by an attacker.
The client sent the authentication data to the wrong server because incorrect DNS data caused the client to send the request to the wrong server.
The client sent the authentication data to the wrong server because DNS data was out-of-date on the client. |
+| 0x2A | KRB\_AP\_ERR\_BADORDER | Message out of order (possible tampering) | This event generates for KRB\_SAFE and KRB\_PRIV messages if an incorrect sequence number is included, or if a sequence number is expected but not present. See [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) for more details. |
+| 0x2C | KRB\_AP\_ERR\_BADKEYVER | Specified version of key is not available | This error might be generated on server side during receipt of invalid KRB\_AP\_REQ message. If the key version indicated by the Ticket in the KRB\_AP\_REQ is not one the server can use (e.g., it indicates an old key, and the server no longer possesses a copy of the old key), the KRB\_AP\_ERR\_BADKEYVER error is returned. |
+| 0x2D | KRB\_AP\_ERR\_NOKEY | Service key not available | This error might be generated on server side during receipt of invalid KRB\_AP\_REQ message. Because it is possible for the server to be registered in multiple realms, with different keys in each, the realm field in the unencrypted portion of the ticket in the KRB\_AP\_REQ is used to specify which secret key the server should use to decrypt that ticket. The KRB\_AP\_ERR\_NOKEY error code is returned if the server doesn't have the proper key to decipher the ticket. |
+| 0x2E | KRB\_AP\_ERR\_MUT\_FAIL | Mutual authentication failed | No information. |
+| 0x2F | KRB\_AP\_ERR\_BADDIRECTION | Incorrect message direction | No information. |
+| 0x30 | KRB\_AP\_ERR\_METHOD | Alternative authentication method required | According [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) this error message is obsolete. |
+| 0x31 | KRB\_AP\_ERR\_BADSEQ | Incorrect sequence number in message | No information. |
+| 0x32 | KRB\_AP\_ERR\_INAPP\_CKSUM | Inappropriate type of checksum in message (checksum may be unsupported) | When KDC receives KRB\_TGS\_REQ message it decrypts it, and after that, the user-supplied checksum in the Authenticator MUST be verified against the contents of the request. The message MUST be rejected either if the checksums do not match (with an error code of KRB\_AP\_ERR\_MODIFIED) or if the checksum is not collision-proof (with an error code of KRB\_AP\_ERR\_INAPP\_CKSUM). |
+| 0x33 | KRB\_AP\_PATH\_NOT\_ACCEPTED | Desired path is unreachable | No information. |
+| 0x34 | KRB\_ERR\_RESPONSE\_TOO\_BIG | Too much data | The size of a ticket is too large to be transmitted reliably via UDP. In a Windows environment, this message is purely informational. A computer running a Windows operating system will automatically try TCP if UDP fails. |
+| 0x3C | KRB\_ERR\_GENERIC | Generic error | Group membership has overloaded the PAC.
Multiple recent password changes have not propagated.
Crypto subsystem error caused by running out of memory.
SPN too long.
SPN has too many parts. |
+| 0x3D | KRB\_ERR\_FIELD\_TOOLONG | Field is too long for this implementation | Each request (KRB\_KDC\_REQ) and response (KRB\_KDC\_REP or KRB\_ERROR) sent over the TCP stream is preceded by the length of the request as 4 octets in network byte order. The high bit of the length is reserved for future expansion and MUST currently be set to zero. If a KDC that does not understand how to interpret a set high bit of the length encoding receives a request with the high order bit of the length set, it MUST return a KRB-ERROR message with the error KRB\_ERR\_FIELD\_TOOLONG and MUST close the TCP stream. |
+| 0x3E | KDC\_ERR\_CLIENT\_NOT\_TRUSTED | The client trust failed or is not implemented | This typically happens when user’s smart-card certificate is revoked or the root Certification Authority that issued the smart card certificate (in a chain) is not trusted by the domain controller. |
+| 0x3F | KDC\_ERR\_KDC\_NOT\_TRUSTED | The KDC server trust failed or could not be verified | The trustedCertifiers field contains a list of certification authorities trusted by the client, in the case that the client does not possess the KDC's public key certificate. If the KDC has no certificate signed by any of the trustedCertifiers, then it returns an error of type KDC\_ERR\_KDC\_NOT\_TRUSTED. See [RFC1510](https://www.ietf.org/proceedings/50/I-D/cat-kerberos-pk-init-13.txt) for more details. |
+| 0x40 | KDC\_ERR\_INVALID\_SIG | The signature is invalid | This error is related to PKINIT. If a PKI trust relationship exists, the KDC then verifies the client's signature on AuthPack (TGT request signature). If that fails, the KDC returns an error message of type KDC\_ERR\_INVALID\_SIG. |
+| 0x41 | KDC\_ERR\_KEY\_TOO\_WEAK | A higher encryption level is needed | If the clientPublicValue field is filled in, indicating that the client wishes to use Diffie-Hellman key agreement, then the KDC checks to see that the parameters satisfy its policy. If they do not (e.g., the prime size is insufficient for the expected encryption type), then the KDC sends back an error message of type KDC\_ERR\_KEY\_TOO\_WEAK. |
+| 0x42 | KRB\_AP\_ERR\_USER\_TO\_USER\_REQUIRED | User-to-user authorization is required | In the case that the client application doesn't know that a service requires user-to-user authentication, and requests and receives a conventional KRB\_AP\_REP, the client will send the KRB\_AP\_REP request, and the server will respond with a KRB\_ERROR token as described in [RFC1964](https://tools.ietf.org/html/rfc1964), with a msg-type of KRB\_AP\_ERR\_USER\_TO\_USER\_REQUIRED. |
+| 0x43 | KRB\_AP\_ERR\_NO\_TGT | No TGT was presented or available | In user-to-user authentication if the service does not possess a ticket granting ticket, it should return the error KRB\_AP\_ERR\_NO\_TGT. |
+| 0x44 | KDC\_ERR\_WRONG\_REALM | Incorrect domain or principal | Although this error rarely occurs, it occurs when a client presents a cross-realm TGT to a realm other than the one specified in the TGT. Typically, this results from incorrectly configured DNS. |
+
+> Table 3. TGT/TGS issue error codes.
+
+- **Ticket Encryption Type** \[Type = HexInt32\]: the cryptographic suite that was used for issued TGT.
+
+
+
+## Table 4. Kerberos encryption types
+
+| Type | Type Name | Description |
+|-----------------------------------------------------------------|-------------------------|-----------------------------------------------------------------------------------|
+| 0x1 | DES-CBC-CRC | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x3 | DES-CBC-MD5 | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x11 | AES128-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x12 | AES256-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x17 | RC4-HMAC | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0x18 | RC4-HMAC-EXP | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0xFFFFFFFF or 0xffffffff | - | This type shows in Audit Failure events. |
+
+
+- **Pre-Authentication Type** \[Type = UnicodeString\]: the code number of [pre-Authentication](https://technet.microsoft.com/en-us/library/cc772815(v=ws.10).aspx) type which was used in TGT request.
+
+
+## Table 5. Kerberos Pre-Authentication types.
+
+| Type | Type Name | Description |
+|------------------------------------------------------------------------|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | - | Logon without Pre-Authentication. |
+| 2 | PA-ENC-TIMESTAMP | This is a normal type for standard password authentication. |
+| 11 | PA-ETYPE-INFO | The ETYPE-INFO pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.
Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
+| 15 | PA-PK-AS-REP\_OLD | Used for Smart Card logon authentication. |
+| 17 | PA-PK-AS-REP | This type should also be used for Smart Card authentication, but in certain Active Directory environments, it is never seen. |
+| 19 | PA-ETYPE-INFO2 | The ETYPE-INFO2 pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.
Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
+| 20 | PA-SVR-REFERRAL-INFO | Used in KDC Referrals tickets. |
+| 138 | PA-ENCRYPTED-CHALLENGE | Logon using Kerberos Armoring (FAST). Supported starting from Windows Server 2012 domain controllers and Windows 8 clients. |
+| - | | This type shows in Audit Failure events. |
+
+**Certificate Information:**
+
+- **Certificate Issuer Name** \[Type = UnicodeString\]**:** the name of the Certification Authority that issued the smart card certificate. Populated in **Issued by** field in certificate.
+
+- **Certificate Serial Number** \[Type = UnicodeString\]**:** smart card certificate’s serial number. Can be found in **Serial number** field in the certificate.
+
+- **Certificate Thumbprint** \[Type = UnicodeString\]**:** smart card certificate’s thumbprint. Can be found in **Thumbprint** field in the certificate.
+
+## Security Monitoring Recommendations
+
+For 4768(S, F): A Kerberos authentication ticket (TGT) was requested.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“User ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“User ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“User ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“User ID”** for accounts that are outside the whitelist. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Supplied Realm Name”** corresponding to another domain or “external” location. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**User ID”** for names that don’t comply with naming conventions. |
+
+- You can track all [4768](event-4768.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges.
+
+- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4768](event-4768.md) events. If **Client Address** is not from the whitelist, generate the alert.
+
+- All **Client Address** = ::1 means local authentication. If you know the list of accounts which should log on to the domain controllers, then you need to monitor for all possible violations, where **Client Address** = ::1 and **Account Name** is not allowed to log on to any domain controller.
+
+- All [4768](event-4768.md) events with **Client Port** field value > 0 and < 1024 should be examined, because a well-known port was used for outbound connection.
+
+- Also consider monitoring the fields shown in the following table, to discover the issues listed:
+
+| **Field** | **Issue to discover** |
+|-----------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Certificate Issuer Name** | Certification authority name is not from your PKI infrastructure. |
+| **Certificate Issuer Name** | Certification authority name is not authorized to issue smart card authentication certificates. |
+| **Pre-Authentication Type** | Value is **0**, which means that pre-authentication was not used. All accounts should use Pre-Authentication, except accounts configured with “Do not require Kerberos preauthentication,” which is a security risk. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Pre-Authentication Type** | Value is **not 15** when account must use a smart card for authentication. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Pre-Authentication Type** | Value is **not 2** when only standard password authentication is in use in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Pre-Authentication Type** | Value is **not 138** when Kerberos Armoring is enabled for all Kerberos communications in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Ticket Encryption Type** | Value is **0x1** or **0x3**, which means the DES algorithm was used. DES should not be in use, because of low security and known vulnerabilities. It is disabled by default starting from Windows 7 and Windows Server 2008 R2. For more information, see [Table 4. Kerberos encryption types](#kerberos-encryption-types). |
+| **Ticket Encryption Type** | Starting with Windows Vista and Windows Server 2008, monitor for values **other than 0x11 and 0x12**. These are the expected values, starting with these operating systems, and represent AES-family algorithms. For more information, see [Table 4. Kerberos encryption types](#kerberos-encryption-types). |
+| **Result Code** | **0x6** (The username doesn't exist), if you see, for example N events in last N minutes. This can be an indicator of account enumeration attack, especially for highly critical accounts. |
+| **Result Code** | **0x7** (Server not found in Kerberos database). This error can occur if the domain controller cannot find the server's name in Active Directory. |
+| **Result Code** | **0x8** (Multiple principal entries in KDC database). This will help you to find duplicate SPNs faster. |
+| **Result Code** | **0x9** (The client or server has a null key (master key)). This error can help you to identify problems with Kerberos authentication faster. |
+| **Result Code** | **0xA** (Ticket (TGT) not eligible for postdating). Microsoft systems should not request postdated tickets. These events could help identify anomaly activity. |
+| **Result Code** | **0xC** (Requested start time is later than end time), if you see, for example N events in last N minutes. This can be an indicator of an account compromise attempt, especially for highly critical accounts. |
+| **Result Code** | **0xE** (KDC has no support for encryption type). In general, this error occurs when the KDC or a client receives a packet that it cannot decrypt. Monitor for these events because this should not happen in a standard Active Directory environment. |
+| **Result Code** | **0xF** (KDC has no support for checksum type). Monitor for these events because this should not happen in a standard Active Directory environment. |
+| **Result Code** | **0x12** (Client's credentials have been revoked), if you see, for example N events in last N minutes. This can be an indicator of anomaly activity or brute-force attack, especially for highly critical accounts. |
+| **Result Code** | **0x1F** (Integrity check on decrypted field failed). The authenticator was encrypted with something other than the session key. The result is that the KDC cannot decrypt the TGT. The modification of the message could be the result of an attack or it could be because of network noise. |
+| **Result Code** | **0x22** (The request is a replay). This error indicates that a specific authenticator showed up twice—the KDC has detected that this session ticket duplicates one that it has already received. It could be a sign of attack attempt. |
+| **Result Code** | **0x29** (Message stream modified and checksum didn't match). The authentication data was encrypted with the wrong key for the intended server. The authentication data was modified in transit by a hardware or software error, or by an attacker. Monitor for these events because this should not happen in a standard Active Directory environment. |
+| **Result Code** | **0x3C** (Generic error). This error can help you more quickly identify problems with Kerberos authentication. |
+| **Result Code** | **0x3E** (The client trust failed or is not implemented). This error helps you identify logon attempts with revoked certificates and the situations when the root Certification Authority that issued the smart card certificate (through a chain) is not trusted by a domain controller. |
+| **Result Code** | **0x3F**, **0x40**, **0x41** errors. These errors can help you more quickly identify smart-card related problems with Kerberos authentication. |
+
diff --git a/windows/keep-secure/event-4769.md b/windows/keep-secure/event-4769.md
new file mode 100644
index 0000000000..20c430fa33
--- /dev/null
+++ b/windows/keep-secure/event-4769.md
@@ -0,0 +1,287 @@
+---
+title: 4769(S, F) A Kerberos service ticket was requested. (Windows 10)
+description: Describes security event 4769(S, F) A Kerberos service ticket was requested.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4769(S, F): A Kerberos service ticket was requested.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Kerberos Service Ticket Operations](audit-kerberos-service-ticket-operations.md)
+
+***Event Description:***
+
+This event generates every time Key Distribution Center gets a Kerberos Ticket Granting Service (TGS) ticket request.
+
+This event generates only on domain controllers.
+
+If TGS issue fails then you will see Failure event with **Failure Code** field not equal to “**0x0**”.
+
+You will typically see many Failure events with **Failure Code** “**0x20**”, which simply means that a TGS ticket has expired. These are informational messages and have little to no security relevance.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+4769
+0
+0
+14337
+0
+0x8020000000000000
+
+166746
+
+
+Security
+DC01.contoso.local
+
+
+-
+dadmin@CONTOSO.LOCAL
+CONTOSO.LOCAL
+WIN2008R2$
+S-1-5-21-3457937927-2839227994-823803824-2102
+0x40810000
+0x12
+::ffff:10.0.0.12
+49272
+0x0
+{F85C455E-C66E-205C-6B39-F6C60A7FE453}
+-
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Account Information:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the User Principal Name (UPN) of the account that requested the ticket. Computer account name ends with **$** character in UPN. This field typically has the following value format: user\_account\_name@FULL\_DOMAIN\_NAME.
+
+ - User account example: dadmin@CONTOSO.LOCAL
+
+ - Computer account example: WIN81$@CONTOSO.LOCAL
+
+ This parameter in this event is optional and can be empty in some cases.
+
+- **Account Domain** \[Type = UnicodeString\]**:** the name of the Kerberos Realm that **Account Name** belongs to. This can appear in a variety of formats, including the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ This parameter in this event is optional and can be empty in some cases.
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event (on a domain controller) with other events (on the target computer for which the TGS was issued) that can contain the same **Logon GUID**. These events are “[4624](event-4624.md): An account was successfully logged on”, “[4648](event-4648.md)(S): A logon was attempted using explicit credentials” and “[4964](event-4964.md)(S): Special groups have been assigned to a new logon.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+**Service Information:**
+
+- **Service Name** \[Type = UnicodeString\]: the name of the account or computer for which the TGS ticket was requested.
+
+ - This parameter in this event is optional and can be empty in some cases.
+
+- **Service ID** \[Type = SID\]**:** SID of the account or computer object for which the TGS ticket was requested. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+ - **NULL SID** – this value shows in Failure events.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+**Network Information:**
+
+- **Client Address** \[Type = UnicodeString\]**:** IP address of the computer from which the TGS request was received. Formats vary, and include the following:
+
+ - **IPv6** or **IPv4** address.
+
+ - **::ffff:IPv4\_address**.
+
+ - **::1** - localhost.
+
+- **Client Port** \[Type = UnicodeString\]: source port number of client network connection (TGS request connection).
+
+ - 0 for local (localhost) requests.
+
+**Additional information:**
+
+- **Ticket Options**: \[Type = HexInt32\]: this is a set of different Ticket Flags in hexadecimal format.
+
+ Example:
+
+ - Ticket Options: 0x40810010
+
+ - Binary view: 01000000100000010000000000010000
+
+ - Using **MSB 0** bit numbering we have bit 1, 8, 15 and 27 set = Forwardable, Renewable, Canonicalize, Renewable-ok.
+
+> **Note** In the table below **“MSB 0”** bit numbering is used, because RFC documents use this style. In “MSB 0” style bit numbering begins from left.
+
+The most common values:
+
+- 0x40810010 - Forwardable, Renewable, Canonicalize, Renewable-ok
+
+- 0x40810000 - Forwardable, Renewable, Canonicalize
+
+- 0x60810010 - Forwardable, Forwarded, Renewable, Canonicalize, Renewable-ok
+
+| Bit | Flag Name | Description |
+|-------|--------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | Reserved | - |
+| 1 | Forwardable | (TGT only). Tells the ticket-granting service that it can issue a new TGT—based on the presented TGT—with a different network address based on the presented TGT. |
+| 2 | Forwarded | Indicates either that a TGT has been forwarded or that a ticket was issued from a forwarded TGT. |
+| 3 | Proxiable | (TGT only). Tells the ticket-granting service that it can issue tickets with a network address that differs from the one in the TGT. |
+| 4 | Proxy | Indicates that the network address in the ticket is different from the one in the TGT used to obtain the ticket. |
+| 5 | Allow-postdate | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 6 | Postdated | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 7 | Invalid | This flag indicates that a ticket is invalid, and it must be validated by the KDC before use. Application servers must reject tickets which have this flag set. |
+| 8 | Renewable | Used in combination with the End Time and Renew Till fields to cause tickets with long life spans to be renewed at the KDC periodically. |
+| 9 | Initial | Indicates that a ticket was issued using the authentication service (AS) exchange and not issued based on a TGT. |
+| 10 | Pre-authent | Indicates that the client was authenticated by the KDC before a ticket was issued. This flag usually indicates the presence of an authenticator in the ticket. It can also flag the presence of credentials taken from a smart card logon. |
+| 11 | Opt-hardware-auth | This flag was originally intended to indicate that hardware-supported authentication was used during pre-authentication. This flag is no longer recommended in the Kerberos V5 protocol. KDCs MUST NOT issue a ticket with this flag set. KDCs SHOULD NOT preserve this flag if it is set by another KDC. |
+| 12 | Transited-policy-checked | KILE MUST NOT check for transited domains on servers or a KDC. Application servers MUST ignore the TRANSITED-POLICY-CHECKED flag. |
+| 13 | Ok-as-delegate | The KDC MUST set the OK-AS-DELEGATE flag if the service account is trusted for delegation. |
+| 14 | Request-anonymous | KILE not use this flag. |
+| 15 | Name-canonicalize | In order to request referrals the Kerberos client MUST explicitly request the "canonicalize" KDC option for the AS-REQ or TGS-REQ. |
+| 16-25 | Unused | - |
+| 26 | Disable-transited-check | By default the KDC will check the transited field of a TGT against the policy of the local realm before it will issue derivative tickets based on the TGT. If this flag is set in the request, checking of the transited field is disabled. Tickets issued without the performance of this check will be noted by the reset (0) value of the TRANSITED-POLICY-CHECKED flag, indicating to the application server that the transited field must be checked locally. KDCs are encouraged but not required to honor
the DISABLE-TRANSITED-CHECK option.
Should not be in use, because Transited-policy-checked flag is not supported by KILE. |
+| 27 | Renewable-ok | The RENEWABLE-OK option indicates that a renewable ticket will be acceptable if a ticket with the requested life cannot otherwise be provided, in which case a renewable ticket may be issued with a renew-till equal to the requested end time. The value of the renew-till field may still be limited by local limits, or limits selected by the individual principal or server. |
+| 28 | Enc-tkt-in-skey | No information. |
+| 29 | Unused | - |
+| 30 | Renew | The RENEW option indicates that the present request is for a renewal. The ticket provided is encrypted in the secret key for the server on which it is valid. This option will only be honored if the ticket to be renewed has its RENEWABLE flag set and if the time in its renew-till field has not passed. The ticket to be renewed is passed in the padata field as part of the authentication header. |
+| 31 | Validate | This option is used only by the ticket-granting service. The VALIDATE option indicates that the request is to validate a postdated ticket. Should not be in use, because postdated tickets are not supported by KILE.
+## Table 4. Kerberos encryption types |
+
+- **Ticket Encryption Type**: \[Type = HexInt32\]: the cryptographic suite that was used for issued TGS.
+
+| Type | Type Name | Description |
+|--------------------------|-------------------------|-----------------------------------------------------------------------------------|
+| 0x1 | DES-CBC-CRC | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x3 | DES-CBC-MD5 | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x11 | AES128-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x12 | AES256-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x17 | RC4-HMAC | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0x18 | RC4-HMAC-EXP | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0xFFFFFFFF or 0xffffffff | - | This type shows in Audit Failure events. |
+
+- **Failure Code** \[Type = HexInt32\]**:** hexadecimal result code of TGS issue operation. The table below contains the list of the most common error codes for this event:
+
+| Code | Code Name | Description | Possible causes |
+|------|----------------------------------------|-----------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x0 | KDC\_ERR\_NONE | No error | No errors were found. |
+| 0x1 | KDC\_ERR\_NAME\_EXP | Client's entry in KDC database has expired | No information. |
+| 0x2 | KDC\_ERR\_SERVICE\_EXP | Server's entry in KDC database has expired | No information. |
+| 0x3 | KDC\_ERR\_BAD\_PVNO | Requested Kerberos version number not supported | No information. |
+| 0x4 | KDC\_ERR\_C\_OLD\_MAST\_KVNO | Client's key encrypted in old master key | No information. |
+| 0x5 | KDC\_ERR\_S\_OLD\_MAST\_KVNO | Server's key encrypted in old master key | No information. |
+| 0x6 | KDC\_ERR\_C\_PRINCIPAL\_UNKNOWN | Client not found in Kerberos database | The username doesn’t exist. |
+| 0x7 | KDC\_ERR\_S\_PRINCIPAL\_UNKNOWN | Server not found in Kerberos database | This error can occur if the domain controller cannot find the server’s name in Active Directory. This error is similar to KDC\_ERR\_C\_PRINCIPAL\_UNKNOWN except that it occurs when the server name cannot be found. |
+| 0x8 | KDC\_ERR\_PRINCIPAL\_NOT\_UNIQUE | Multiple principal entries in KDC database | This error occurs if duplicate principal names exist. Unique principal names are crucial for ensuring mutual authentication. Thus, duplicate principal names are strictly forbidden, even across multiple realms. Without unique principal names, the client has no way of ensuring that the server it is communicating with is the correct one. |
+| 0x9 | KDC\_ERR\_NULL\_KEY | The client or server has a null key (master key) | No master key was found for client or server. Usually it means that administrator should reset the password on the account. |
+| 0xA | KDC\_ERR\_CANNOT\_POSTDATE | Ticket (TGT) not eligible for postdating | This error can occur if a client requests postdating of a Kerberos ticket. Postdating is the act of requesting that a ticket’s start time be set into the future.
It also can occur if there is a time difference between the client and the KDC. |
+| 0xB | KDC\_ERR\_NEVER\_VALID | Requested start time is later than end time | There is a time difference between the KDC and the client. |
+| 0xC | KDC\_ERR\_POLICY | Requested start time is later than end time | This error is usually the result of logon restrictions in place on a user’s account. For example workstation restriction, smart card authentication requirement or logon time restriction. |
+| 0xD | KDC\_ERR\_BADOPTION | KDC cannot accommodate requested option | Impending expiration of a TGT.
The SPN to which the client is attempting to delegate credentials is not in its Allowed-to-delegate-to list |
+| 0xE | KDC\_ERR\_ETYPE\_NOTSUPP | KDC has no support for encryption type | In general, this error occurs when the KDC or a client receives a packet that it cannot decrypt. |
+| 0xF | KDC\_ERR\_SUMTYPE\_NOSUPP | KDC has no support for checksum type | The KDC, server, or client receives a packet for which it does not have a key of the appropriate encryption type. The result is that the computer is unable to decrypt the ticket. |
+| 0x10 | KDC\_ERR\_PADATA\_TYPE\_NOSUPP | KDC has no support for PADATA type (pre-authentication data) | Smart card logon is being attempted and the proper certificate cannot be located. This can happen because the wrong certification authority (CA) is being queried or the proper CA cannot be contacted.
It can also happen when a domain controller doesn’t have a certificate installed for smart cards (Domain Controller or Domain Controller Authentication templates).
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x11 | KDC\_ERR\_TRTYPE\_NO\_SUPP | KDC has no support for transited type | No information. |
+| 0x12 | KDC\_ERR\_CLIENT\_REVOKED | Client’s credentials have been revoked | This might be because of an explicit disabling or because of other restrictions in place on the account. For example: account disabled, expired, or locked out. |
+| 0x13 | KDC\_ERR\_SERVICE\_REVOKED | Credentials for server have been revoked | No information. |
+| 0x14 | KDC\_ERR\_TGT\_REVOKED | TGT has been revoked | Since the remote KDC may change its PKCROSS key while there are PKCROSS tickets still active, it SHOULD cache the old PKCROSS keys until the last issued PKCROSS ticket expires. Otherwise, the remote KDC will respond to a client with a KRB-ERROR message of type KDC\_ERR\_TGT\_REVOKED. See [RFC1510](https://www.ietf.org/proceedings/49/I-D/draft-ietf-cat-kerberos-pk-cross-07.txt) for more details. |
+| 0x15 | KDC\_ERR\_CLIENT\_NOTYET | Client not yet valid—try again later | No information. |
+| 0x16 | KDC\_ERR\_SERVICE\_NOTYET | Server not yet valid—try again later | No information. |
+| 0x17 | KDC\_ERR\_KEY\_EXPIRED | Password has expired—change password to reset | The user’s password has expired.
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x18 | KDC\_ERR\_PREAUTH\_FAILED | Pre-authentication information was invalid | The wrong password was provided.
This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
+| 0x19 | KDC\_ERR\_PREAUTH\_REQUIRED | Additional pre-authentication required | This error often occurs in UNIX interoperability scenarios. MIT-Kerberos clients do not request pre-authentication when they send a KRB\_AS\_REQ message. If pre-authentication is required (the default), Windows systems will send this error. Most MIT-Kerberos clients will respond to this error by giving the pre-authentication, in which case the error can be ignored, but some clients might not respond in this way. |
+| 0x1A | KDC\_ERR\_SERVER\_NOMATCH | KDC does not know about the requested server | No information. |
+| 0x1B | KDC\_ERR\_SVC\_UNAVAILABLE | KDC is unavailable | No information. |
+| 0x1F | KRB\_AP\_ERR\_BAD\_INTEGRITY | Integrity check on decrypted field failed | The authenticator was encrypted with something other than the session key. The result is that the client cannot decrypt the resulting message. The modification of the message could be the result of an attack or it could be because of network noise. |
+| 0x20 | KRB\_AP\_ERR\_TKT\_EXPIRED | The ticket has expired | The smaller the value for the “Maximum lifetime for user ticket” Kerberos policy setting, the more likely it is that this error will occur. Because ticket renewal is automatic, you should not have to do anything if you get this message. |
+| 0x21 | KRB\_AP\_ERR\_TKT\_NYV | The ticket is not yet valid | The ticket presented to the server is not yet valid (in relationship to the server time). The most probable cause is that the clocks on the KDC and the client are not synchronized.
If cross-realm Kerberos authentication is being attempted, then you should verify time synchronization between the KDC in the target realm and the KDC in the client realm, as well. |
+| 0x22 | KRB\_AP\_ERR\_REPEAT | The request is a replay | This error indicates that a specific authenticator showed up twice — the KDC has detected that this session ticket duplicates one that it has already received. |
+| 0x23 | KRB\_AP\_ERR\_NOT\_US | The ticket is not for us | The server has received a ticket that was meant for a different realm. |
+| 0x24 | KRB\_AP\_ERR\_BADMATCH | The ticket and authenticator do not match | The KRB\_TGS\_REQ is being sent to the wrong KDC.
There is an account mismatch during protocol transition. |
+| 0x25 | KRB\_AP\_ERR\_SKEW | The clock skew is too great | This error is logged if a client computer sends a timestamp whose value differs from that of the server’s timestamp by more than the number of minutes found in the “Maximum tolerance for computer clock synchronization” setting in Kerberos policy. |
+| 0x26 | KRB\_AP\_ERR\_BADADDR | Network address in network layer header doesn't match address inside ticket | Session tickets MAY include the addresses from which they are valid. This error can occur if the address of the computer sending the ticket is different from the valid address in the ticket. A possible cause of this could be an Internet Protocol (IP) address change. Another possible cause is when a ticket is passed through a proxy server or NAT. The client is unaware of the address scheme used by the proxy server, so unless the program caused the client to request a proxy server ticket with the proxy server's source address, the ticket could be invalid. |
+| 0x27 | KRB\_AP\_ERR\_BADVERSION | Protocol version numbers don't match (PVNO) | When an application receives a KRB\_SAFE message, it verifies it. If any error occurs, an error code is reported for use by the application.
The message is first checked by verifying that the protocol version and type fields match the current version and KRB\_SAFE, respectively. A mismatch generates a KRB\_AP\_ERR\_BADVERSION.
See [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) for more details. |
+| 0x28 | KRB\_AP\_ERR\_MSG\_TYPE | Message type is unsupported | This message is generated when target server finds that message format is wrong. This applies to KRB\_AP\_REQ, KRB\_SAFE, KRB\_PRIV and KRB\_CRED messages.
This error also generated if use of UDP protocol is being attempted with User-to-User authentication. |
+| 0x29 | KRB\_AP\_ERR\_MODIFIED | Message stream modified and checksum didn't match | The authentication data was encrypted with the wrong key for the intended server.
The authentication data was modified in transit by a hardware or software error, or by an attacker.
The client sent the authentication data to the wrong server because incorrect DNS data caused the client to send the request to the wrong server.
The client sent the authentication data to the wrong server because DNS data was out-of-date on the client. |
+| 0x2A | KRB\_AP\_ERR\_BADORDER | Message out of order (possible tampering) | This event generates for KRB\_SAFE and KRB\_PRIV messages if an incorrect sequence number is included, or if a sequence number is expected but not present. See [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) for more details. |
+| 0x2C | KRB\_AP\_ERR\_BADKEYVER | Specified version of key is not available | This error might be generated on server side during receipt of invalid KRB\_AP\_REQ message. If the key version indicated by the Ticket in the KRB\_AP\_REQ is not one the server can use (e.g., it indicates an old key, and the server no longer possesses a copy of the old key), the KRB\_AP\_ERR\_BADKEYVER error is returned. |
+| 0x2D | KRB\_AP\_ERR\_NOKEY | Service key not available | This error might be generated on server side during receipt of invalid KRB\_AP\_REQ message. Because it is possible for the server to be registered in multiple realms, with different keys in each, the realm field in the unencrypted portion of the ticket in the KRB\_AP\_REQ is used to specify which secret key the server should use to decrypt that ticket. The KRB\_AP\_ERR\_NOKEY error code is returned if the server doesn't have the proper key to decipher the ticket. |
+| 0x2E | KRB\_AP\_ERR\_MUT\_FAIL | Mutual authentication failed | No information. |
+| 0x2F | KRB\_AP\_ERR\_BADDIRECTION | Incorrect message direction | No information. |
+| 0x30 | KRB\_AP\_ERR\_METHOD | Alternative authentication method required | According [RFC4120](http://www.ietf.org/rfc/rfc4120.txt) this error message is obsolete. |
+| 0x31 | KRB\_AP\_ERR\_BADSEQ | Incorrect sequence number in message | No information. |
+| 0x32 | KRB\_AP\_ERR\_INAPP\_CKSUM | Inappropriate type of checksum in message (checksum may be unsupported) | When KDC receives KRB\_TGS\_REQ message it decrypts it, and after the user-supplied checksum in the Authenticator MUST be verified against the contents of the request, and the message MUST be rejected if the checksums do not match (with an error code of KRB\_AP\_ERR\_MODIFIED) or if the checksum is not collision-proof (with an error code of KRB\_AP\_ERR\_INAPP\_CKSUM). |
+| 0x33 | KRB\_AP\_PATH\_NOT\_ACCEPTED | Desired path is unreachable | No information. |
+| 0x34 | KRB\_ERR\_RESPONSE\_TOO\_BIG | Too much data | The size of a ticket is too large to be transmitted reliably via UDP. In a Windows environment, this message is purely informational. A computer running a Windows operating system will automatically try TCP if UDP fails. |
+| 0x3C | KRB\_ERR\_GENERIC | Generic error | Group membership has overloaded the PAC.
Multiple recent password changes have not propagated.
Crypto subsystem error caused by running out of memory.
SPN too long.
SPN has too many parts. |
+| 0x3D | KRB\_ERR\_FIELD\_TOOLONG | Field is too long for this implementation | Each request (KRB\_KDC\_REQ) and response (KRB\_KDC\_REP or KRB\_ERROR) sent over the TCP stream is preceded by the length of the request as 4 octets in network byte order. The high bit of the length is reserved for future expansion and MUST currently be set to zero. If a KDC that does not understand how to interpret a set high bit of the length encoding receives a request with the high order bit of the length set, it MUST return a KRB-ERROR message with the error KRB\_ERR\_FIELD\_TOOLONG and MUST close the TCP stream. |
+| 0x3E | KDC\_ERR\_CLIENT\_NOT\_TRUSTED | The client trust failed or is not implemented | This typically happens when user’s smart-card certificate is revoked or the root Certification Authority that issued the smart card certificate (in a chain) is not trusted by the domain controller. |
+| 0x3F | KDC\_ERR\_KDC\_NOT\_TRUSTED | The KDC server trust failed or could not be verified | The trustedCertifiers field contains a list of certification authorities trusted by the client, in the case that the client does not possess the KDC's public key certificate. If the KDC has no certificate signed by any of the trustedCertifiers, then it returns an error of type KDC\_ERR\_KDC\_NOT\_TRUSTED. See [RFC1510](https://www.ietf.org/proceedings/50/I-D/cat-kerberos-pk-init-13.txt) for more details. |
+| 0x40 | KDC\_ERR\_INVALID\_SIG | The signature is invalid | This error is related to PKINIT. If a PKI trust relationship exists, the KDC then verifies the client's signature on AuthPack (TGT request signature). If that fails, the KDC returns an error message of type KDC\_ERR\_INVALID\_SIG. |
+| 0x41 | KDC\_ERR\_KEY\_TOO\_WEAK | A higher encryption level is needed | If the clientPublicValue field is filled in, indicating that the client wishes to use Diffie-Hellman key agreement, then the KDC checks to see that the parameters satisfy its policy. If they do not (e.g., the prime size is insufficient for the expected encryption type), then the KDC sends back an error message of type KDC\_ERR\_KEY\_TOO\_WEAK. |
+| 0x42 | KRB\_AP\_ERR\_USER\_TO\_USER\_REQUIRED | User-to-user authorization is required | In the case that the client application doesn't know that a service requires user-to-user authentication, and requests and receives a conventional KRB\_AP\_REP, the client will send the KRB\_AP\_REP request, and the server will respond with a KRB\_ERROR token as described in [RFC1964](https://tools.ietf.org/html/rfc1964), with a msg-type of KRB\_AP\_ERR\_USER\_TO\_USER\_REQUIRED. |
+| 0x43 | KRB\_AP\_ERR\_NO\_TGT | No TGT was presented or available | In user-to-user authentication if the service does not possess a ticket granting ticket, it should return the error KRB\_AP\_ERR\_NO\_TGT. |
+| 0x44 | KDC\_ERR\_WRONG\_REALM | Incorrect domain or principal | Although this error rarely occurs, it occurs when a client presents a cross-realm TGT to a realm other than the one specified in the TGT. Typically, this results from incorrectly configured DNS. |
+
+- **Transited Services** \[Type = UnicodeString\]: this field contains list of SPNs which were requested if Kerberos delegation was used.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+## Security Monitoring Recommendations
+
+For 4769(S, F): A Kerberos service ticket was requested.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Account Information\\Account Name”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Account Information\\Account Name”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Account Information\\Account Name”** that corresponds to the accounts that should never be used. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Account Information\\Account Domain”** corresponding to another domain or “external” location. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Account Information\\Account Name”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**User ID”** for names that don’t comply with naming conventions. |
+
+- If you know that **Account Name** should never request any tickets for (that is, never get access to) a particular computer account or service account, monitor for [4769](event-4769.md) events with the corresponding **Account Name** and **Service ID** fields.
+
+- You can track all [4769](event-4769.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges.
+
+- If you know that **Account Name** should be able to request tickets (should be used) only from a known whitelist of IP addresses, track all **Client Address** values for this **Account Name** in [4769](event-4769.md) events. If **Client Address** is not from your whitelist of IP addresses, generate the alert.
+
+- All **Client Address** = ::1 means local TGS requests, which means that the **Account Name** logged on to a domain controller before making the TGS request. If you have a whitelist of accounts allowed to log on to domain controllers, monitor events with **Client Address** = ::1 and any **Account Name** outside the whitelist.
+
+- All [4769](event-4769.md) events with **Client Port** field value > 0 and < 1024 should be examined, because a well-known port was used for outbound connection.
+
+- Monitor for a **Ticket Encryption Type** of **0x1** or **0x3**, which means the DES algorithm was used. DES should not be in use, because of low security and known vulnerabilities. It is disabled by default starting from Windows 7 and Windows Server 2008 R2.
+
+- Starting with Windows Vista and Windows Server 2008, monitor for a **Ticket Encryption Type** other than **0x11 and 0x12**. These are the expected values, starting with these operating systems, and represent AES-family algorithms.
+
+- If you have a list of important **Failure Codes**, monitor for these codes.
+
diff --git a/windows/keep-secure/event-4770.md b/windows/keep-secure/event-4770.md
new file mode 100644
index 0000000000..5983d931d7
--- /dev/null
+++ b/windows/keep-secure/event-4770.md
@@ -0,0 +1,183 @@
+---
+title: 4770(S) A Kerberos service ticket was renewed. (Windows 10)
+description: Describes security event 4770(S) A Kerberos service ticket was renewed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4770(S): A Kerberos service ticket was renewed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Kerberos Service Ticket Operations](audit-kerberos-service-ticket-operations.md)
+
+***Event Description:***
+
+This event generates for every Ticket Granting Service (TGS) ticket renewal.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4770
+ 0
+ 0
+ 14337
+ 0
+ 0x8020000000000000
+
+ 166481
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ WIN2008R2$@CONTOSO.LOCAL
+ CONTOSO.LOCAL
+ krbtgt
+ S-1-5-21-3457937927-2839227994-823803824-502
+ 0x2
+ 0x12
+ ::ffff:10.0.0.12
+ 49964
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Account Information:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the User Principal Name (UPN) of the account that requested ticket renewal. Computer account name ends with **$** character in UPN. This field typically has the following value format: user\_account\_name@FULL\_DOMAIN\_NAME.
+
+ - User account example: dadmin@CONTOSO.LOCAL
+
+ - Computer account example: WIN81$@CONTOSO.LOCAL
+
+ This parameter in this event is optional and can be empty in some cases.
+
+- **Account Domain** \[Type = UnicodeString\]**:** the name of the Kerberos Realm that **Account Name** belongs to. This can appear in a variety of formats, including the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ This parameter in this event is optional and can be empty in some cases.
+
+**Service Information:**
+
+- **Service Name** \[Type = UnicodeString\]: the name of the account or computer for which the TGS ticket was renewed.
+
+ - This parameter in this event is optional and can be empty in some cases.
+
+- **Service ID** \[Type = SID\]**:** SID of the account or computer object for which the TGS ticket was renewed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+**Network Information:**
+
+- **Client Address** \[Type = UnicodeString\]**:** IP address of the computer from which the TGS renewal request was received. Formats vary, and include the following:
+
+ - **IPv6** or **IPv4** address.
+
+ - **::ffff:IPv4\_address**.
+
+ - **::1** - localhost.
+
+- **Client Port** \[Type = UnicodeString\]: source port number of client network connection (TGS renewal request connection).
+
+ - 0 for local (localhost) requests.
+
+**Additional information:**
+
+- **Ticket Options**: \[Type = HexInt32\]: this is a set of different Ticket Flags in hexadecimal format.
+
+ Example:
+
+ - Ticket Options: 0x40810010
+
+ - Binary view: 01000000100000010000000000010000
+
+ - Using **MSB 0** bit numbering we have bit 1, 8, 15 and 27 set = Forwardable, Renewable, Canonicalize, Renewable-ok.
+
+> **Note** In the table below **“MSB 0”** bit numbering is used, because RFC documents use this style. In “MSB 0” style bit numbering begins from left.
+
+The most common values:
+
+- 0x40810010 - Forwardable, Renewable, Canonicalize, Renewable-ok
+
+- 0x40810000 - Forwardable, Renewable, Canonicalize
+
+- 0x60810010 - Forwardable, Forwarded, Renewable, Canonicalize, Renewable-ok
+
+| Bit | Flag Name | Description |
+|-------|--------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | Reserved | - |
+| 1 | Forwardable | (TGT only). Tells the ticket-granting service that it can issue a new TGT—based on the presented TGT—with a different network address based on the presented TGT. |
+| 2 | Forwarded | Indicates either that a TGT has been forwarded or that a ticket was issued from a forwarded TGT. |
+| 3 | Proxiable | (TGT only). Tells the ticket-granting service that it can issue tickets with a network address that differs from the one in the TGT. |
+| 4 | Proxy | Indicates that the network address in the ticket is different from the one in the TGT used to obtain the ticket. |
+| 5 | Allow-postdate | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 6 | Postdated | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 7 | Invalid | This flag indicates that a ticket is invalid, and it must be validated by the KDC before use. Application servers must reject tickets which have this flag set. |
+| 8 | Renewable | Used in combination with the End Time and Renew Till fields to cause tickets with long life spans to be renewed at the KDC periodically. |
+| 9 | Initial | Indicates that a ticket was issued using the authentication service (AS) exchange and not issued based on a TGT. |
+| 10 | Pre-authent | Indicates that the client was authenticated by the KDC before a ticket was issued. This flag usually indicates the presence of an authenticator in the ticket. It can also flag the presence of credentials taken from a smart card logon. |
+| 11 | Opt-hardware-auth | This flag was originally intended to indicate that hardware-supported authentication was used during pre-authentication. This flag is no longer recommended in the Kerberos V5 protocol. KDCs MUST NOT issue a ticket with this flag set. KDCs SHOULD NOT preserve this flag if it is set by another KDC. |
+| 12 | Transited-policy-checked | KILE MUST NOT check for transited domains on servers or a KDC. Application servers MUST ignore the TRANSITED-POLICY-CHECKED flag. |
+| 13 | Ok-as-delegate | The KDC MUST set the OK-AS-DELEGATE flag if the service account is trusted for delegation. |
+| 14 | Request-anonymous | KILE not use this flag. |
+| 15 | Name-canonicalize | In order to request referrals the Kerberos client MUST explicitly request the "canonicalize" KDC option for the AS-REQ or TGS-REQ. |
+| 16-25 | Unused | - |
+| 26 | Disable-transited-check | By default the KDC will check the transited field of a TGT against the policy of the local realm before it will issue derivative tickets based on the TGT. If this flag is set in the request, checking of the transited field is disabled. Tickets issued without the performance of this check will be noted by the reset (0) value of the TRANSITED-POLICY-CHECKED flag, indicating to the application server that the transited field must be checked locally. KDCs are encouraged but not required to honor
the DISABLE-TRANSITED-CHECK option.
Should not be in use, because Transited-policy-checked flag is not supported by KILE. |
+| 27 | Renewable-ok | The RENEWABLE-OK option indicates that a renewable ticket will be acceptable if a ticket with the requested life cannot otherwise be provided, in which case a renewable ticket may be issued with a renew-till equal to the requested end time. The value of the renew-till field may still be limited by local limits, or limits selected by the individual principal or server. |
+| 28 | Enc-tkt-in-skey | No information. |
+| 29 | Unused | - |
+| 30 | Renew | The RENEW option indicates that the present request is for a renewal. The ticket provided is encrypted in the secret key for the server on which it is valid. This option will only be honored if the ticket to be renewed has its RENEWABLE flag set and if the time in it’s renew-till field has not passed. The ticket to be renewed is passed in the padata field as part of the authentication header. |
+| 31 | Validate | This option is used only by the ticket-granting service. The VALIDATE option indicates that the request is to validate a postdated ticket. Should not be in use, because postdated tickets are not supported by KILE. |
+
+- **Ticket Encryption Type**: \[Type = HexInt32\]: the cryptographic suite that was used in renewed TGS.
+
+| Type | Type Name | Description |
+|--------------------------|-------------------------|-----------------------------------------------------------------------------------|
+| 0x1 | DES-CBC-CRC | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x3 | DES-CBC-MD5 | Disabled by default starting from Windows 7 and Windows Server 2008 R2. |
+| 0x11 | AES128-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x12 | AES256-CTS-HMAC-SHA1-96 | Supported starting from Windows Server 2008 and Windows Vista. |
+| 0x17 | RC4-HMAC | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0x18 | RC4-HMAC-EXP | Default suite for operating systems before Windows Server 2008 and Windows Vista. |
+| 0xFFFFFFFF or 0xffffffff | - | This type shows in Audit Failure events. |
+
+
+## Security Monitoring Recommendations
+
+For 4770(S): A Kerberos service ticket was renewed.
+
+- This event typically has informational only purpose.
+
diff --git a/windows/keep-secure/event-4771.md b/windows/keep-secure/event-4771.md
new file mode 100644
index 0000000000..ec327a9f1f
--- /dev/null
+++ b/windows/keep-secure/event-4771.md
@@ -0,0 +1,226 @@
+---
+title: 4771(F) Kerberos pre-authentication failed. (Windows 10)
+description: Describes security event 4771(F) Kerberos pre-authentication failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4771(F): Kerberos pre-authentication failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Kerberos Authentication Service](audit-kerberos-authentication-service.md)
+
+***Event Description:***
+
+This event generates every time the Key Distribution Center fails to issue a Kerberos Ticket Granting Ticket (TGT). This can occur when a domain controller doesn’t have a certificate installed for smart card authentication (for example, with a “Domain Controller” or “Domain Controller Authentication” template), the user’s password has expired, or the wrong password was provided.
+
+This event generates only on domain controllers.
+
+This event is not generated if “Do not require Kerberos preauthentication” option is set for the account.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4771
+ 0
+ 0
+ 14339
+ 0
+ 0x8010000000000000
+
+ 166708
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ dadmin
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ krbtgt/CONTOSO.LOCAL
+ 0x40810010
+ 0x10
+ 15
+ ::ffff:10.0.0.12
+ 49254
+
+
+
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Account Information:**
+
+- **Security ID** \[Type = SID\]**:** SID of account object for which (TGT) ticket was requested. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+ For example: CONTOSO\\dadmin or CONTOSO\\WIN81$.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name:** \[Type = UnicodeString\]**:** the name of account, for which (TGT) ticket was requested. Computer account name ends with **$** character.
+
+ - User account example: dadmin
+
+ - Computer account example: WIN81$
+
+**Service Information:**
+
+- **Service Name** \[Type = UnicodeString\]: the name of the service in the Kerberos Realm to which TGT request was sent. Typically has one of the following formats:
+
+ - krbtgt/DOMAIN\_NETBIOS\_NAME. Example: krbtgt/CONTOSO
+
+ - krbtgt/DOMAIN\_FULL\_NAME. Example: krbtgt/CONTOSO.LOCAL
+
+**Network Information:**
+
+- **Client Address** \[Type = UnicodeString\]**:** IP address of the computer from which the TGT request was received. Formats vary, and include the following:
+
+ - **IPv6** or **IPv4** address.
+
+ - **::ffff:IPv4\_address**.
+
+ - **::1** - localhost.
+
+- **Client Port** \[Type = UnicodeString\]: source port number of client network connection (TGT request connection).
+
+ - 0 for local (localhost) requests.
+
+**Additional Information:**
+
+- **Ticket Options**: \[Type = HexInt32\]: this is a set of different Ticket Flags in hexadecimal format.
+
+ Example:
+
+ - Ticket Options: 0x40810010
+
+ - Binary view: 01000000100000010000000000010000
+
+ - Using **MSB 0** bit numbering we have bit 1, 8, 15 and 27 set = Forwardable, Renewable, Canonicalize, Renewable-ok.
+
+> **Note** In the table below **“MSB 0”** bit numbering is used, because RFC documents use this style. In “MSB 0” style bit numbering begins from left.
+
+The most common values:
+
+- 0x40810010 - Forwardable, Renewable, Canonicalize, Renewable-ok
+
+- 0x40810000 - Forwardable, Renewable, Canonicalize
+
+- 0x60810010 - Forwardable, Forwarded, Renewable, Canonicalize, Renewable-ok
+
+| Bit | Flag Name | Description |
+|-------|--------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | Reserved | - |
+| 1 | Forwardable | (TGT only). Tells the ticket-granting service that it can issue a new TGT—based on the presented TGT—with a different network address based on the presented TGT. |
+| 2 | Forwarded | Indicates either that a TGT has been forwarded or that a ticket was issued from a forwarded TGT. |
+| 3 | Proxiable | (TGT only). Tells the ticket-granting service that it can issue tickets with a network address that differs from the one in the TGT. |
+| 4 | Proxy | Indicates that the network address in the ticket is different from the one in the TGT used to obtain the ticket. |
+| 5 | Allow-postdate | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 6 | Postdated | Postdated tickets SHOULD NOT be supported in [KILE](https://msdn.microsoft.com/en-us/library/cc233855.aspx) (Microsoft Kerberos Protocol Extension). |
+| 7 | Invalid | This flag indicates that a ticket is invalid, and it must be validated by the KDC before use. Application servers must reject tickets which have this flag set. |
+| 8 | Renewable | Used in combination with the End Time and Renew Till fields to cause tickets with long life spans to be renewed at the KDC periodically. |
+| 9 | Initial | Indicates that a ticket was issued using the authentication service (AS) exchange and not issued based on a TGT. |
+| 10 | Pre-authent | Indicates that the client was authenticated by the KDC before a ticket was issued. This flag usually indicates the presence of an authenticator in the ticket. It can also flag the presence of credentials taken from a smart card logon. |
+| 11 | Opt-hardware-auth | This flag was originally intended to indicate that hardware-supported authentication was used during pre-authentication. This flag is no longer recommended in the Kerberos V5 protocol. KDCs MUST NOT issue a ticket with this flag set. KDCs SHOULD NOT preserve this flag if it is set by another KDC. |
+| 12 | Transited-policy-checked | KILE MUST NOT check for transited domains on servers or a KDC. Application servers MUST ignore the TRANSITED-POLICY-CHECKED flag. |
+| 13 | Ok-as-delegate | The KDC MUST set the OK-AS-DELEGATE flag if the service account is trusted for delegation. |
+| 14 | Request-anonymous | KILE not use this flag. |
+| 15 | Name-canonicalize | In order to request referrals the Kerberos client MUST explicitly request the "canonicalize" KDC option for the AS-REQ or TGS-REQ. |
+| 16-25 | Unused | - |
+| 26 | Disable-transited-check | By default the KDC will check the transited field of a TGT against the policy of the local realm before it will issue derivative tickets based on the TGT. If this flag is set in the request, checking of the transited field is disabled. Tickets issued without the performance of this check will be noted by the reset (0) value of the TRANSITED-POLICY-CHECKED flag, indicating to the application server that the transited field must be checked locally. KDCs are encouraged but not required to honor
the DISABLE-TRANSITED-CHECK option.
Should not be in use, because Transited-policy-checked flag is not supported by KILE. |
+| 27 | Renewable-ok | The RENEWABLE-OK option indicates that a renewable ticket will be acceptable if a ticket with the requested life cannot otherwise be provided, in which case a renewable ticket may be issued with a renew-till equal to the requested end time. The value of the renew-till field may still be limited by local limits, or limits selected by the individual principal or server. |
+| 28 | Enc-tkt-in-skey | No information. |
+| 29 | Unused | - |
+| 30 | Renew | The RENEW option indicates that the present request is for a renewal. The ticket provided is encrypted in the secret key for the server on which it is valid. This option will only be honored if the ticket to be renewed has its RENEWABLE flag set and if the time in its renew-till field has not passed. The ticket to be renewed is passed in the padata field as part of the authentication header. |
+| 31 | Validate | This option is used only by the ticket-granting service. The VALIDATE option indicates that the request is to validate a postdated ticket. Should not be in use, because postdated tickets are not supported by KILE. |
+
+> Table 6. Kerberos ticket flags.
+
+- **Failure Code** \[Type = HexInt32\]**:** hexadecimal failure code of failed TGT issue operation. The table below contains the list of the most common error codes for this event:
+
+| Code | Code Name | Description | Possible causes |
+|------|--------------------------------|--------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0x10 | KDC\_ERR\_PADATA\_TYPE\_NOSUPP | KDC has no support for PADATA type (pre-authentication data) | Smart card logon is being attempted and the proper certificate cannot be located. This can happen because the wrong certification authority (CA) is being queried or the proper CA cannot be contacted in order to get Domain Controller or Domain Controller Authentication certificates for the domain controller.
It can also happen when a domain controller doesn’t have a certificate installed for smart cards (Domain Controller or Domain Controller Authentication templates). |
+| 0x17 | KDC\_ERR\_KEY\_EXPIRED | Password has expired—change password to reset | The user’s password has expired. |
+| 0x18 | KDC\_ERR\_PREAUTH\_FAILED | Pre-authentication information was invalid | The wrong password was provided. |
+
+- **Pre-Authentication Type** \[Type = UnicodeString\]: the code of [pre-Authentication](https://technet.microsoft.com/en-us/library/cc772815(v=ws.10).aspx) type which was used in TGT request.
+
+
+## Table 5. Kerberos Pre-Authentication types.
+
+| Type | Type Name | Description |
+|------|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | - | Logon without Pre-Authentication. |
+| 2 | PA-ENC-TIMESTAMP | This is a normal type for standard password authentication. |
+| 11 | PA-ETYPE-INFO | The ETYPE-INFO pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.
Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
+| 15 | PA-PK-AS-REP\_OLD | Used for Smart Card logon authentication. |
+| 17 | PA-PK-AS-REP | This type should also be used for Smart Card authentication, but in certain Active Directory environments, it is never seen. |
+| 19 | PA-ETYPE-INFO2 | The ETYPE-INFO2 pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.
Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
+| 20 | PA-SVR-REFERRAL-INFO | Used in KDC Referrals tickets. |
+| 138 | PA-ENCRYPTED-CHALLENGE | Logon using Kerberos Armoring (FAST). Supported starting from Windows Server 2012 domain controllers and Windows 8 clients. |
+| - | | This type shows in Audit Failure events. |
+
+**Certificate Information:**
+
+- **Certificate Issuer Name** \[Type = UnicodeString\]**:** the name of Certification Authority which issued smart card certificate. Populated in **Issued by** field in certificate. Always empty for [4771](event-4771.md) events.
+
+- **Certificate Serial Number** \[Type = UnicodeString\]**:** smart card certificate’s serial number. Can be found in **Serial number** field in the certificate. Always empty for [4771](event-4771.md) events.
+
+- **Certificate Thumbprint** \[Type = UnicodeString\]**:** smart card certificate’s thumbprint. Can be found in **Thumbprint** field in the certificate. Always empty for [4771](event-4771.md) events.
+
+## Security Monitoring Recommendations
+
+For 4771(F): Kerberos pre-authentication failed.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Security ID”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Security ID”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Security ID”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Security ID”** for accounts that are outside the whitelist. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
+- You can track all [4771](event-4771.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges.
+
+- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4771](event-4771.md) events. If **Client Address** is not from the whitelist, generate the alert.
+
+- All **Client Address** = ::1 means local authentication. If you know the list of accounts which should log on to the domain controllers, then you need to monitor for all possible violations, where **Client Address** = ::1 and **Account Name** is not allowed to log on to any domain controller.
+
+- All [4771](event-4771.md) events with **Client Port** field value > 0 and < 1024 should be examined, because a well-known port was used for outbound connection.
+
+- Also monitor the fields shown in the following table, to discover the issues listed:
+
+| **Field** | **Issue to discover** |
+|-----------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Pre-Authentication Type** | Value is **not 15** when account must use a smart card for authentication. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Pre-Authentication Type** | Value is **not 2** when only standard password authentication is in use in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Pre-Authentication Type** | Value is **not 138** when Kerberos Armoring is enabled for all Kerberos communications in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). |
+| **Result Code** | **0x10** (KDC has no support for PADATA type (pre-authentication data)). This error can help you to more quickly identify smart-card related problems with Kerberos authentication. |
+| **Result Code** | **0x18** ((Pre-authentication information was invalid), if you see, for example N events in last N minutes. This can be an indicator of brute-force attack on the account password, especially for highly critical accounts. |
+
diff --git a/windows/keep-secure/event-4772.md b/windows/keep-secure/event-4772.md
new file mode 100644
index 0000000000..0bf72a2f75
--- /dev/null
+++ b/windows/keep-secure/event-4772.md
@@ -0,0 +1,21 @@
+---
+title: 4772(F) A Kerberos authentication ticket request failed. (Windows 10)
+description: Describes security event 4772(F) A Kerberos authentication ticket request failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4772(F): A Kerberos authentication ticket request failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system. [4768](event-4768.md) failure event is generated instead.
+
+***Subcategory:*** [Audit Kerberos Authentication Service](audit-kerberos-authentication-service.md)
+
diff --git a/windows/keep-secure/event-4773.md b/windows/keep-secure/event-4773.md
new file mode 100644
index 0000000000..1f4a877348
--- /dev/null
+++ b/windows/keep-secure/event-4773.md
@@ -0,0 +1,21 @@
+---
+title: 4773(F) A Kerberos service ticket request failed. (Windows 10)
+description: Describes security event 4773(F) A Kerberos service ticket request failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4773(F): A Kerberos service ticket request failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system. [4769](event-4769.md) failure event is generated instead.
+
+***Subcategory:*** [Audit Kerberos Service Ticket Operations](audit-kerberos-service-ticket-operations.md)
+
diff --git a/windows/keep-secure/event-4774.md b/windows/keep-secure/event-4774.md
new file mode 100644
index 0000000000..2cb4f23bd1
--- /dev/null
+++ b/windows/keep-secure/event-4774.md
@@ -0,0 +1,41 @@
+---
+title: 4774(S) An account was mapped for logon. (Windows 10)
+description: Describes security event 4774(S) An account was mapped for logon.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4774(S): An account was mapped for logon.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+It appears that this event never occurs.
+
+***Subcategory:*** [Audit Credential Validation](audit-credential-validation.md)
+
+***Event Schema:***
+
+*An account was mapped for logon.*
+
+*Authentication Package:%1*
+
+*Account UPN:%2*
+
+*Mapped Name:%3*
+
+***Required Server Roles:*** no information.
+
+***Minimum OS Version:*** no information.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4775.md b/windows/keep-secure/event-4775.md
new file mode 100644
index 0000000000..56d51f81fa
--- /dev/null
+++ b/windows/keep-secure/event-4775.md
@@ -0,0 +1,39 @@
+---
+title: 4775(F) An account could not be mapped for logon. (Windows 10)
+description: Describes security event 4775(F) An account could not be mapped for logon.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4775(F): An account could not be mapped for logon.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+It appears that this event never occurs.
+
+***Subcategory:*** [Audit Credential Validation](audit-credential-validation.md)
+
+***Event Schema:***
+
+*An account could not be mapped for logon.*
+
+*Authentication Package:%1*
+
+*Account Name:%2*
+
+***Required Server Roles:*** no information.
+
+***Minimum OS Version:*** no information.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4776.md b/windows/keep-secure/event-4776.md
new file mode 100644
index 0000000000..4b1bd35fc0
--- /dev/null
+++ b/windows/keep-secure/event-4776.md
@@ -0,0 +1,148 @@
+---
+title: 4776(S, F) The computer attempted to validate the credentials for an account. (Windows 10)
+description: Describes security event 4776(S, F) The computer attempted to validate the credentials for an account.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4776(S, F): The computer attempted to validate the credentials for an account.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Credential Validation](audit-credential-validation.md)
+
+***Event Description:***
+
+This event generates every time that a credential validation occurs using NTLM authentication.
+
+This event occurs only on the computer that is authoritative for the provided credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative.
+
+It shows successful and unsuccessful credential validation attempts.
+
+It shows only the computer name (**Source Workstation**) from which the authentication attempt was performed (authentication source). For example, if you authenticate from CLIENT-1 to SERVER-1 using a domain account you will see CLIENT-1 in the **Source Workstation** field. Information about the destination computer (SERVER-1) is not presented in this event.
+
+If a credential validation attempt fails, you will see a Failure event with **Error Code** parameter value not equal to “**0x0**”.
+
+The main advantage of this event is that on domain controllers you can see all authentication attempts for domain accounts when NTLM authentication was used.
+
+For monitoring local account logon attempts, it is better to use event “[4624](event-4624.md): An account was successfully logged on” because it contains more details and is more informative.
+
+This event also generates when a workstation unlock event occurs.
+
+This event does *not* generate when a domain account logs on locally to a domain controller.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4776
+ 0
+ 0
+ 14336
+ 0
+ 0x8010000000000000
+
+ 165437
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ MICROSOFT\_AUTHENTICATION\_PACKAGE\_V1\_0
+ dadmin
+ WIN81
+ 0xc0000234
+
+
+
+```
+
+***Required Server Roles:*** no specific requirements.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Authentication Package** \[Type = UnicodeString\]: the name of [Authentication Package](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374733(v=vs.85).aspx) which was used for credential validation. It is always “**MICROSOFT\_AUTHENTICATION\_PACKAGE\_V1\_0**” for [4776](event-4776.md) event.
+
+> **Note** **Authentication package** is a DLL that encapsulates the authentication logic used to determine whether to permit a user to log on. [Local Security Authority](https://msdn.microsoft.com/en-us/library/windows/desktop/ms721592(v=vs.85).aspx#_security_local_security_authority_gly) (LSA) authenticates a user logon by sending the request to an authentication package. The authentication package then examines the logon information and either authenticates or rejects the user logon attempt.
+
+- **Logon Account** \[Type = UnicodeString\]: the name of the account that had its credentials validated by the **Authentication Package**. Can be user name, computer account name or [well-known security principal](https://support.microsoft.com/en-us/kb/243330) account name. Examples:
+
+ - User example: dadmin
+
+ - Computer account example: WIN81$
+
+ - Local System account example: Local
+
+ - Local Service account example: Local Service
+
+- **Source Workstation** \[Type = UnicodeString\]: the name of the computer from which the logon attempt originated.
+
+- **Error Code** \[Type = HexInt32\]: contains error code for Failure events. For Success events this parameter has “**0x0**” value. The table below contains most common error codes for this event:
+
+| Error Code | Description |
+|------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0xC0000064 | The username you typed does not exist. Bad username. |
+| 0xC000006A | Account logon with misspelled or bad password. |
+| 0xC000006D | - Generic logon failure.
Some of the potential causes for this:
An invalid username and/or password was used
[LAN Manager Authentication Level](https://technet.microsoft.com/en-us/library/jj852207.aspx) mismatch between the source and target computers. |
+| 0xC000006F | Account logon outside authorized hours. |
+| 0xC0000070 | Account logon from unauthorized workstation. |
+| 0xC0000071 | Account logon with expired password. |
+| 0xC0000072 | Account logon to account disabled by administrator. |
+| 0xC0000193 | Account logon with expired account. |
+| 0xC0000224 | Account logon with "Change Password at Next Logon" flagged. |
+| 0xC0000234 | Account logon with account locked. |
+| 0xc0000371 | The local account store does not contain secret material for the specified account. |
+| 0x0 | No errors. |
+
+> Table 1. Winlogon Error Codes.
+
+## Security Monitoring Recommendations
+
+For 4776(S, F): The computer attempted to validate the credentials for an account.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Logon Account”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Logon Account”** value (with other information) to monitor how or when a particular account is being used.
To monitor activity of specific user accounts outside of working hours, monitor the appropriate **Logon Account + Source Workstation** pairs. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Logon Account”** that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Logon Account”** for accounts that are outside the whitelist. |
+| **Restricted-use computers**: You might have certain computers from which certain people (accounts) should not log on. | Monitor the target **Source Workstation** for credential validation requests from the **“Logon Account”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Logon Account”** for names that don’t comply with naming conventions. |
+
+- If NTLM authentication should not be used for a specific account, monitor for that account. Don’t forget that local logon will always use NTLM authentication if an account logs on to a device where its user account is stored.
+
+- You can use this event to collect all NTLM authentication attempts in the domain, if needed. Don’t forget that local logon will always use NTLM authentication if the account logs on to a device where its user account is stored.
+
+- If a local account should be used only locally (for example, network logon or terminal services logon is not allowed), you need to monitor for all events where **Source Workstation** and **Computer** (where the event was generated and where the credentials are stored) have different values.
+
+- Consider tracking the following errors for the reasons listed:
+
+| **Error to track** | **What the error might indicate** |
+|-----------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------|
+| **User logon with misspelled or bad user account** | For example, N events in the last N minutes can be an indicator of an account enumeration attack, especially relevant for highly critical accounts. |
+| **User logon with misspelled or bad password** | For example, N events in the last N minutes can be an indicator of a brute-force password attack, especially relevant for highly critical accounts. |
+| **User logon outside authorized hours** | Can indicate a compromised account; especially relevant for highly critical accounts. |
+| **User logon from unauthorized workstation** | Can indicate a compromised account; especially relevant for highly critical accounts. |
+| **User logon to account disabled by administrator** | For example, N events in last N minutes can be an indicator of an account compromise attempt, especially relevant for highly critical accounts. |
+| **User logon with expired account** | Can indicate an account compromise attempt; especially relevant for highly critical accounts. |
+| **User logon with account locked** | Can indicate a brute-force password attack; especially relevant for highly critical accounts. |
+
diff --git a/windows/keep-secure/event-4777.md b/windows/keep-secure/event-4777.md
new file mode 100644
index 0000000000..db755e968c
--- /dev/null
+++ b/windows/keep-secure/event-4777.md
@@ -0,0 +1,21 @@
+---
+title: 4777(F) The domain controller failed to validate the credentials for an account. (Windows 10)
+description: Describes security event 4777(F) The domain controller failed to validate the credentials for an account.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4777(F): The domain controller failed to validate the credentials for an account.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system. [4776](event-4776.md) failure event is generated instead.
+
+***Subcategory:*** [Audit Credential Validation](audit-credential-validation.md)
+
diff --git a/windows/keep-secure/event-4778.md b/windows/keep-secure/event-4778.md
new file mode 100644
index 0000000000..2c47b9958b
--- /dev/null
+++ b/windows/keep-secure/event-4778.md
@@ -0,0 +1,137 @@
+---
+title: 4778(S) A session was reconnected to a Window Station. (Windows 10)
+description: Describes security event 4778(S) A session was reconnected to a Window Station.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4778(S): A session was reconnected to a Window Station.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when a user reconnects to an existing Terminal Services session, or when a user switches to an existing desktop using [Fast User Switching](https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/fast_user_switching.mspx?mfr=true).
+
+This event also generates when user reconnects to virtual host Hyper-V Enhanced Session, for example.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4778
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237651
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ladmin
+ CONTOSO
+ 0x1e01f6
+ RDP-Tcp\#6
+ WIN81
+ 10.0.0.100
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which the session was reconnected.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Session:**
+
+- **Session Name** \[Type = UnicodeString\]**:** the name of the session to which the user was reconnected. Examples:
+
+ - **RDP-Rcp\#N**, where N is a number of session – typical RDP session name.
+
+ - **Console** – console session, typical for Fast User Switching.
+
+ - **31C5CE94259D4006A9E4\#3** – example of “Hyper-V Enhanced Session” session name.
+
+ You can see the list of current session’s using “**query session”** command in command prompt. Example of output (see **SESSIONNAME** column):
+
+
+
+**Additional Information:**
+
+- **Client Name** \[Type = UnicodeString\]: computer name from which the user was reconnected. Has “**Unknown”** value for console session.
+
+- **Client Address** \[Type = UnicodeString\]: IP address of the computer from which the user was reconnected.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+ - Has “**LOCAL**” value for console session.
+
+## Security Monitoring Recommendations
+
+For 4778(S): A session was reconnected to a Window Station.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Account Name”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Account Name”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Account Name”** that you are concerned about. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
+- If Fast User Switching is disabled on workstations or specific computers, then monitor for any event with **Session Name** = Console.
+
+- If Remote Desktop Connections are not allowed for specific users (**Subject\\Account Name**) or disabled on some computers, then monitor for **Session Name** = RDP-Tcp\# (substring).
+
+- If a specific computer or device (**Client Name** or **Client Address**) should never connect to this computer (**Computer**), monitor for any event with that **Client Name** or **Client Address**.
+
+- Check that **Additional Information\\Client Address** is from internal IP addresses list.
+
diff --git a/windows/keep-secure/event-4779.md b/windows/keep-secure/event-4779.md
new file mode 100644
index 0000000000..f3b2dc262b
--- /dev/null
+++ b/windows/keep-secure/event-4779.md
@@ -0,0 +1,139 @@
+---
+title: 4779(S) A session was disconnected from a Window Station. (Windows 10)
+description: Describes security event 4779(S) A session was disconnected from a Window Station.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4779(S): A session was disconnected from a Window Station.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when a user disconnects from an existing Terminal Services session, or when a user switches away from an existing desktop using [Fast User Switching](https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/fast_user_switching.mspx?mfr=true).
+
+This event also generated when user disconnects from virtual host Hyper-V Enhanced Session, for example.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4779
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237646
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ladmin
+ CONTOSO
+ 0x1e01f6
+ RDP-Tcp\#3
+ WIN81
+ 10.0.0.100
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which the session was disconnected.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Session:**
+
+- **Session Name** \[Type = UnicodeString\]**:** the name of disconnected session. Examples:
+
+ - **RDP-Rcp\#N**, where N is a number of session – typical RDP session name.
+
+ - **Console** – console session, typical for Fast User Switching.
+
+ - **31C5CE94259D4006A9E4\#3** – example of “Hyper-V Enhanced Session” session name.
+
+ You can see the list of current session’s using “**query session”** command in command prompt. Example of output (see **SESSIONNAME** column):
+
+
+
+**Additional Information:**
+
+- **Client Name** \[Type = UnicodeString\]: machine name from which the session was disconnected. Has “**Unknown”** value for console session.
+
+
+
+- **Client Address** \[Type = UnicodeString\]: IP address of the computer from which the session was disconnected.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+
+
+ - Has “**LOCAL**” value for console session.
+
+## Security Monitoring Recommendations
+
+For 4779(S): A session was disconnected from a Window Station.
+
+| **Type of monitoring required** | **Recommendation** |
+|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the high-value account or accounts. |
+| **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Account Name”** (with other information) to monitor how or when a particular account is being used. |
+| **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the accounts that should never be used. |
+| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the whitelist. |
+| **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Account Name”** to see whether the account type is as expected. |
+| **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. |
+| **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions.
For example, you might have computers to which connections should not be made from certain accounts or addresses. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Account Name”** that you are concerned about.
If you have a target **Computer:** (or other target device) to which connections should not be made from certain accounts or addresses, monitor this event for the corresponding **Client Name** or **Client Address**. |
+| **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. |
+
+- If Fast User Switching is disabled on workstations or specific computers, then monitor for any event with **Session Name** = Console.
+
+- If Remote Desktop Connections are not allowed for specific users (**Subject\\Account Name**) or disabled on some computers, then monitor for **Session Name** = RDP-Tcp\# (substring).
+
+- To ensure that connections are made only from your internal IP address list, monitor the **Additional Information\\Client Address** in this event.
+
diff --git a/windows/keep-secure/event-4780.md b/windows/keep-secure/event-4780.md
new file mode 100644
index 0000000000..3aef6e6a3a
--- /dev/null
+++ b/windows/keep-secure/event-4780.md
@@ -0,0 +1,59 @@
+---
+title: 4780(S) The ACL was set on accounts which are members of administrators groups. (Windows 10)
+description: Describes security event 4780(S) The ACL was set on accounts which are members of administrators groups.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4780(S): The ACL was set on accounts which are members of administrators groups.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Every hour, the domain controller that holds the primary domain controller (PDC) Flexible Single Master Operation (FSMO) role compares the ACL on all security principal accounts (users, groups, and machine accounts) present for its domain in Active Directory and that are in administrative or security-sensitive groups and which have AdminCount attribute = 1 against the ACL on the [AdminSDHolder](https://technet.microsoft.com/en-us/magazine/2009.09.sdadminholder.aspx) object. If the ACL on the principal account differs from the ACL on the AdminSDHolder object, then the ACL on the principal account is reset to match the ACL on the AdminSDHolder object and this event is generated.
+
+For some reason, this event doesn’t generate on some OS versions.
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Schema:***
+
+*The ACL was set on accounts which are members of administrators groups.*
+
+*Subject:*
+
+> *Security ID:%4*
+>
+> *Account Name:%5*
+>
+> *Account Domain:%6*
+>
+> *Logon ID:%7*
+
+*Target Account:*
+
+> *Security ID:%3*
+>
+> *Account Name:%1*
+>
+> *Account Domain:%2*
+
+*Additional Information:*
+
+> *Privileges:%8*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Monitor for this event and investigate why the object’s ACL was changed.
+
diff --git a/windows/keep-secure/event-4781.md b/windows/keep-secure/event-4781.md
new file mode 100644
index 0000000000..ae172e368c
--- /dev/null
+++ b/windows/keep-secure/event-4781.md
@@ -0,0 +1,127 @@
+---
+title: 4781(S) The name of an account was changed. (Windows 10)
+description: Describes security event 4781(S) The name of an account was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4781(S): The name of an account was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time a user or computer account name (**sAMAccountName** attribute) is changed.
+
+For user accounts, this event generates on domain controllers, member servers, and workstations.
+
+For computer accounts, this event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4781
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175754
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Admin
+ MainAdmin
+ CONTOSO
+ S-1-5-21-3457937927-2839227994-823803824-6117
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d5f
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the “change account name” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the “change account name” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account on which the name was changed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Domain** \[Type = UnicodeString\]**:** target account’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Old Account Name** \[Type = UnicodeString\]**:** old name of target account.
+
+- **New Account Name** \[Type = UnicodeString\]**:** new name of target account.
+
+**Additional Information:**
+
+- **Privileges** \[Type = UnicodeString\]: the list of user privileges which were used during the operation, for example, SeBackupPrivilege. This parameter might not be captured in the event, and in that case appears as “-”. See full list of user privileges in “Table 8. User Privileges.”.
+
+## Security Monitoring Recommendations
+
+For 4781(S): The name of an account was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have high-value user or computer accounts (or local user accounts) for which you need to monitor each change to the accounts, monitor this event with the **“Target Account\\Security ID”** that corresponds to the high-value accounts.
+
diff --git a/windows/keep-secure/event-4782.md b/windows/keep-secure/event-4782.md
new file mode 100644
index 0000000000..100e19c4fe
--- /dev/null
+++ b/windows/keep-secure/event-4782.md
@@ -0,0 +1,112 @@
+---
+title: 4782(S) The password hash an account was accessed. (Windows 10)
+description: Describes security event 4782(S) The password hash an account was accessed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4782(S): The password hash an account was accessed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Account Management Events](audit-other-account-management-events.md)
+
+***Event Description:***
+
+This event generates on domain controllers during password migration of an account using [Active Directory Migration Toolkit](https://technet.microsoft.com/en-us/library/cc974332(v=ws.10).aspx).
+
+Typically **“Subject\\Security ID”** is the SYSTEM account.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4782
+ 0
+ 0
+ 13829
+ 0
+ 0x8020000000000000
+
+ 174829
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Andrei
+ CONTOSO
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested hash migration operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested hash migration operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For ANONYMOUS LOGON you will see **NT AUTHORITY** value for this field.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Target Account:**
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which the password hash was migrated. For example: ServiceDesk
+
+ - User account example: Andrei
+
+ - Computer account example: DC01$
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain name of the account for which the password hash was migrated. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: FABRIKAM
+
+ - Lowercase full domain name: fabrikam.local
+
+ - Uppercase full domain name: FABRIKAM.LOCAL
+
+## Security Monitoring Recommendations
+
+For 4782(S): The password hash an account was accessed.
+
+- Monitor for all events of this type, because any actions with account’s password hashes should be planned. If this action was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4793.md b/windows/keep-secure/event-4793.md
new file mode 100644
index 0000000000..8776180dca
--- /dev/null
+++ b/windows/keep-secure/event-4793.md
@@ -0,0 +1,115 @@
+---
+title: 4793(S) The Password Policy Checking API was called. (Windows 10)
+description: Describes security event 4793(S) The Password Policy Checking API was called.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4793(S): The Password Policy Checking API was called.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Account Management Events](audit-other-account-management-events.md)
+
+***Event Description:***
+
+This event generates each time the [Password Policy Checking API](https://msdn.microsoft.com/en-us/library/aa370661(VS.85).aspx) is called.
+
+The Password Policy Checking API allows an application to check password compliance against an application-provided account database or single account and verify that passwords meet the complexity, aging, minimum length, and history reuse requirements of a password policy.
+
+This event, for example, generates during Directory Services Restore Mode ([DSRM](http://blogs.technet.com/b/askds/archive/2009/03/11/ds-restore-mode-password-maintenance.aspx)) account password reset procedure to check new DSRM password.
+
+This event generates on the computer where Password Policy Checking API was called.
+
+Note that starting with Microsoft SQL Server 2005, the “SQL Server password policy” feature can generate many 4793 events on a SQL Server.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4793
+ 0
+ 0
+ 13829
+ 0
+ 0x8020000000000000
+
+ 172342
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x36f67
+ DC01
+ -
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested Password Policy Checking API operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested Password Policy Checking API operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Additional Information:**
+
+- **Caller Workstation** \[Type = UnicodeString\]**:** name of the computer from which the Password Policy Checking API was called. Typically, this is the same computer where this event was generated, for example, DC01. Computer name here does not contain **$** symbol at the end. It also can be an IP address or the DNS name of the computer.
+
+- **Provided Account Name (unauthenticated)** \[Type = UnicodeString\]**:** the name of account, which password was provided/requested for validation. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Status Code** \[Type = HexInt32\]**:** typically has “**0x0**” value. Status code is “**0x0**”, no matter meets password domain Password Policy or not.
+
+## Security Monitoring Recommendations
+
+For 4793(S): The Password Policy Checking API was called.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this is an informational event, and can give you information about when Password Policy Checking APIs were invoked, and who invoked them. The **Provided Account Name** does not always have a value—sometimes it’s not really possible to determine for which account the password policy check was performed.
+
diff --git a/windows/keep-secure/event-4794.md b/windows/keep-secure/event-4794.md
new file mode 100644
index 0000000000..a703f77ede
--- /dev/null
+++ b/windows/keep-secure/event-4794.md
@@ -0,0 +1,104 @@
+---
+title: 4794(S, F) An attempt was made to set the Directory Services Restore Mode administrator password. (Windows 10)
+description: Describes security event 4794(S, F) An attempt was made to set the Directory Services Restore Mode administrator password.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4794(S, F): An attempt was made to set the Directory Services Restore Mode administrator password.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time Directory Services Restore Mode (DSRM) administrator password is changed.
+
+This event generates only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4794
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 172348
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x36f67
+ DC01
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to set Directory Services Restore Mode administrator password. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to set Directory Services Restore Mode administrator password.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Additional Information:**
+
+- **Caller Workstation** \[Type = UnicodeString\]**:** the name of computer account from which Directory Services Restore Mode (DSRM) administrator password change request was received. For example: “**DC01**”. If the change request was sent locally (from the same server) this field will have the same name as the computer account.
+
+- **Status Code** \[Type = HexInt32\]**:** for Success events it has “**0x0**” value.
+
+## Security Monitoring Recommendations
+
+For 4794(S, F): An attempt was made to set the Directory Services Restore Mode administrator password.
+
+- Always monitor 4794 events and trigger alerts when they occur.
+
diff --git a/windows/keep-secure/event-4798.md b/windows/keep-secure/event-4798.md
new file mode 100644
index 0000000000..8468f10240
--- /dev/null
+++ b/windows/keep-secure/event-4798.md
@@ -0,0 +1,135 @@
+---
+title: 4798(S) A user's local group membership was enumerated. (Windows 10)
+description: Describes security event 4798(S) A user's local group membership was enumerated.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4798(S): A user's local group membership was enumerated.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates when a process enumerates a user's security-enabled local groups on a computer or device.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4798
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 691
+
+
+ Security
+ WIN10-1.contoso.local
+
+
+-
+ Administrator
+ WIN10-1
+ S-1-5-21-1694160624-234216347-2203645164-500
+ S-1-5-21-1377283216-344919071-3415362939-1104
+ dadmin
+ CONTOSO
+ 0x72d9d
+ 0xc80
+ C:\\Windows\\System32\\mmc.exe
+
+
+
+```
+
+***Required Server Roles:*** none.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enumerate user's security-enabled local groups” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enumerate user's security-enabled local groups” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**User:**
+
+- **Security ID** \[Type = SID\]: SID of the account whose groups were enumerated. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]: the name of the account whose groups were enumerated.
+
+- **Account Domain** \[Type = UnicodeString\]: group’s domain or computer name. Formats vary, and include the following:
+
+ - For a local group, this field will contain the name of the computer to which this group belongs, for example: “Win81”.
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that enumerated the members of the group. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+> If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+## Security Monitoring Recommendations
+
+For 4798(S): A user's local group membership was enumerated.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have high value domain or local accounts for which you need to monitor each enumeration of their group membership, or any access attempt, monitor events with the **“Subject\\Security ID”** that corresponds to the high value account or accounts.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
diff --git a/windows/keep-secure/event-4799.md b/windows/keep-secure/event-4799.md
new file mode 100644
index 0000000000..7673abf0a6
--- /dev/null
+++ b/windows/keep-secure/event-4799.md
@@ -0,0 +1,135 @@
+---
+title: 4799(S) A security-enabled local group membership was enumerated. (Windows 10)
+description: Describes security event 4799(S) A security-enabled local group membership was enumerated.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4799(S): A security-enabled local group membership was enumerated.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Security Group Management](audit-security-group-management.md)
+
+***Event Description:***
+
+This event generates when a process enumerates the members of a security-enabled local group on the computer or device.
+
+This event doesn't generate when group members were enumerated using Active Directory Users and Computers snap-in.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4799
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+ 685
+
+
+ Security
+ WIN10-1.contoso.local
+
+
+-
+ Administrators
+ Builtin
+ S-1-5-32-544
+ S-1-5-21-1377283216-344919071-3415362939-1104
+ dadmin
+ CONTOSO
+ 0x72d9d
+ 0xc80
+ C:\\Windows\\System32\\mmc.exe
+
+
+
+```
+
+***Required Server Roles:*** none.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “enumerate security-enabled local group members” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “enumerate security-enabled local group members” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Group:**
+
+- **Security ID \[Type = SID\]:** SID of the group which members were enumerated. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Group Name \[Type = UnicodeString\]:** the name of the group which members were enumerated.
+
+- **Group Domain \[Type = UnicodeString\]: group’s domain or computer name. Formats vary, and include the following:**
+
+ - For Builtin groups this field has “Builtin” value.
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For a local group, this field will contain the name of the computer to which this group belongs, for example: “Win81”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that enumerated the members of the group. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+> If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+## Security Monitoring Recommendations
+
+For 4799(S): A security-enabled local group membership was enumerated.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a list of critical local security groups in the organization, and need to specifically monitor these groups for any access (in this case, enumeration of group membership), monitor events with the “**Group\\Group Name”** values that correspond to the critical local security groups. Examples of critical local groups are built-in local administrators, built-in backup operators, and so on.
+
+- If you need to monitor each time the membership is enumerated for a local or domain security group, to see who enumerated the membership and when, monitor this event. Typically, this event is used as an informational event, to be reviewed if needed.
+
diff --git a/windows/keep-secure/event-4800.md b/windows/keep-secure/event-4800.md
new file mode 100644
index 0000000000..bba6681e18
--- /dev/null
+++ b/windows/keep-secure/event-4800.md
@@ -0,0 +1,101 @@
+---
+title: 4800(S) The workstation was locked. (Windows 10)
+description: Describes security event 4800(S) The workstation was locked.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4800(S): The workstation was locked.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when a workstation was locked.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4800
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237655
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x759a9
+ 3
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “lock workstation” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “lock workstation” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Session ID** \[Type = UInt32\]: unique ID of locked session. You can see the list of current session IDs using “**query session”** command in command prompt. Example of output (see **ID** column):
+
+
+
+## Security Monitoring Recommendations
+
+For 4800(S): The workstation was locked.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this is an informational event, and can give you information about when a machine was locked, and which account was used to lock it.
+
diff --git a/windows/keep-secure/event-4801.md b/windows/keep-secure/event-4801.md
new file mode 100644
index 0000000000..28e2f207b6
--- /dev/null
+++ b/windows/keep-secure/event-4801.md
@@ -0,0 +1,101 @@
+---
+title: 4801(S) The workstation was unlocked. (Windows 10)
+description: Describes security event 4801(S) The workstation was unlocked.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4801(S): The workstation was unlocked.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when workstation was unlocked.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4801
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237657
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x759a9
+ 3
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “unlock workstation” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “unlock workstation” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Session ID** \[Type = UInt32\]: unique ID of unlocked session. You can see the list of current session IDs using “**query session”** command in command prompt. Example of output (see ID column):
+
+
+
+## Security Monitoring Recommendations
+
+For 4801(S): The workstation was unlocked.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this is an informational event, and can give you information about when a machine was unlocked, and which account was used to unlock it.
+
diff --git a/windows/keep-secure/event-4802.md b/windows/keep-secure/event-4802.md
new file mode 100644
index 0000000000..c4b49527e7
--- /dev/null
+++ b/windows/keep-secure/event-4802.md
@@ -0,0 +1,101 @@
+---
+title: 4802(S) The screen saver was invoked. (Windows 10)
+description: Describes security event 4802(S) The screen saver was invoked.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4802(S): The screen saver was invoked.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when screen saver was invoked.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4802
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237662
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x759a9
+ 3
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “invoke screensaver” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “invoke screensaver” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Session ID** \[Type = UInt32\]: unique ID of a session for which screen saver was invoked. You can see the list of current session IDs using “**query session”** command in command prompt. Example of output (see ID column):
+
+
+
+## Security Monitoring Recommendations
+
+For 4802(S): The screen saver was invoked.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this is an informational event, and can give you information about when a screen saver was invoked on a machine, and which account invoked it.
+
diff --git a/windows/keep-secure/event-4803.md b/windows/keep-secure/event-4803.md
new file mode 100644
index 0000000000..118d94f09a
--- /dev/null
+++ b/windows/keep-secure/event-4803.md
@@ -0,0 +1,101 @@
+---
+title: 4803(S) The screen saver was dismissed. (Windows 10)
+description: Describes security event 4803(S) The screen saver was dismissed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4803(S): The screen saver was dismissed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event is generated when screen saver was dismissed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4803
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 237663
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x759a9
+ 3
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “dismiss screensaver” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “dismiss screensaver” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Session ID** \[Type = UInt32\]: unique ID of a session for which screen saver was dismissed. You can see the list of current session IDs using “**query session”** command in command prompt. Example of output (see ID column):
+
+
+
+## Security Monitoring Recommendations
+
+For 4803(S): The screen saver was dismissed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Typically this is an informational event, and can give you information about when a screen saver was dismissed on a machine, and which account dismissed it.
+
diff --git a/windows/keep-secure/event-4816.md b/windows/keep-secure/event-4816.md
new file mode 100644
index 0000000000..9d90f07c17
--- /dev/null
+++ b/windows/keep-secure/event-4816.md
@@ -0,0 +1,43 @@
+---
+title: 4816(S) RPC detected an integrity violation while decrypting an incoming message. (Windows 10)
+description: Describes security event 4816(S) RPC detected an integrity violation while decrypting an incoming message.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4816(S): RPC detected an integrity violation while decrypting an incoming message.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This message generates if RPC detected an integrity violation while decrypting an incoming message.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*RPC detected an integrity violation while decrypting an incoming message.*
+
+*Peer Name: %1*
+
+*Protocol Sequence: %2*
+
+*Security Error: %3*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
diff --git a/windows/keep-secure/event-4817.md b/windows/keep-secure/event-4817.md
new file mode 100644
index 0000000000..614adbf442
--- /dev/null
+++ b/windows/keep-secure/event-4817.md
@@ -0,0 +1,246 @@
+---
+title: 4817(S) Auditing settings on object were changed. (Windows 10)
+description: Describes security event 4817(S) Auditing settings on object were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4817(S): Auditing settings on object were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates when the [Global Object Access Auditing](https://technet.microsoft.com/en-us/library/dd772630(v=ws.10).aspx) policy is changed on a computer.
+
+Separate events will be generated for “Registry” and “File system” policy changes.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4817
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1192270
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ LSA
+ Global SACL
+ Key
+
+ S:(AU;SA;RC;;;S-1-5-21-3457937927-2839227994-823803824-1104)
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to Global Object Access Auditing policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to Global Object Access Auditing policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object:**
+
+- **Object Server** \[Type = UnicodeString\]: has “**LSA**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object to which this event applies. Always “**Global SACL**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|-------------------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Central Access Policies |
+| Key | WaitablePort | Callback | Global SACL |
+| Job | Port | FilterConnectionPort | |
+| ALPC Port | Semaphore | Adapter | |
+
+- **Object Name: **
+
+ - Key – if “Registry” Global Object Access Auditing policy was changed.
+
+ - File – if “File system” Global Object Access Auditing policy was changed.
+
+**Auditing Settings:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the old Security Descriptor Definition Language (SDDL) value for the Global Object Access Auditing policy. Empty if Global Object Access Auditing policy SACL was not set.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** the new Security Descriptor Definition Language (SDDL) value for the Global Object Access Auditing policy.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4817(S): Auditing settings on object were changed.
+
+- If you use Global Object Access Auditing policies, then this event should be always monitored, especially on high value assets or computers. If this change was not planned, investigate the reason for the change.
+
+- If you don’t use Global Object Access Auditing policies, then this event should be always monitored because it indicates use of Global Object Access Auditing policies outside of your standard procedures.
+
diff --git a/windows/keep-secure/event-4818.md b/windows/keep-secure/event-4818.md
new file mode 100644
index 0000000000..b8c3c13ecd
--- /dev/null
+++ b/windows/keep-secure/event-4818.md
@@ -0,0 +1,211 @@
+---
+title: 4818(S) Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. (Windows 10)
+description: Describes security event 4818(S) Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4818(S): Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Central Policy Staging](audit-central-access-policy-staging.md)
+
+***Event Description:***
+
+This event generates when Dynamic Access Control Proposed [Central Access Policy](https://technet.microsoft.com/en-us/library/hh831425.aspx) is enabled and access was not granted by Proposed Central Access Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4818
+ 0
+ 0
+ 12813
+ 0
+ 0x8020000000000000
+
+ 1049324
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ Auditor
+ CONTOSO
+ 0x1e5f21
+ Security
+ File
+ C:\\Finance Documents\\desktop.ini
+ 0xc64
+ 0x4
+
+ %%1538: %%1801 D:(A;ID;0x1200a9;;;BU) %%1541: %%1801 D:(A;ID;0x1200a9;;;BU) %%4416: %%1801 D:(A;ID;0x1200a9;;;BU) %%4419: %%1801 D:(A;ID;0x1200a9;;;BU) %%4423: %%1801 D:(A;ID;0x1200a9;;;BU)
+ %%1538: %%1814Finance Documents Rule %%1541: %%1814Finance Documents Rule %%4416: %%1814Finance Documents Rule %%4419: %%1814Finance Documents Rule %%4423: %%1814Finance Documents Rule
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an access request. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an access request.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always “**File**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: full path and name of the file or folder for which access was requested.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the access was requested. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Current Central Access Policy results:**
+
+- **Access Reasons** \[Type = UnicodeString\]: the list of access check results for Current Access Policy. The format of the result is:
+REQUESTED\_ACCESS: RESULT ACE\_WHICH\_PROVIDED\_OR\_DENIED\_ACCESS.
+
+The possible REQUESTED\_ACCESS values are listed in the table below.
+
+## Table of file access codes
+
+| Access | Hexadecimal Value | Description |
+|-------------------------------------------------------|--------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| ReadData (or ListDirectory) | 0x1 | **ReadData -** For a file object, the right to read the corresponding file data. For a directory object, the right to read the corresponding directory data.
**ListDirectory -** For a directory, the right to list the contents of the directory. |
+| WriteData (or AddFile) | 0x2 | **WriteData -** For a file object, the right to write data to the file. For a directory object, the right to create a file in the directory (**FILE\_ADD\_FILE**).
**AddFile -** For a directory, the right to create a file in the directory. |
+| AppendData (or AddSubdirectory or CreatePipeInstance) | 0x4 | **AppendData -** For a file object, the right to append data to the file. (For local files, write operations will not overwrite existing data if this flag is specified without **FILE\_WRITE\_DATA**.) For a directory object, the right to create a subdirectory (**FILE\_ADD\_SUBDIRECTORY**).
**AddSubdirectory -** For a directory, the right to create a subdirectory.
**CreatePipeInstance -** For a named pipe, the right to create a pipe. |
+| ReadEA | 0x8 | The right to read extended file attributes. |
+| WriteEA | 0x10 | The right to write extended file attributes. |
+| Execute/Traverse | 0x20 | **Execute** - For a native code file, the right to execute the file. This access right given to scripts may cause the script to be executable, depending on the script interpreter.
**Traverse -** For a directory, the right to traverse the directory. By default, users are assigned the **BYPASS\_TRAVERSE\_CHECKING** [privilege](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379306(v=vs.85).aspx), which ignores the **FILE\_TRAVERSE** [access right](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374902(v=vs.85).aspx). See the remarks in [File Security and Access Rights](https://msdn.microsoft.com/en-us/library/windows/desktop/aa364399(v=vs.85).aspx) for more information. |
+| DeleteChild | 0x40 | For a directory, the right to delete a directory and all the files it contains, including read-only files. |
+| ReadAttributes | 0x80 | The right to read file attributes. |
+| WriteAttributes | 0x100 | The right to write file attributes. |
+| DELETE | 0x10000 | The right to delete the object. |
+| READ\_CONTROL | 0x20000 | The right to read the information in the object's security descriptor, not including the information in the system access control list (SACL). |
+| WRITE\_DAC | 0x40000 | The right to modify the discretionary access control list (DACL) in the object's security descriptor. |
+| WRITE\_OWNER | 0x80000 | The right to change the owner in the object's security descriptor |
+| SYNCHRONIZE | 0x100000
| The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right. |
+| ACCESS\_SYS\_SEC | 0x1000000 | The ACCESS\_SYS\_SEC access right controls the ability to get or set the SACL in an object's security descriptor. |
+
+- RESULT:
+
+ - Granted by
+
+ - Denied by
+
+ - Granted by ACE on parent folder
+
+ - Not granted due to missing – after this sentence you will typically see missing user rights, for example SeSecurityPrivilege.
+
+ - Unknown or unchecked
+
+- ACE\_WHICH\_PROVIDED\_OR\_DENIED\_ACCESS:
+
+ - Ownership – if access was granted because of ownership of an object.
+
+ - User Right name, for example SeSecurityPrivilege.
+
+ - The [Security Descriptor Definition Language](event-5145.md#sddl-values-for-access-control-entry) (SDDL) value for the Access Control Entry (ACE) that granted or denied access.
+
+**Proposed Central Access Policy results that differ from the current Central Access Policy results:**
+
+- **Access Reasons** \[Type = UnicodeString\]: the list of access check results for Proposed Central Access Policy. Here you will see only ***denied*** requests. The format of the result is:
+
+REQUESTED\_ACCESS: NOT Granted by RULE\_NAME Rule.
+
+The possible REQUESTED\_ACCESS values are listed in the table below:
+
+| Access | Hexadecimal Value | Description |
+|-------------------------------------------------------|--------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| ReadData (or ListDirectory) | 0x1 | **ReadData -** For a file object, the right to read the corresponding file data. For a directory object, the right to read the corresponding directory data.
**ListDirectory -** For a directory, the right to list the contents of the directory. |
+| WriteData (or AddFile) | 0x2 | **WriteData -** For a file object, the right to write data to the file. For a directory object, the right to create a file in the directory (**FILE\_ADD\_FILE**).
**AddFile -** For a directory, the right to create a file in the directory. |
+| AppendData (or AddSubdirectory or CreatePipeInstance) | 0x4 | **AppendData -** For a file object, the right to append data to the file. (For local files, write operations will not overwrite existing data if this flag is specified without **FILE\_WRITE\_DATA**.) For a directory object, the right to create a subdirectory (**FILE\_ADD\_SUBDIRECTORY**).
**AddSubdirectory -** For a directory, the right to create a subdirectory.
**CreatePipeInstance -** For a named pipe, the right to create a pipe. |
+| ReadEA | 0x8 | The right to read extended file attributes. |
+| WriteEA | 0x10 | The right to write extended file attributes. |
+| Execute/Traverse | 0x20 | **Execute** - For a native code file, the right to execute the file. This access right given to scripts may cause the script to be executable, depending on the script interpreter.
**Traverse -** For a directory, the right to traverse the directory. By default, users are assigned the **BYPASS\_TRAVERSE\_CHECKING** [privilege](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379306(v=vs.85).aspx), which ignores the **FILE\_TRAVERSE** [access right](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374902(v=vs.85).aspx). See the remarks in [File Security and Access Rights](https://msdn.microsoft.com/en-us/library/windows/desktop/aa364399(v=vs.85).aspx) for more information. |
+| DeleteChild | 0x40 | For a directory, the right to delete a directory and all the files it contains, including read-only files. |
+| ReadAttributes | 0x80 | The right to read file attributes. |
+| WriteAttributes | 0x100 | The right to write file attributes. |
+| DELETE | 0x10000 | The right to delete the object. |
+| READ\_CONTROL | 0x20000 | The right to read the information in the object's security descriptor, not including the information in the system access control list (SACL). |
+| WRITE\_DAC | 0x40000 | The right to modify the discretionary access control list (DACL) in the object's security descriptor. |
+| WRITE\_OWNER | 0x80000 | The right to change the owner in the object's security descriptor |
+| SYNCHRONIZE | 0x100000
| The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right. |
+| ACCESS\_SYS\_SEC | 0x1000000 | The ACCESS\_SYS\_SEC access right controls the ability to get or set the SACL in an object's security descriptor. |
+
+- RULE\_NAME: the name of Central Access Rule which denied the access.
+
+## Security Monitoring Recommendations
+
+For 4818(S): Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.
+
+- This event typically used for troubleshooting and testing of Proposed Central Access Policies for Dynamic Access Control.
+
diff --git a/windows/keep-secure/event-4819.md b/windows/keep-secure/event-4819.md
new file mode 100644
index 0000000000..14613c4b7a
--- /dev/null
+++ b/windows/keep-secure/event-4819.md
@@ -0,0 +1,135 @@
+---
+title: 4819(S) Central Access Policies on the machine have been changed. (Windows 10)
+description: Describes security event 4819(S) Central Access Policies on the machine have been changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4819(S): Central Access Policies on the machine have been changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates when [Central Access Policy](https://technet.microsoft.com/en-us/library/hh831425.aspx) on the machine have been changed.
+
+For example, it generates when a new [Central Access Policy](https://technet.microsoft.com/en-us/library/hh831425.aspx) was applied to the machine via Group Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4819
+ 0
+ 0
+ 13573
+ 0
+ 0x8020000000000000
+
+ 1187659
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ LSA
+ Central Access Policies
+ Main POlicy
+
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that changed the Central Access Policies on the machine. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that changed the Central Access Policies on the machine.
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**LSA**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object to which this event applies. Always “**Central Access Policies**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|-------------------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Central Access Policies |
+| Key | WaitablePort | Callback | |
+| Job | Port | FilterConnectionPort | |
+| ALPC Port | Semaphore | Adapter | |
+
+**CAPs Added** \[Type = UnicodeString\]: the list of added Central Access Policies. Empty if no Central Access Policies were added.
+
+**CAPs Deleted** \[Type = UnicodeString\]: the list of deleted Central Access Policies. Empty if no Central Access Policies were deleted.
+
+**CAPs Modified** \[Type = UnicodeString\]: the list of modified Central Access Policies. Empty if no Central Access Policies were modified.
+
+**CAPs As-Is** \[Type = UnicodeString\]: the list of non-modified Central Access Policies.
+
+## Security Monitoring Recommendations
+
+For 4819(S): Central Access Policies on the machine have been changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- This event can help you to track modifications, additions and deletions of Central Access Policies if it is required by your security monitoring policy.
+
+-
+
diff --git a/windows/keep-secure/event-4826.md b/windows/keep-secure/event-4826.md
new file mode 100644
index 0000000000..655602c5d7
--- /dev/null
+++ b/windows/keep-secure/event-4826.md
@@ -0,0 +1,134 @@
+---
+title: 4826(S) Boot Configuration Data loaded. (Windows 10)
+description: Describes security event 4826(S) Boot Configuration Data loaded.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4826(S): Boot Configuration Data loaded.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates every time system starts and load current [Boot Configuration Data](https://msdn.microsoft.com/en-us/library/windows/hardware/dn653287(v=vs.85).aspx) (BCD) settings.
+
+This event is always logged regardless of the "Audit Other Policy Change Events" sub-category setting.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4826
+ 0
+ 0
+ 13573
+ 0
+ 0x8020000000000000
+
+ 751
+
+
+ Security
+ WIN10-1
+
+
+-
+ S-1-5-18
+ -
+ -
+ 0x3e7
+ -
+ %%1843
+ %%1846
+ %%1843
+ %%1843
+ %%1848
+ %%1843
+ %%1843
+ %%1843
+ -
+ %%1848
+ %%1843
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that reported this event. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event. Always “S-1-5-18” for this event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that reported this event. Always “-“ for this event.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Always “-“ for this event.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**General Settings:**
+
+- **Load Options** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+- **Advanced Options** \[Type = UnicodeString\]**:** shows whether Windows is configured for system boot to the legacy menu (F8 menu) on the next boot (**Yes** or **No**). You can enable advanced boot using “bcdedit /set onetimeadvancedoptions yes” command.
+
+- **Configuration Access Policy** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+- **System Event Logging** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+- **Kernel Debugging** \[Type = UnicodeString\]**:** shows whether Windows [kernel debugging](https://msdn.microsoft.com/en-us/library/windows/hardware/ff542191(v=vs.85).aspx) is enabled or not (**Yes** or **No**). You can enable kernel debugging using “bcdedit /debug on” command.
+
+- **VSM Launch Type** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+**Signature Settings:**
+
+- **Test Signing** \[Type = UnicodeString\]**:** shows whether Windows [test signing](https://msdn.microsoft.com/en-us/library/windows/hardware/dn653559(v=vs.85).aspx) is enabled or not (**Yes** or **No**). You can disable test signing using “bcdedit /set testsigning off” command.
+
+> **Note** This parameter controls whether Windows 8.1, Windows 8, Windows 7, Windows Server 2008, or Windows Vista will load any type of test-signed kernel-mode code. This option is not set by default, which means test-signed kernel-mode drivers on 64-bit versions of Windows 8.1, Windows 8, Windows 7, Windows Server 2008, and Windows Vista will not load by default. After you run the BCDEdit command, restart the computer so that the change takes effect. For more information, see [Introduction to Test-Signing](https://msdn.microsoft.com/en-us/library/windows/hardware/ff547660(v=vs.85).aspx).
+
+- **Flight Signing** \[Type = UnicodeString\]**:** shows whether Windows flight signing (which allows flight-signed code signing certificates) is enabled or not (**Yes** or **No**). You can disable flight signing using “bcdedit /set flightsigning off” command.
+
+- **Disable Integrity Checks** \[Type = UnicodeString\]**:** shows whether Windows integrity check is disabled or not (**Yes** or **No**). You can disable integrity checks using “bcdedit /set nointegritychecks on” command.
+
+**HyperVisor Settings:**
+
+- **HyperVisor Load Options** \[Type = UnicodeString\]**:** shows hypervisor **loadoptions**. See more information here: .
+
+- **HyperVisor Launch Type** \[Type = UnicodeString\]**:** shows the hypervisor launch options (**Off** or **Auto**). If you are setting up a debugger to debug Hyper-V on a target computer, set this option to **Auto** on the target computer. For more information, see [Attaching to a Target Computer Running Hyper-V](https://msdn.microsoft.com/en-us/library/windows/hardware/ff538138(v=vs.85).aspx). Information about [Hyper-V](http://go.microsoft.com/fwlink/p/?linkid=271817) technology is available on Microsoft TechNet web site.
+
+- **HyperVisor Debugging** \[Type = UnicodeString\]**:** shows whether the hypervisor debugger is enabled or not (**Yes** or **No**). For information about hypervisor debugging, see [Attaching to a Target Computer Running Hyper-V](https://msdn.microsoft.com/en-us/library/windows/hardware/ff538138(v=vs.85).aspx).
+
+## Security Monitoring Recommendations
+
+For 4826(S): Boot Configuration Data loaded.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- If you have a standard or baseline for Boot Configuration Data settings defined, monitor this event and check whether the settings reported by the event are still the same as were defined in your standard or baseline.
+
diff --git a/windows/keep-secure/event-4864.md b/windows/keep-secure/event-4864.md
new file mode 100644
index 0000000000..52abc31dfe
--- /dev/null
+++ b/windows/keep-secure/event-4864.md
@@ -0,0 +1,53 @@
+---
+title: 4864(S) A namespace collision was detected. (Windows 10)
+description: Describes security event 4864(S) A namespace collision was detected.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4864(S): A namespace collision was detected.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is generated when a namespace collision was detected.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Schema:***
+
+*A namespace collision was detected.*
+
+*Target Type:%1*
+
+*Target Name:%2*
+
+*Forest Root:%3*
+
+*Top Level Name:%4*
+
+*DNS Name:%5*
+
+*NetBIOS Name:%6*
+
+*Security ID:%7*
+
+*New Flags:%8 *
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4865.md b/windows/keep-secure/event-4865.md
new file mode 100644
index 0000000000..50cf514dd4
--- /dev/null
+++ b/windows/keep-secure/event-4865.md
@@ -0,0 +1,150 @@
+---
+title: 4865(S) A trusted forest information entry was added. (Windows 10)
+description: Describes security event 4865(S) A trusted forest information entry was added.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4865(S): A trusted forest information entry was added.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when new trusted forest information entry was added.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4865
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049810
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Fabrikam.local
+ S-1-5-21-2703072690-1374247579-2643703677
+ 0x648620
+ 2
+ 0
+ -
+ Fabrikam.local
+ FABRIKAM
+ S-1-5-21-2703072690-1374247579-2643703677
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x138eb0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “add a trusted forest information entry” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “add a trusted forest information entry” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Trust Information:**
+
+- **Forest Root** \[Type = UnicodeString\]: the name of the Active Directory forest for which trusted forest information entry was added.
+
+
+
+- **Forest Root SID** \[Type = SID\]: the SID of the Active Directory forest for which trusted forest information entry was added. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+
+
+- **Operation ID** \[Type = HexInt64\]: unique hexadecimal identifier of the operation. You can correlate this event with other events ([4866](event-4866.md)(S): A trusted forest information entry was removed, [4867](event-4867.md)(S): A trusted forest information entry was modified.) using this field.
+
+
+
+- **Entry Type** \[Type = UInt32\]: the type of added entry:
+
+| Value | Type Name | Description |
+|-------|---------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | ForestTrustTopLevelName | The [DNS name](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_102a36e2-f66f-49e2-bee3-558736b2ecd5) of the [trusted forest](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_3b76a71f-9697-4836-9c69-09899b23c21b). The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx) |
+| 1 | ForestTrustTopLevelNameEx | This type commonly used for name suffix exceptions. The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx). |
+| 2 | ForestTrustDomainInfo | This field specifies a record containing identification and name information |
+
+- **Flags** \[Type = UInt32\]: The following table specifies the possible flags.
+
+ Some flag values are reused for different forest record types. See the “Meaning” column for more information.
+
+| Value | Trust Type | Meaning |
+|-------|------------------------------------------------------------|------------------------------------------------------------------------------|
+| 0 | - | No flags were set. |
+| 1 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled during initial creation. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 2 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled by the domain administrator. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+| 4 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled due to a conflict. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 8 | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+
+- **Top Level Name** \[Type = UnicodeString\]: the name of the new trusted forest information entry.
+
+- **DNS Name** \[Type = UnicodeString\]: DNS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **NetBIOS Name** \[Type = UnicodeString\]: NetBIOS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Domain SID** \[Type = SID\]: SID of the trust partner. This parameter might not be captured in the event, and in that case appears as “NULL SID”.
+
+## Security Monitoring Recommendations
+
+For 4865(S): A trusted forest information entry was added.
+
+- Any changes related to Active Directory forest trusts (especially creation of the new trust) must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4866.md b/windows/keep-secure/event-4866.md
new file mode 100644
index 0000000000..bc7752fc7b
--- /dev/null
+++ b/windows/keep-secure/event-4866.md
@@ -0,0 +1,150 @@
+---
+title: 4866(S) A trusted forest information entry was removed. (Windows 10)
+description: Describes security event 4866(S) A trusted forest information entry was removed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4866(S): A trusted forest information entry was removed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates when the trusted forest information entry was removed.
+
+This event is generated only on domain controllers.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4865
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049810
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Fabrikam.local
+ S-1-5-21-2703072690-1374247579-2643703677
+ 0x648620
+ 2
+ 0
+ -
+ Fabrikam.local
+ FABRIKAM
+ S-1-5-21-2703072690-1374247579-2643703677
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x138eb0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “remove a trusted forest information entry” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “remove a trusted forest information entry” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Trust Information:**
+
+- **Forest Root** \[Type = UnicodeString\]: the name of the Active Directory forest for which trusted forest information entry was removed.
+
+
+
+- **Forest Root SID** \[Type = SID\]: the SID of the Active Directory forest for which trusted forest information entry was removed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+
+
+- **Operation ID** \[Type = HexInt64\]: unique hexadecimal identifier of the operation. You can correlate this event with other events ([4865](event-4865.md)(S): A trusted forest information entry was added, [4867](event-4867.md)(S): A trusted forest information entry was modified.) using this field.
+
+
+
+- **Entry Type** \[Type = UInt32\]: the type of removed entry:
+
+| Value | Type Name | Description |
+|-------|---------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | ForestTrustTopLevelName | The [DNS name](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_102a36e2-f66f-49e2-bee3-558736b2ecd5) of the [trusted forest](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_3b76a71f-9697-4836-9c69-09899b23c21b). The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx) |
+| 1 | ForestTrustTopLevelNameEx | This type commonly used for name suffix exceptions. The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx). |
+| 2 | ForestTrustDomainInfo | This field specifies a record containing identification and name information |
+
+- **Flags** \[Type = UInt32\]: The following table specifies the possible flags.
+
+ Some flag values are reused for different forest record types. See the “Meaning” column for more information.
+
+| Value | Trust Type | Meaning |
+|-------|------------------------------------------------------------|------------------------------------------------------------------------------|
+| 0 | - | No flags were set. |
+| 1 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled during initial creation. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 2 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled by the domain administrator. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+| 4 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled due to a conflict. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 8 | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+
+- **Top Level Name** \[Type = UnicodeString\]: the name of the removed trusted forest information entry.
+
+- **DNS Name** \[Type = UnicodeString\]: DNS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **NetBIOS Name** \[Type = UnicodeString\]: NetBIOS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Domain SID** \[Type = SID\]: SID of the trust partner. This parameter might not be captured in the event, and in that case appears as “NULL SID”.
+
+## Security Monitoring Recommendations
+
+For 4866(S): A trusted forest information entry was removed.
+
+- Any changes related to Active Directory forest trusts (especially trust removal) must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4867.md b/windows/keep-secure/event-4867.md
new file mode 100644
index 0000000000..73c7e92586
--- /dev/null
+++ b/windows/keep-secure/event-4867.md
@@ -0,0 +1,152 @@
+---
+title: 4867(S) A trusted forest information entry was modified. (Windows 10)
+description: Describes security event 4867(S) A trusted forest information entry was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4867(S): A trusted forest information entry was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authentication Policy Change](audit-authentication-policy-change.md)
+
+***Event Description:***
+
+This event generates the trusted forest information entry was modified.
+
+This event is generated only on domain controllers.
+
+This event contains new values only, it doesn’t contains old values and it doesn’t show you which trust attributes were modified.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4865
+ 0
+ 0
+ 13569
+ 0
+ 0x8020000000000000
+
+ 1049810
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Fabrikam.local
+ S-1-5-21-2703072690-1374247579-2643703677
+ 0x648620
+ 2
+ 0
+ -
+ Fabrikam.local
+ FABRIKAM
+ S-1-5-21-2703072690-1374247579-2643703677
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x138eb0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify/change a trusted forest information entry” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify/change a trusted forest information entry” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Trust Information:**
+
+- **Forest Root** \[Type = UnicodeString\]: the name of the Active Directory forest for which trusted forest information entry was modified.
+
+
+
+- **Forest Root SID** \[Type = SID\]: the SID of the Active Directory forest for which trusted forest information entry was modified. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+
+
+- **Operation ID** \[Type = HexInt64\]: unique hexadecimal identifier of the operation. You can correlate this event with other events ([4865](event-4865.md)(S): A trusted forest information entry was added, [4866](event-4866.md)(S): A trusted forest information entry was removed) using this field.
+
+
+
+- **Entry Type** \[Type = UInt32\]: the type of modified entry:
+
+| Value | Type Name | Description |
+|-------|---------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 0 | ForestTrustTopLevelName | The [DNS name](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_102a36e2-f66f-49e2-bee3-558736b2ecd5) of the [trusted forest](https://msdn.microsoft.com/en-us/library/cc234227.aspx#gt_3b76a71f-9697-4836-9c69-09899b23c21b). The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx) |
+| 1 | ForestTrustTopLevelNameEx | This type commonly used for name suffix exceptions. The structure used for this record type is equivalent to [LSA\_UNICODE\_STRING](https://msdn.microsoft.com/en-us/library/cc234258.aspx). |
+| 2 | ForestTrustDomainInfo | This field specifies a record containing identification and name information |
+
+- **Flags** \[Type = UInt32\]: The following table specifies the possible flags.
+
+ Some flag values are reused for different forest record types. See the “Meaning” column for more information.
+
+| Value | Trust Type | Meaning |
+|-------|------------------------------------------------------------|------------------------------------------------------------------------------|
+| 0 | - | No flags were set. |
+| 1 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled during initial creation. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 2 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled by the domain administrator. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+| 4 | ForestTrustTopLevelNameEx
ForestTrustTopLevelName | The top-level name trust record is disabled due to a conflict. |
+| | ForestTrustDomainInfo | The domain information trust record is disabled by the domain administrator. |
+| 8 | ForestTrustDomainInfo | The domain information trust record is disabled due to a conflict. |
+
+- **Top Level Name** \[Type = UnicodeString\]: the name of the modified trusted forest information entry.
+
+- **DNS Name** \[Type = UnicodeString\]: DNS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **NetBIOS Name** \[Type = UnicodeString\]: NetBIOS name of the trust partner. This parameter might not be captured in the event, and in that case appears as “-”.
+
+- **Domain SID** \[Type = SID\]: SID of the trust partner. This parameter might not be captured in the event, and in that case appears as “NULL SID”.
+
+## Security Monitoring Recommendations
+
+For 4867(S): A trusted forest information entry was modified.
+
+- Any changes in Active Directory forest trust settings must be monitored and alerts should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4902.md b/windows/keep-secure/event-4902.md
new file mode 100644
index 0000000000..b6cf1ebb77
--- /dev/null
+++ b/windows/keep-secure/event-4902.md
@@ -0,0 +1,80 @@
+---
+title: 4902(S) The Per-user audit policy table was created. (Windows 10)
+description: Describes security event 4902(S) The Per-user audit policy table was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4902(S): The Per-user audit policy table was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates during system startup if Per-user audit policy is defined on the computer.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4902
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049490
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 1
+ 0x703e
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Number of Elements** \[Type = UInt32\]: number of users for which Per-user policies were defined (number of unique users). You can get the list of users for which Per-user policies are defined using “auditpol /list /user” command:
+
+
+
+**Policy ID** \[Type = HexInt64\]: unique per-User Audit Policy hexadecimal identifier.
+
+## Security Monitoring Recommendations
+
+For 4902(S): The Per-user audit policy table was created.
+
+- If you don’t expect to see any per-User Audit Policies enabled on specific computers (**Computer**), monitor for these events.
+
+- If you don’t use per-User Audit Policies in your network, monitor for these events.
+
+- Typically this is an informational event and has little to no security relevance.
+
diff --git a/windows/keep-secure/event-4904.md b/windows/keep-secure/event-4904.md
new file mode 100644
index 0000000000..5f46d6c131
--- /dev/null
+++ b/windows/keep-secure/event-4904.md
@@ -0,0 +1,132 @@
+---
+title: 4904(S) An attempt was made to register a security event source. (Windows 10)
+description: Describes security event 4904(S) An attempt was made to register a security event source.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4904(S): An attempt was made to register a security event source.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time a new [security event source](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363661(v=vs.85).aspx) is registered.
+
+You can typically see this event during system startup, if specific roles (Internet Information Services, for example) are installed in the system.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4904
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049538
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ FSRM Audit
+ 0x1cc4e
+ 0x688
+ C:\\Windows\\System32\\svchost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to register a security event source. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to register a security event source.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted to register the security event source. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Event Source:**
+
+- **Source Name** \[Type = UnicodeString\]: the name of registered security event source. You can see all registered security event source names in this registry path: “HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog\\Security”. Here is an example:
+
+
+
+- **Event Source ID** \[Type = HexInt64\]: the unique hexadecimal identifier of registered security event source.
+
+## Security Monitoring Recommendations
+
+For 4904(S): An attempt was made to register a security event source.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If you have a pre-defined list of allowed security event sources for specific computers or computer types, then you can use this event and check whether “**Event Source\\Source Name**”is in your defined list.
+
+- Typically this event has an informational purpose.
+
diff --git a/windows/keep-secure/event-4905.md b/windows/keep-secure/event-4905.md
new file mode 100644
index 0000000000..222fd0f263
--- /dev/null
+++ b/windows/keep-secure/event-4905.md
@@ -0,0 +1,132 @@
+---
+title: 4905(S) An attempt was made to unregister a security event source. (Windows 10)
+description: Describes security event 4905(S) An attempt was made to unregister a security event source.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4905(S): An attempt was made to unregister a security event source.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time a [security event source](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363661(v=vs.85).aspx) is unregistered.
+
+You typically see this event if specific roles were removed, for example, Internet Information Services.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4905
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049718
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ IIS-METABASE
+ 0x20c15f
+ 0xd90
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made an attempt to unregister a security event source. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made an attempt to unregister a security event source.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted to unregister the security event source. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Event Source:**
+
+- **Source Name** \[Type = UnicodeString\]: the name of unregistered security event source. You can see all registered security event source names in this registry path: “HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog\\Security”. Here is an example:
+
+
+
+- **Event Source ID** \[Type = HexInt64\]: the unique hexadecimal identifier of unregistered security event source.
+
+## Security Monitoring Recommendations
+
+For 4905(S): An attempt was made to unregister a security event source.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If you have a list of critical security event sources which should never have been unregistered, then you can use this event and check the “**Event Source\\Source Name**.”
+
+- Typically this event has an informational purpose.
+
diff --git a/windows/keep-secure/event-4906.md b/windows/keep-secure/event-4906.md
new file mode 100644
index 0000000000..9232c75a41
--- /dev/null
+++ b/windows/keep-secure/event-4906.md
@@ -0,0 +1,81 @@
+---
+title: 4906(S) The CrashOnAuditFail value has changed. (Windows 10)
+description: Describes security event 4906(S) The CrashOnAuditFail value has changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4906(S): The CrashOnAuditFail value has changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time **CrashOnAuditFail** audit flag value was modified.
+
+This event is always logged regardless of the "Audit Policy Change" sub-category setting.
+
+More information about **CrashOnAuditFail** flag can be found [here](https://technet.microsoft.com/en-us/library/cc963220.aspx).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4906
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049529
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 1
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**New Value of CrashOnAuditFail** \[Type = UInt32\]**:** contains new value of **CrashOnAuditFail** flag. Possible values are:
+
+- 0 - The feature is off. The system does not halt, even when it cannot record events in the Security Log.
+
+- 1 - The feature is on. The system halts when it cannot record an event in the Security Log.
+
+- 2 - The feature is on and has been triggered. The system halted because it could not record an auditable event in the Security Log. Only members of the Administrators group can log on.
+
+## Security Monitoring Recommendations
+
+For 4906(S): The CrashOnAuditFail value has changed.
+
+- Any changes of **CrashOnAuditFail** audit flag that are reported by this event must be monitored, and an alert should be triggered. If this change was not planned, investigate the reason for the change.
+
diff --git a/windows/keep-secure/event-4907.md b/windows/keep-secure/event-4907.md
new file mode 100644
index 0000000000..b3339c3ace
--- /dev/null
+++ b/windows/keep-secure/event-4907.md
@@ -0,0 +1,285 @@
+---
+title: 4907(S) Auditing settings on object were changed. (Windows 10)
+description: Describes security event 4907(S) Auditing settings on object were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4907(S): Auditing settings on object were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates when the [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) of an object (for example, a registry key or file) was changed.
+
+This event doesn't generate for Active Directory objects.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4907
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049732
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x138eb0
+ Security
+ Key
+ \\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Services\\EventLog\\Internet Explorer
+ 0x2f8
+ S:AI
+ S:ARAI(AU;CISA;KA;;;S-1-5-21-3457937927-2839227994-823803824-1104)
+ 0x120c
+ C:\\Windows\\regedit.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to object’s auditing settings. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to object’s auditing settings.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | SC\_MANAGER OBJECT |
+| Key | WaitablePort | Callback | |
+| Job | Port | FilterConnectionPort | |
+| ALPC Port | Semaphore | Adapter | |
+
+- **Object Name** \[Type = UnicodeString\]: full path and name of the object for which the [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) was modified. Depends on **Object Type**. Here are some examples:
+
+ - The format for **Object Type** = “Key” is: \\REGISTRY\\HIVE\\PATH where:
+
+ - HIVE:
+
+ - HKEY\_LOCAL\_MACHINE = \\REGISTRY\\MACHINE
+
+ - HKEY\_CURRENT\_USER = \\REGISTRY\\USER\\\[USER\_SID\], where \[USER\_SID\] is the SID of current user.
+
+ - HKEY\_CLASSES\_ROOT = \\REGISTRY\\MACHINE\\SOFTWARE\\Classes
+
+ - HKEY\_USERS = \\REGISTRY\\USER
+
+ - HKEY\_CURRENT\_CONFIG = \\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Hardware Profiles\\Current
+
+ - PATH – path to the registry key.
+
+ - The format for **Object Type** = “File” is: full path and name of the file or folder for which [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) was modified.
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4656](event-4656.md): A handle to an object was requested.” Event for registry keys or with **Handle ID** field in “[4656](event-4656.md)(S, F): A handle to an object was requested.” Event for file system objects. This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) was changed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Auditing Settings:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the old Security Descriptor Definition Language (SDDL) value for the object.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** the new Security Descriptor Definition Language (SDDL) value for the object.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4907(S): Auditing settings on object were changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor events related to specific Windows object types (“**Object Type**”), for example **File** or **Key**, monitor this event for the corresponding “**Object Type**.”
+
+- If you need to monitor all SACL changes for specific files, folders, registry keys, or other object types, monitor for “**Object Name**” field value which has specific object name.
+
+
+
+- If you have critical file or registry objects and you need to monitor all modifications (especially changes in SACL), monitor for specific “**Object\\Object Name”**.
+
+- If you have high-value computers for which you need to monitor all changes for all or specific file or registry objects, monitor for all [4907](event-4907.md) events on these computers**.**
+
diff --git a/windows/keep-secure/event-4908.md b/windows/keep-secure/event-4908.md
new file mode 100644
index 0000000000..fbb9957571
--- /dev/null
+++ b/windows/keep-secure/event-4908.md
@@ -0,0 +1,89 @@
+---
+title: 4908(S) Special Groups Logon table modified. (Windows 10)
+description: Describes security event 4908(S) Special Groups Logon table modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4908(S): Special Groups Logon table modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time Special Groups logon table was modified.
+
+This event also generates during system startup.
+
+This event is always logged regardless of the "Audit Policy Change" sub-category setting.
+
+More information about Special Groups auditing can be found here:
+
+
+
+
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4908
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049511
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ %{S-1-5-21-3457937927-2839227994-823803824-512}
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Special Groups** \[Type = UnicodeString\]**:** contains current list of SIDs (groups or accounts) which are members of Special Groups. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+“HKEY\_LOCAL\_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\Audit\\SpecialGroups” registry value contains current list of SIDs which are included in Special Groups:
+
+
+
+## Security Monitoring Recommendations
+
+For 4908(S): Special Groups Logon table modified.
+
+- If you use the Special Groups feature, then this event should be always monitored, especially on high value assets or computers. If this change was not planned, investigate the reason for the change.
+
+- If you don’t use the Special Groups feature, then this event should be always monitored because it indicates use of the Special Groups feature outside of your standard procedures.
+
diff --git a/windows/keep-secure/event-4909.md b/windows/keep-secure/event-4909.md
new file mode 100644
index 0000000000..650d9bbf8c
--- /dev/null
+++ b/windows/keep-secure/event-4909.md
@@ -0,0 +1,21 @@
+---
+title: 4909(-) The local policy settings for the TBS were changed. (Windows 10)
+description: Describes security event 4909(-) The local policy settings for the TBS were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4909(-): The local policy settings for the TBS were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
diff --git a/windows/keep-secure/event-4910.md b/windows/keep-secure/event-4910.md
new file mode 100644
index 0000000000..f167349c1b
--- /dev/null
+++ b/windows/keep-secure/event-4910.md
@@ -0,0 +1,21 @@
+---
+title: 4910(-) The group policy settings for the TBS were changed. (Windows 10)
+description: Describes security event 4910(-) The group policy settings for the TBS were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4910(-): The group policy settings for the TBS were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Currently this event doesn’t generate. It is a defined event, but it is never invoked by the operating system.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
diff --git a/windows/keep-secure/event-4911.md b/windows/keep-secure/event-4911.md
new file mode 100644
index 0000000000..39d00ba5ee
--- /dev/null
+++ b/windows/keep-secure/event-4911.md
@@ -0,0 +1,282 @@
+---
+title: 4911(S) Resource attributes of the object were changed. (Windows 10)
+description: Describes security event 4911(S) Resource attributes of the object were changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4911(S): Resource attributes of the object were changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates when [resource attributes](http://blogs.technet.com/b/canitpro/archive/2013/05/07/step-by-step-protecting-your-information-with-dynamic-access-control.aspx) of the file system object were changed.
+
+Resource attributes for file or folder can be changed, for example, using Windows File Explorer (object’s Properties->Classification tab).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4911
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 1183714
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x37925
+ Security
+ File
+ C:\\Audit Files\\HBI Data.txt
+ 0x49c
+ S:AI
+ S:ARAI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+ 0x67c
+ C:\\Windows\\System32\\svchost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that changed the resource attributes of the file system object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that changed the resource attributes of the file system object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always **“File”** for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: full path and/or name of the object for which resource attributes were changed.
+
+
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the resource attributes of the file system object were changed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Resource Attributes:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the old resource attributes.
+
+ For example: S:AI(RA;ID;;;;WD;("Impact\_MS",TI,0x10020,3000))
+
+ - Impact\_MS: Resource Property ***ID***.
+
+ - 3000: Recourse Property ***Value***.
+
+
+
+> If no resource attributes were set to the object, then SDDL will not contain any attributes, for example “**S:AI**”.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the new resource attributes. See more information in **Resource Attributes\\Original Security Descriptor** field section for this event.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4911(S): Resource attributes of the object were changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor events related to specific Windows object types (“**Object Type**”), for example **File** or **Key**, monitor this event for the corresponding “**Object Type**.”
+
+- If you need to monitor all changes to specific files or folders (in this case, changes to resource attributes), monitor for the “**Object Name**” that corresponds to the file or folder.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- You can track changes when, for example, a file was marked as High Impact, or was changed from High Impact to Medium Impact, or a resource was marked as a data type for a specific department and so on. This event can help track changes and resource attribute assignments, which you can see in “**Original Security Descriptor”** and “**New Security Descriptor”** fields.
+
diff --git a/windows/keep-secure/event-4912.md b/windows/keep-secure/event-4912.md
new file mode 100644
index 0000000000..6373e7532b
--- /dev/null
+++ b/windows/keep-secure/event-4912.md
@@ -0,0 +1,178 @@
+---
+title: 4912(S) Per User Audit Policy was changed. (Windows 10)
+description: Describes security event 4912(S) Per User Audit Policy was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4912(S): Per User Audit Policy was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Policy Change](audit-audit-policy-change.md)
+
+***Event Description:***
+
+This event generates every time [Per User Audit Policy](http://windowsitpro.com/systems-management/user-auditing-28-jun-2005) was changed.
+
+This event is always logged regardless of the "Audit Policy Change" sub-category setting.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4912
+ 0
+ 0
+ 13568
+ 0
+ 0x8020000000000000
+
+ 1049452
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x11ae30
+ S-1-5-21-3457937927-2839227994-823803824-2104
+ %%8276
+ %%13312
+ {0CCE922B-69AE-11D9-BED3-505054503030}
+ %%8452
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made a change to per-user audit policy. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made a change to per-user audit policy.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Policy For Account:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which the Per User Audit Policy was changed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+**Policy Change Details:**
+
+- **Category** \[Type = UnicodeString\]**:** the name of auditing category which subcategory state was changed. Possible values are:
+
+ - Account Logon
+
+ - Account Management
+
+ - Detailed Tracking
+
+ - DS Access
+
+ - Logon/Logoff
+
+ - Object Access
+
+ - Policy Change
+
+ - Privilege Use
+
+ - System
+
+- **Subcategory** \[Type = UnicodeString\]**:** the name of auditing subcategory which state was changed. Possible values:
+
+| Audit Credential Validation | Audit Process Termination | Audit Other Logon/Logoff Events |
+|------------------------------------------|----------------------------------------------|--------------------------------------|
+| Audit Kerberos Authentication Service | Audit RPC Events | Audit Special Logon |
+| Audit Kerberos Service Ticket Operations | Audit Detailed Directory Service Replication | Audit Application Generated |
+| Audit Other Logon/Logoff Events | Audit Directory Service Access | Audit Certification Services |
+| Audit Application Group Management | Audit Directory Service Changes | Audit Detailed File Share |
+| Audit Computer Account Management | Audit Directory Service Replication | Audit File Share |
+| Audit Distribution Group Management | Audit Account Lockout | Audit File System |
+| Audit Other Account Management Events | Audit IPsec Extended Mode | Audit Filtering Platform Connection |
+| Audit Security Group Management | Audit IPsec Main Mode | Audit Filtering Platform Packet Drop |
+| Audit User Account Management | Audit IPsec Quick Mode | Audit Handle Manipulation |
+| Audit DPAPI Activity | Audit Logoff | Audit Kernel Object |
+| Audit Process Creation | Audit Logon | Audit IPsec Driver |
+| Audit Other Object Access Events | Audit Filtering Platform Policy Change | Audit Other System Events |
+| Audit Registry | Audit MPSSVC Rule-Level Policy Change | Audit Security State Change |
+| Audit SAM | Audit Other Policy Change Events | Audit Security System Extension |
+| Audit Policy Change | Audit Non-Sensitive Privilege Use | Audit System Integrity |
+| Audit Authentication Policy Change | Audit Sensitive Privilege Use | Audit PNP Activity |
+| Audit Authorization Policy Change | Audit Other Privilege Use Events | |
+| Group Membership | Audit Network Policy Server | |
+
+- **Subcategory GUID** \[Type = GUID\]**:** the unique GUID of changed subcategory.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+To see subcategory GUID you can use the following command: “**auditpol /list /subcategory:\* /v”**:
+
+
+
+- **Changes** \[Type = UnicodeString\]**:** changes which were made for the subcategory. Possible values are:
+
+ - Success include removed
+
+ - Success include added
+
+ - Failure include removed
+
+ - Failure include added
+
+ - Success exclude removed
+
+ - Success exclude added
+
+ - Failure exclude removed
+
+ - Failure exclude added
+
+## Security Monitoring Recommendations
+
+For 4912(S): Per User Audit Policy was changed.
+
+- If you use the Per-user audit feature, then this event should be always monitored, especially on high value assets or computers. If this change was not planned, investigate the reason for the change.
+
+- If you don’t use the Per-user audit feature, then this event should be always monitored because it indicates use of the Per-user audit feature outside of your standard procedures.
+
diff --git a/windows/keep-secure/event-4913.md b/windows/keep-secure/event-4913.md
new file mode 100644
index 0000000000..b34355d236
--- /dev/null
+++ b/windows/keep-secure/event-4913.md
@@ -0,0 +1,288 @@
+---
+title: 4913(S) Central Access Policy on the object was changed. (Windows 10)
+description: Describes security event 4913(S) Central Access Policy on the object was changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4913(S): Central Access Policy on the object was changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Authorization Policy Change](audit-authorization-policy-change.md)
+
+***Event Description:***
+
+This event generates when a [Central Access Policy](https://technet.microsoft.com/en-us/library/hh831425.aspx) on a file system object is changed.
+
+This event always generates, regardless of the object’s [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx) settings.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4913
+ 0
+ 0
+ 13570
+ 0
+ 0x8020000000000000
+
+ 1183666
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x37901
+ Security
+ File
+ C:\\Audit Files\\HBI Data.txt
+ 0x3d4
+ S:AI
+ S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534)
+ 0x884
+ C:\\Windows\\System32\\dllhost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that changed the Central Access Policy on the object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that changed the Central Access Policy on the object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **Object Server** \[Type = UnicodeString\]: has “**Security**” value for this event.
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always **“File”** for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Object Name** \[Type = UnicodeString\]: full path and/or name of the object on which the Central Access Policy was changed.
+
+
+
+- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, “[4663](event-4663.md)(S): An attempt was made to access an object.” This parameter might not be captured in the event, and in that case appears as “0x0”.
+
+**Process:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process using which Central Access Policy was changed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID** field.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+**Central Policy ID:**
+
+- **Original Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the old Central Policy ID (for the policy that was formerly applied to the object).
+
+ SDDL contains Central Access Policy SID, here is an example: S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534), Central Access Policy SID here is “**S-1-17-1442530252-1178042555-1247349694-2318402534**”. To resolve this SID to the real Central Access Policy name you need to do the following:
+
+1. Find Central Access Policy Active Directory object in: “CN=Central Access Policies,CN=Claims Configuration,CN=Services,CN=Configuration,DC=XXX,DC=XX” Active Directory container.
+
+2. Open object’s “**Properties**”.
+
+3. Find “**msAuthz-CentralAccessPolicyID**” attribute.
+
+4. Convert hexadecimal value to SID (string). Here you can see more information about how to perform this action: .
+
+
+
+> If no Central Access Policies were applied to the object, then SDDL will not contain any SIDs, for example “**S:AI**”.
+
+- **New Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the new Central Policy ID (for the policy that has been applied to the object). See more information in **Central Policy ID\\Original Security Descriptor** field section for this event.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 4913(S): Central Access Policy on the object was changed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor events related to specific Windows object types (“**Object Type**”), for example **File** or **Key**, monitor this event for the corresponding “**Object Type**.”
+
+- If you need to monitor all changes to specific files or folders (in this case, changes to the Central Access Policy), monitor for the “**Object Name**” that corresponds to the file or folder.
+
+- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
+
+- You can monitor to see if “**Process Name**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+
+
+- If you have a pre-defined list of restricted substrings or words in process names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Process Name**.”
+
+- If you have specific files, folders, or entire systems to which a specific Central Access Policy should be applied, you can monitor this event and compare the Central Access Policy SID in “**New Security Descriptor**” to see if it matches the expected policy.
+
+
+
diff --git a/windows/keep-secure/event-4928.md b/windows/keep-secure/event-4928.md
new file mode 100644
index 0000000000..b1e99309ef
--- /dev/null
+++ b/windows/keep-secure/event-4928.md
@@ -0,0 +1,108 @@
+---
+title: 4928(S, F) An Active Directory replica source naming context was established. (Windows 10)
+description: Describes security event 4928(S, F) An Active Directory replica source naming context was established.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4928(S, F): An Active Directory replica source naming context was established.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time a new Active Directory replica source naming context is established.
+
+Failure event generates if an error occurs (**Status Code** != 0).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4928
+ 0
+ 0
+ 14083
+ 0
+ 0x8020000000000000
+
+ 227065
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ CN=NTDS Settings,CN=WIN2012R2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ ddec0cff-6ceb-4a59-b13f-1724c38a0970.\_msdcs.contoso.local
+ DC=ForestDnsZones,DC=contoso,DC=local
+ 368
+ 0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Source Address** \[Type = UnicodeString\]: DNS record of the server from which information or an update was received.
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context to replicate.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+
+
+- **Status Code** \[Type = UInt32\]**:** if there are no issues or errors, the status code will be 0. If an error happened, you will receive Failure event and Status Code will not be equal to “**0**”. You can check error code meaning here:
+
+## Security Monitoring Recommendations
+
+For 4928(S, F): An Active Directory replica source naming context was established.
+
+- Monitor for **Source Address** field, because the source of new replication (new DRA) must be authorized for this action. If you find any unauthorized DRA you should trigger an event.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4929.md b/windows/keep-secure/event-4929.md
new file mode 100644
index 0000000000..cb3b05a636
--- /dev/null
+++ b/windows/keep-secure/event-4929.md
@@ -0,0 +1,106 @@
+---
+title: 4929(S, F) An Active Directory replica source naming context was removed. (Windows 10)
+description: Describes security event 4929(S, F) An Active Directory replica source naming context was removed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4929(S, F): An Active Directory replica source naming context was removed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time Active Directory replica source naming context was removed.
+
+Failure event generates if an error occurs (**Status Code** != 0).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4929
+ 0
+ 0
+ 14083
+ 0
+ 0x8020000000000000
+
+ 227013
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ -
+ 2d361dd6-fc22-4d9d-b876-ec582b836458.\_msdcs.contoso.local
+ DC=contoso,DC=local
+ 16640
+ 0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Source Address** \[Type = UnicodeString\]: DNS record of the server from which the “remove” request was received.
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context which was removed.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+- **Status Code** \[Type = UInt32\]**:** if there are no issues or errors, the status code will be 0. If an error happened, you will receive Failure event and Status Code will not be equal to “**0**”. You can check error code meaning here:
+
+## Security Monitoring Recommendations
+
+For 4929(S, F): An Active Directory replica source naming context was removed.
+
+- Monitor for **Source Address** field, because the source of the request must be authorized for this action. If you find any unauthorized DRA you should trigger an event.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4930.md b/windows/keep-secure/event-4930.md
new file mode 100644
index 0000000000..bcf9d221ed
--- /dev/null
+++ b/windows/keep-secure/event-4930.md
@@ -0,0 +1,108 @@
+---
+title: 4930(S, F) An Active Directory replica source naming context was modified. (Windows 10)
+description: Describes security event 4930(S, F) An Active Directory replica source naming context was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4930(S, F): An Active Directory replica source naming context was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time Active Directory replica source naming context was modified.
+
+Failure event generates if an error occurs (**Status Code** != 0).
+
+It is not possible to understand what exactly was modified from this event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4930
+ 0
+ 0
+ 14083
+ 0
+ 0x8020000000000000
+
+ 1564
+
+
+ Security
+ Win2012r2.corp.contoso.local
+
+
+-
+ CN=NTDS Settings,CN=WIN2012R2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ -
+ edf0bef9-1f73-4df3-8991-f6ec2d4ef3ae
+ CN=Schema,CN=Configuration,DC=contoso,DC=local
+ 0
+ 0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name. Typically equals “**-**“ for this event.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Source Address** \[Type = UnicodeString\]: DNS record of computer from which the modification request was received.
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context which was modified.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+- **Status Code** \[Type = UInt32\]**:** if there are no issues or errors, the status code will be 0. If an error happened, you will receive Failure event and Status Code will not be equal to “**0**”. You can check error code meaning here:
+
+## Security Monitoring Recommendations
+
+For 4930(S, F): An Active Directory replica source naming context was modified.
+
+- Monitor for **Source Address** field, because the source of the request must be authorized for this action. If you find any unauthorized DRA you should trigger an event.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4931.md b/windows/keep-secure/event-4931.md
new file mode 100644
index 0000000000..bf823bacef
--- /dev/null
+++ b/windows/keep-secure/event-4931.md
@@ -0,0 +1,106 @@
+---
+title: 4931(S, F) An Active Directory replica destination naming context was modified. (Windows 10)
+description: Describes security event 4931(S, F) An Active Directory replica destination naming context was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4931(S, F): An Active Directory replica destination naming context was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time Active Directory replica destination naming context was modified.
+
+Failure event generates if an error occurs (**Status Code** != 0).
+
+It is not possible to understand what exactly was modified from this event.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4931
+ 0
+ 0
+ 14083
+ 0
+ 0x8020000000000000
+
+ 227058
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ ddec0cff-6ceb-4a59-b13f-1724c38a0970.\_msdcs.contoso.local
+ CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ -
+ DC=ForestDnsZones,DC=contoso,DC=local
+ 23
+ 0
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Destination Address** \[Type = UnicodeString\]: DNS record of computer to which the modification request was sent.
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context which was modified.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+- **Status Code** \[Type = UInt32\]**:** if there are no issues or errors, the status code will be 0. If an error happened, you will receive Failure event and Status Code will not be equal to “**0**”. You can check error code meaning here:
+
+## Security Monitoring Recommendations
+
+For 4931(S, F): An Active Directory replica destination naming context was modified.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4932.md b/windows/keep-secure/event-4932.md
new file mode 100644
index 0000000000..c7555dbed9
--- /dev/null
+++ b/windows/keep-secure/event-4932.md
@@ -0,0 +1,106 @@
+---
+title: 4932(S) Synchronization of a replica of an Active Directory naming context has begun. (Windows 10)
+description: Describes security event 4932(S) Synchronization of a replica of an Active Directory naming context has begun.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4932(S): Synchronization of a replica of an Active Directory naming context has begun.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Replication](audit-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time synchronization of a replica of an Active Directory naming context has begun.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4932
+ 0
+ 0
+ 14082
+ 0
+ 0x8020000000000000
+
+ 413689
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ CN=NTDS Settings,CN=WIN2012R2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ CN=Schema,CN=Configuration,DC=contoso,DC=local
+ 2147483733
+ 48
+ 20869
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context to replicate.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+- **Session ID** \[Type = UInt32\]**:** unique identifier of replication session. Using this field you can find “[4932](event-4932.md): Synchronization of a replica of an Active Directory naming context has begun.” and “[4933](event-4933.md): Synchronization of a replica of an Active Directory naming context has ended.” events for the same session.
+
+- **Start USN** \[Type = UnicodeString\]**: Naming Context’s** USN number before replication begins.
+
+> **Note** Active Directory replication does not depend on time to determine what changes need to be propagated. It relies instead on the use of **update sequence numbers (USNs)** that are assigned by a counter that is local to each domain controller. Because these USN counters are local, it is easy to ensure that they are reliable and never "run backward" (that is, decrease in value). The trade-off is that it is meaningless to compare a USN assigned on one domain controller to a USN assigned on a different domain controller. The replication system is designed with this restriction in mind.
+
+## Security Monitoring Recommendations
+
+For 4932(S): Synchronization of a replica of an Active Directory naming context has begun.
+
+- Monitor for **Source Address** field, because the source of replication (DRA) must be authorized for this action. If you find any unauthorized DRA you should trigger an event.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4933.md b/windows/keep-secure/event-4933.md
new file mode 100644
index 0000000000..22c828fb87
--- /dev/null
+++ b/windows/keep-secure/event-4933.md
@@ -0,0 +1,111 @@
+---
+title: 4933(S, F) Synchronization of a replica of an Active Directory naming context has ended. (Windows 10)
+description: Describes security event 4933(S, F) Synchronization of a replica of an Active Directory naming context has ended.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4933(S, F): Synchronization of a replica of an Active Directory naming context has ended.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Replication](audit-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates every time synchronization of a replica of an Active Directory naming context has ended.
+
+Failure event occurs when synchronization of a replica of an Active Directory naming context failed.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4933
+ 0
+ 0
+ 14082
+ 0
+ 0x8010000000000000
+
+ 413644
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ CN=NTDS Settings,CN=WIN2012R2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=contoso,DC=local
+ CN=Schema,CN=Configuration,DC=contoso,DC=local
+ 2147483733
+ 40
+ 20869
+ 1722
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Destination DRA** \[Type = UnicodeString\]: destination directory replication agent distinguished name.
+
+> **Note** The **Directory Replication Agent (DRA)** handles replication between domain controllers. The Directory Replication Agent uses the connection objects in the topology map to find out those partners that are relevant when replicating changes to directory partitions. The DRA sends a replication request to the partners of a domain controller when the domain controller needs to update its copy of Active Directory.
+
+- **Source DRA** \[Type = UnicodeString\]: source directory replication agent distinguished name.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **Naming Context** \[Type = UnicodeString\]**:** naming context to replicate.
+
+> **Note** The Directory Tree of Active Directory tree is partitioned to allow sections to be distributed (replicated) to domain controllers in different domains within the forest. Each domain controller stores a copy of a specific part of the directory tree, called a **Naming Context** also known as Directory Partition. **Naming Context** is replicated as a unit to other domain controllers in the forest that contain a replica of the same sub tree. A **Naming Context** is also called a Directory Partition.
+
+- **Options** \[Type = UInt32\]: decimal value of [DRS Options](https://msdn.microsoft.com/en-us/library/cc228477.aspx).
+
+- **Session ID** \[Type = UInt32\]**:** unique identifier of replication session. Using this field you can find “[4932](event-4932.md): Synchronization of a replica of an Active Directory naming context has begun.” and “[4933](event-4933.md): Synchronization of a replica of an Active Directory naming context has ended.” events for the same session.
+
+- **End USN** \[Type = UInt32\]**: Naming Context’s** USN number after replication ends.
+
+> **Note** Active Directory replication does not depend on time to determine what changes need to be propagated. It relies instead on the use of **update sequence numbers (USNs)** that are assigned by a counter that is local to each domain controller. Because these USN counters are local, it is easy to ensure that they are reliable and never "run backward" (that is, decrease in value). The trade-off is that it is meaningless to compare a USN assigned on one domain controller to a USN assigned on a different domain controller. The replication system is designed with this restriction in mind.
+
+- **Status Code** \[Type = UInt32\]**:** if there are no issues or errors, the status code will be “**0**”. If an error happened, you will receive Failure event and Status Code will not be equal to “**0**”. You can check error code meaning here:
+
+## Security Monitoring Recommendations
+
+For 4933(S, F): Synchronization of a replica of an Active Directory naming context has ended.
+
+- Monitor for **Source Address** field, because the source of replication (DRA) must be authorized for this action. If you find any unauthorized DRA you should trigger an event.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4934.md b/windows/keep-secure/event-4934.md
new file mode 100644
index 0000000000..4f0eae2cee
--- /dev/null
+++ b/windows/keep-secure/event-4934.md
@@ -0,0 +1,51 @@
+---
+title: 4934(S) Attributes of an Active Directory object were replicated. (Windows 10)
+description: Describes security event 4934(S) Attributes of an Active Directory object were replicated.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4934(S): Attributes of an Active Directory object were replicated.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when attributes of an Active Directory object were replicated.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Schema:***
+
+*Attributes of an Active Directory object were replicated.*
+
+*Session ID:%1*
+
+*Object:%2*
+
+*Attribute:%3*
+
+*Type of change:%4*
+
+*New Value:%5*
+
+*USN:%6*
+
+*Status Code:%7*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4935.md b/windows/keep-secure/event-4935.md
new file mode 100644
index 0000000000..ccf6d31bd6
--- /dev/null
+++ b/windows/keep-secure/event-4935.md
@@ -0,0 +1,74 @@
+---
+title: 4935(F) Replication failure begins. (Windows 10)
+description: Describes security event 4935(F) Replication failure begins.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4935(F): Replication failure begins.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Description:***
+
+This event generates when Active Directory replication failure begins.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4935
+ 0
+ 0
+ 14083
+ 0
+ 0x8010000000000000
+
+ 1552
+
+
+ Security
+ Win2012r2.contoso.local
+
+
+-
+ 1
+ 8419
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Replication Event** \[Type = UInt32\]**:** there is no detailed information about this field in this document.
+
+**Audit Status Code** \[Type = UInt32\]**:** there is no detailed information about this field in this document.
+
+## Security Monitoring Recommendations
+
+For 4935(F): Replication failure begins.
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4936.md b/windows/keep-secure/event-4936.md
new file mode 100644
index 0000000000..65cc7c79e9
--- /dev/null
+++ b/windows/keep-secure/event-4936.md
@@ -0,0 +1,43 @@
+---
+title: 4936(S) Replication failure ends. (Windows 10)
+description: Describes security event 4936(S) Replication failure ends.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4936(S): Replication failure ends.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when Active Directory replication failure ends.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Schema:***
+
+*Replication failure ends.*
+
+*Replication Event:%1*
+
+*Audit Status Code:%2*
+
+*Replication Status Code:%3*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event is typically used for Active Directory replication troubleshooting.
+
diff --git a/windows/keep-secure/event-4937.md b/windows/keep-secure/event-4937.md
new file mode 100644
index 0000000000..09e0abe080
--- /dev/null
+++ b/windows/keep-secure/event-4937.md
@@ -0,0 +1,47 @@
+---
+title: 4937(S) A lingering object was removed from a replica. (Windows 10)
+description: Describes security event 4937(S) A lingering object was removed from a replica.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4937(S): A lingering object was removed from a replica.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates when a [lingering object](https://support.microsoft.com/en-us/kb/910205) was removed from a replica.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Detailed Directory Service Replication](audit-detailed-directory-service-replication.md)
+
+***Event Schema:***
+
+*A lingering object was removed from a replica.*
+
+*Destination DRA:%1*
+
+*Source DRA:%2*
+
+*Object:%3*
+
+*Options:%4*
+
+*Status Code:%5*
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-4944.md b/windows/keep-secure/event-4944.md
new file mode 100644
index 0000000000..f322bb8458
--- /dev/null
+++ b/windows/keep-secure/event-4944.md
@@ -0,0 +1,117 @@
+---
+title: 4944(S) The following policy was active when the Windows Firewall started. (Windows 10)
+description: Describes security event 4944(S) The following policy was active when the Windows Firewall started.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4944(S): The following policy was active when the Windows Firewall started.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates every time Windows Firewall service starts.
+
+This event shows Windows Firewall settings that were in effect when the Windows Firewall service started.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4944
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050808
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ No
+ Public
+ Off
+ Disabled
+ Enabled
+ Disabled
+ Disabled
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Group Policy Applied** \[Type = UnicodeString\]: it always has “No” value for this event. This field should show information about: was Group Policy applied for Windows Firewall when it starts or not.
+
+**Profile Used** \[Type = UnicodeString\]: shows the active profile name for the moment Windows Firewall service starts. It always has value “**Public**” for this event, because when this event generates, the active profile is not switched to “**Domain**” or “**Private**”. Typically you will see “[4956](event-4956.md)(S): Windows Firewall has changed the active profile” after this event, which will tell you the real active profile.
+
+**Operational mode** \[Type = UnicodeString\]:
+
+- **On** – if “**Firewall state:**” setting was set to “On” for “Public” profile.
+
+- **Off** - if “**Firewall state:**” setting was set to “Off” for “Public” profile.
+
+
+
+**Allow Remote Administration** \[Type = UnicodeString\]: looks like this setting is connected to ”[Windows Firewall: Allow remote administration exception](https://technet.microsoft.com/en-us/library/cc738900(v=ws.10).aspx)” Group Policy setting, but it is always Disabled, no matter which option is set for “[Windows Firewall: Allow remote administration exception](https://technet.microsoft.com/en-us/library/cc738900(v=ws.10).aspx)” Group Policy.
+
+**Allow Unicast Responses to Multicast/Broadcast Traffic** \[Type = UnicodeString\]:
+
+- **Enabled** - if “**Allow unicast response:**” Settings configuration was set to “Yes” for “Public” profile.
+
+- **Disabled** - if “**Allow unicast response:**” Settings configuration was set to “No” for “Public” profile.
+
+
+
+**Security Logging:**
+
+- **Log Dropped Packets** \[Type = UnicodeString\]:
+
+ - **Enabled** – if “**Log dropped packets:**” Logging configuration was set to “Yes” for “Public” profile.
+
+ - **Disabled** - if “**Log dropped packets:**” Logging configuration was set to “No” for “Public” profile.
+
+- **Log Successful Connections** \[Type = UnicodeString\]:
+
+ - **Enabled** - if “**Log successful connections:**” Logging configuration was set to “Yes” for “Public” profile.
+
+ - **Disabled** - if “**Log dropped packets:**” Logging configuration was set to “No” for “Public” profile.
+
+
+
+## Security Monitoring Recommendations
+
+For 4944(S): The following policy was active when the Windows Firewall started.
+
+- If you have a standard or baseline for Windows Firewall settings defined for **Public** profile (which can be the same as for Domain, for example), monitor this event and check whether the settings reported by the event are still the same as were defined in your standard or baseline.
+
+- Unfortunately this event shows configuration only for **Public** profile, but you can still compare all the settings with your organization's Windows Firewall baseline for Public profile on different computers and trigger an alert if the configuration is not the same.
+
diff --git a/windows/keep-secure/event-4945.md b/windows/keep-secure/event-4945.md
new file mode 100644
index 0000000000..1b94b91fbc
--- /dev/null
+++ b/windows/keep-secure/event-4945.md
@@ -0,0 +1,91 @@
+---
+title: 4945(S) A rule was listed when the Windows Firewall started. (Windows 10)
+description: Describes security event 4945(S) A rule was listed when the Windows Firewall started.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4945(S): A rule was listed when the Windows Firewall started.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates every time Windows Firewall service starts.
+
+This event shows the inbound and/or outbound rule which was listed when the Windows Firewall started and applied for “Public” profile.
+
+This event generates per rule.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4945
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1049946
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Public
+ NPS-NPSSvc-In-RPC
+ Network Policy Server (RPC)
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile used** \[Type = UnicodeString\]**:** the name of the profile that the rule belongs to. It always has value “**Public”**, because this event shows rules only for “Public” profile.
+
+**Rule:**
+
+- **Rule ID** \[Type = UnicodeString\]: the unique firewall rule identifier.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Rule Name** \[Type = UnicodeString\]: the name of the rule which was listed when the Windows Firewall started. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4945(S): A rule was listed when the Windows Firewall started.
+
+- Typically this event has an informational purpose.
+
+- Unfortunately this event shows rules only for **Public** profile, but you still can compare this list with your organization's Windows Firewall baseline for Public profile rules on different computers, and trigger an alert if the configuration is not the same.
+
diff --git a/windows/keep-secure/event-4946.md b/windows/keep-secure/event-4946.md
new file mode 100644
index 0000000000..f73ca913a6
--- /dev/null
+++ b/windows/keep-secure/event-4946.md
@@ -0,0 +1,101 @@
+---
+title: 4946(S) A change has been made to Windows Firewall exception list. A rule was added. (Windows 10)
+description: Describes security event 4946(S) A change has been made to Windows Firewall exception list. A rule was added.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4946(S): A change has been made to Windows Firewall exception list. A rule was added.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when new rule was locally added to Windows Firewall.
+
+This event doesn't generate when new rule was added via Group Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4946
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050893
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ All
+ {F2649D59-1355-4E3C-B886-CDD08B683199}
+ Allow All Rule
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile Changed** \[Type = UnicodeString\]**:** the list of profiles to which new rule was applied. Examples:
+
+- All
+
+- Domain,Public
+
+- Domain,Private
+
+- Private,Public
+
+- Public
+
+- Domain
+
+- Private
+
+**Added Rule:**
+
+- **Rule ID** \[Type = UnicodeString\]: the unique new firewall rule identifier.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Rule Name** \[Type = UnicodeString\]: the name of the rule which was added. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4946(S): A change has been made to Windows Firewall exception list. A rule was added.
+
+- This event can be helpful in case you want to monitor all creations of new Firewall rules which were done locally.
+
diff --git a/windows/keep-secure/event-4947.md b/windows/keep-secure/event-4947.md
new file mode 100644
index 0000000000..f3381e95ba
--- /dev/null
+++ b/windows/keep-secure/event-4947.md
@@ -0,0 +1,101 @@
+---
+title: 4947(S) A change has been made to Windows Firewall exception list. A rule was modified. (Windows 10)
+description: Describes security event 4947(S) A change has been made to Windows Firewall exception list. A rule was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4947(S): A change has been made to Windows Firewall exception list. A rule was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall rule was modified.
+
+This event doesn't generate when Firewall rule was modified via Group Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4947
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050908
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ All
+ {F2649D59-1355-4E3C-B886-CDD08B683199}
+ Allow All Rule
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile Changed** \[Type = UnicodeString\]**:** the list of profiles to which changed rule is applied. Examples:
+
+- All
+
+- Domain,Public
+
+- Domain,Private
+
+- Private,Public
+
+- Public
+
+- Domain
+
+- Private
+
+**Modified Rule:**
+
+- **Rule ID** \[Type = UnicodeString\]: the unique identifier for modified firewall rule.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Rule Name** \[Type = UnicodeString\]: the name of the rule which was modified. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4947(S): A change has been made to Windows Firewall exception list. A rule was modified.
+
+- This event can be helpful in case you want to monitor all Firewall rules modifications which were done locally.
+
diff --git a/windows/keep-secure/event-4948.md b/windows/keep-secure/event-4948.md
new file mode 100644
index 0000000000..034b9e1149
--- /dev/null
+++ b/windows/keep-secure/event-4948.md
@@ -0,0 +1,101 @@
+---
+title: 4948(S) A change has been made to Windows Firewall exception list. A rule was deleted. (Windows 10)
+description: Describes security event 4948(S) A change has been made to Windows Firewall exception list. A rule was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4948(S): A change has been made to Windows Firewall exception list. A rule was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall rule was deleted.
+
+This event doesn't generate when the rule was deleted via Group Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4948
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050934
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ All
+ {F2649D59-1355-4E3C-B886-CDD08B683199}
+ Allow All Rule
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile Changed** \[Type = UnicodeString\]**:** the list of profiles to which deleted rule was applied. Examples:
+
+- All
+
+- Domain,Public
+
+- Domain,Private
+
+- Private,Public
+
+- Public
+
+- Domain
+
+- Private
+
+**Deleted Rule:**
+
+- **Rule ID** \[Type = UnicodeString\]: the unique identifier for deleted firewall rule.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Rule Name** \[Type = UnicodeString\]: the name of the rule which was deleted. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4948(S): A change has been made to Windows Firewall exception list. A rule was deleted.
+
+- This event can be helpful in case you want to monitor all deletions of Firewall rules which were done locally.
+
diff --git a/windows/keep-secure/event-4949.md b/windows/keep-secure/event-4949.md
new file mode 100644
index 0000000000..2441529ec2
--- /dev/null
+++ b/windows/keep-secure/event-4949.md
@@ -0,0 +1,67 @@
+---
+title: 4949(S) Windows Firewall settings were restored to the default values. (Windows 10)
+description: Describes security event 4949(S) Windows Firewall settings were restored to the default values.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4949(S): Windows Firewall settings were restored to the default values.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall settings were locally restored to the default configuration.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4949
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1049926
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4949(S): Windows Firewall settings were restored to the default values.
+
+- You shouldn’t see this event during normal Windows Firewall operations, because it should be intentionally done by user or software. This event should be always monitored and an alert should be triggered, especially on critical computers or devices.
+
+- This event can be helpful in case you want to monitor all changes of Firewall rules which were done locally, especially restores to default configuration.
+
diff --git a/windows/keep-secure/event-4950.md b/windows/keep-secure/event-4950.md
new file mode 100644
index 0000000000..69a46b6925
--- /dev/null
+++ b/windows/keep-secure/event-4950.md
@@ -0,0 +1,91 @@
+---
+title: 4950(S) A Windows Firewall setting has changed. (Windows 10)
+description: Describes security event 4950(S) A Windows Firewall setting has changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4950(S): A Windows Firewall setting has changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall local setting was changed.
+
+This event doesn't generate when Windows Firewall setting was changed via Group Policy.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4950
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050944
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Domain
+ Default Outbound Action
+ Block
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Changed Profile** \[Type = UnicodeString\]**:** the name of profile in which setting was changed. Possible values are:
+
+- Public
+
+- Domain
+
+- Private
+
+**New Setting:**
+
+- **Type** \[Type = UnicodeString\]: the name of the setting which was modified. You can use “**netsh advfirewall**” command to see or set Windows Firewall settings, for example, to see settings for current\\active Windows Firewall profile you need to execute “**netsh advfirewall show currentprofile**” command:
+
+
+
+- **Value** \[Type = UnicodeString\]: new value of modified setting.
+
+## Security Monitoring Recommendations
+
+For 4950(S): A Windows Firewall setting has changed.
+
+- If you have a standard or baseline for Windows Firewall settings defined, monitor this event and check whether the settings reported by the event are still the same as were defined in your standard or baseline.
+
+- This event can be helpful in case you want to monitor all changes in Windows Firewall settings which were done locally.
+
diff --git a/windows/keep-secure/event-4951.md b/windows/keep-secure/event-4951.md
new file mode 100644
index 0000000000..1878549111
--- /dev/null
+++ b/windows/keep-secure/event-4951.md
@@ -0,0 +1,103 @@
+---
+title: 4951(F) A rule has been ignored because its major version number was not recognized by Windows Firewall. (Windows 10)
+description: Describes security event 4951(F) A rule has been ignored because its major version number was not recognized by Windows Firewall.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4951(F): A rule has been ignored because its major version number was not recognized by Windows Firewall.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+When you create or edit a Windows Firewall rule, the settings that you can include depend upon the version of Windows you use when creating the rule. As new settings are added to later versions of Windows or to service packs for existing versions of Windows, the version number of the rules processing engine is updated, and that version number is stamped into rules that are created by using that version of Windows. For example, Windows Vista produces firewall rules that are stamped with version "v2.0". Future versions of Windows might use "v2.1", or "v3.0" to indicate, respectively, minor or major changes and additions.
+
+If you create a firewall rule on a newer version of Windows that references firewall settings that are not available on earlier versions of Windows, and then try to deploy that rule to computers running the earlier version of Windows, the firewall engine produces this error to indicate that it cannot process the rule.
+
+The only solution is to remove the incompatible rule, and then deploy a compatible rule.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4951
+ 0
+ 0
+ 13571
+ 0
+ 0x8010000000000000
+
+ 1052309
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ All
+ {08CBB349-D158-46BE-81E1-2ABC59BDD523}
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile** \[Type = UnicodeString\]**:** the name of the profile of the ignored rule. Possible values are:
+
+- All
+
+- Domain,Public
+
+- Domain,Private
+
+- Private,Public
+
+- Public
+
+- Domain
+
+- Private
+
+**Ignored Rule:**
+
+- **ID** \[Type = UnicodeString\]: the unique identifier for ignored firewall rule.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Name** \[Type = UnicodeString\]: the name of the rule which was ignored. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4951(F): A rule has been ignored because its major version number was not recognized by Windows Firewall.
+
+- This event can be a sign of software issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-4952.md b/windows/keep-secure/event-4952.md
new file mode 100644
index 0000000000..496d4e324e
--- /dev/null
+++ b/windows/keep-secure/event-4952.md
@@ -0,0 +1,51 @@
+---
+title: 4952(F) Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. (Windows 10)
+description: Describes security event 4952(F) Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4952(F): Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+When you create or edit a Windows Firewall rule, the settings that you can include depend upon the version of Windows you use when creating the rule. As new settings are added to later versions of Windows or to service packs for existing versions of Windows, the version number of the rules processing engine is updated, and that version number is stamped into rules that are created by using that version of Windows. For example, Windows Vista produces firewall rules that are stamped with version "v2.0". Future versions of Windows might use "v2.1", or "v3.0" to indicate, respectively, minor or major changes and additions.
+
+If you create a firewall rule on a newer version of Windows that references firewall settings that are not available on earlier versions of Windows, and then try to deploy that rule to computers running the earlier version of Windows, the firewall engine produces this error to indicate that it cannot process the rule.
+
+The only solution is to remove the incompatible rule, and then deploy a compatible rule.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Schema:***
+
+*Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.*
+
+*%t*
+
+*Profile:%t%1*
+
+*Partially Ignored Rule:*
+
+*%tID:%t%2*
+
+*%tName:%t%3*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-4953.md b/windows/keep-secure/event-4953.md
new file mode 100644
index 0000000000..ba5cea430d
--- /dev/null
+++ b/windows/keep-secure/event-4953.md
@@ -0,0 +1,104 @@
+---
+title: 4953(F) Windows Firewall ignored a rule because it could not be parsed. (Windows 10)
+description: Describes security event 4953(F) Windows Firewall ignored a rule because it could not be parsed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4953(F): Windows Firewall ignored a rule because it could not be parsed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates if Windows Firewall was not able to parse Windows Firewall rule for some reason.
+
+It can happen if Windows Firewall rule registry entry was corrupted.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4953
+ 0
+ 0
+ 13571
+ 0
+ 0x8010000000000000
+
+ 1052340
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ All
+ An error occurred.
+ {08CBB349-D158-46BE-81E1-2ABC59BDD523}
+ -
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Profile** \[Type = UnicodeString\]**:** the name of the profile of the ignored rule. Possible values are:
+
+- All
+
+- Domain,Public
+
+- Domain,Private
+
+- Private,Public
+
+- Public
+
+- Domain
+
+- Private
+
+**Reason for Rejection** \[Type = UnicodeString\]**:** the reason, why the rule was ignored.
+
+**Rule:**
+
+- **ID** \[Type = UnicodeString\]: the unique identifier for ignored firewall rule.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Name** \[Type = UnicodeString\]: the name of the rule which was ignored. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+## Security Monitoring Recommendations
+
+For 4953(F): Windows Firewall ignored a rule because it could not be parsed.
+
+- This event can be a sign of software issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-4954.md b/windows/keep-secure/event-4954.md
new file mode 100644
index 0000000000..fcf80a82d3
--- /dev/null
+++ b/windows/keep-secure/event-4954.md
@@ -0,0 +1,67 @@
+---
+title: 4954(S) Windows Firewall Group Policy settings have changed. The new settings have been applied. (Windows 10)
+description: Describes security event 4954(S) Windows Firewall Group Policy settings have changed. The new settings have been applied.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4954(S): Windows Firewall Group Policy settings have changed. The new settings have been applied.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates every time Windows Firewall group policy is changed, locally or from Active Directory Group Policy.
+
+This event generates every time local Group Policy is refreshed, even if no Windows Firewall settings were modified or presented.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4954
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1049893
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 4954(S): Windows Firewall Group Policy settings have changed. The new settings have been applied.
+
+- Unfortunately this event generates every time local Group Policy is refreshed and does not indicate that settings really were modified. Typically this event can be ignored.
+
diff --git a/windows/keep-secure/event-4956.md b/windows/keep-secure/event-4956.md
new file mode 100644
index 0000000000..4d3c688ed7
--- /dev/null
+++ b/windows/keep-secure/event-4956.md
@@ -0,0 +1,79 @@
+---
+title: 4956(S) Windows Firewall has changed the active profile. (Windows 10)
+description: Describes security event 4956(S) Windows Firewall has changed the active profile.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4956(S): Windows Firewall has changed the active profile.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall has changed the active profile.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4956
+ 0
+ 0
+ 13571
+ 0
+ 0x8020000000000000
+
+ 1050811
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Domain
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**New Active Profile** \[Type = UnicodeString\]**:** the name of the new active profile. Possible values are:
+
+- Domain
+
+- Public
+
+- Private
+
+## Security Monitoring Recommendations
+
+For 4956(S): Windows Firewall has changed the active profile.
+
+- Typically this event has an informational purpose.
+
+- For domain joined machines you could monitor for all events where **New Active Profile** doesn’t equal **“Domain”**. This indicates that the computer was connected to another non-domain network.
+
diff --git a/windows/keep-secure/event-4957.md b/windows/keep-secure/event-4957.md
new file mode 100644
index 0000000000..dcd32e2689
--- /dev/null
+++ b/windows/keep-secure/event-4957.md
@@ -0,0 +1,87 @@
+---
+title: 4957(F) Windows Firewall did not apply the following rule. (Windows 10)
+description: Describes security event 4957(F) Windows Firewall did not apply the following rule.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4957(F): Windows Firewall did not apply the following rule.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall starts or apply new rule, and the rule cannot be applied for some reason.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4957
+ 0
+ 0
+ 13571
+ 0
+ 0x8010000000000000
+
+ 1049892
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ CoreNet-Teredo-In
+ Core Networking - Teredo (UDP-In)
+ Local Port
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Rule Information:**
+
+- **ID** \[Type = UnicodeString\]: the unique identifier for not applied firewall rule.
+
+ To see the unique ID of the rule you need to navigate to “**HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules”** registry key and you will see the list of Windows Firewall rule IDs (Name column) with parameters:
+
+
+
+- **Name** \[Type = UnicodeString\]: the name of the rule which was not applied. You can see the name of Windows Firewall rule using Windows Firewall with Advanced Security management console (**wf.msc**), check “Name” column:
+
+
+
+**Error Information:**
+
+- **Reason** \[Type = UnicodeString\]: the reason why the rule was not applied.
+
+## Security Monitoring Recommendations
+
+For 4957(F): Windows Firewall did not apply the following rule.
+
+- This event can be a sign of software issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-4958.md b/windows/keep-secure/event-4958.md
new file mode 100644
index 0000000000..7ef6e67cbe
--- /dev/null
+++ b/windows/keep-secure/event-4958.md
@@ -0,0 +1,43 @@
+---
+title: 4958(F) Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer. (Windows 10)
+description: Describes security event 4958(F) Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4958(F): Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows Firewall with Advanced Security processed a rule that contains parameters that cannot be resolved on the local computer. The rule is therefore not enforceable on the computer and so is excluded from the runtime state of the firewall. This is not necessarily an error. Examine the rule for applicability on the computers to which it was applied.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit MPSSVC Rule-Level Policy Change](audit-mpssvc-rule-level-policy-change.md)
+
+***Event Schema:***
+
+*Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:
+Rule Information:
+%tID:%t%1
+%tName:%t%2
+Error Information:
+%tError:%t%3
+%tReason:%t%4*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-4964.md b/windows/keep-secure/event-4964.md
new file mode 100644
index 0000000000..8584a902c5
--- /dev/null
+++ b/windows/keep-secure/event-4964.md
@@ -0,0 +1,159 @@
+---
+title: 4964(S) Special groups have been assigned to a new logon. (Windows 10)
+description: Describes security event 4964(S) Special groups have been assigned to a new logon.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4964(S): Special groups have been assigned to a new logon.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Special Logon](audit-special-logon.md)
+
+***Event Description:***
+
+This event occurs when an account that is a member of any defined [Special Group](http://blogs.technet.com/b/askds/archive/2008/03/11/special-groups-auditing-via-group-policy-preferences.aspx) logs in.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4964
+ 0
+ 0
+ 12548
+ 0
+ 0x8020000000000000
+
+ 238923
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0xd972e
+ {00000000-0000-0000-0000-000000000000}
+ S-1-5-21-3457937927-2839227994-823803824-500
+ ladmin
+ CONTOSO
+ 0x139faf
+ {B03B6192-09AE-E77F-DD10-2DC430766040}
+ %{S-1-5-21-3457937927-2839227994-823803824-512}
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+> **Note** Special Groups is a new feature in Windows Vista and in Windows Server 2008. The Special Groups feature lets the administrator find out when a member of a certain group logs on to the computer. The Special Groups feature lets an administrator set a list of group security identifiers (SIDs) in the registry.
+
+> To add Special Groups perform the following actions:
+
+> 1. Open Registry Editor.
+
+> 2. Locate and then click the following registry subkey: HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\Audit
+
+> 3. On the Edit menu, point to New, and then click String Value.
+
+> 4. Type SpecialGroups, and then press ENTER.
+
+> 5. Right-click SpecialGroups, and then click Modify.
+
+> 6. In the Value date box, type the group SIDs, and then click OK.
+
+> A semicolon character (;) can be used to delimit the SID list. For example, you can use the following string that contains a semicolon to delimit two SIDs:
+
+> S-1-5-32-544;S-1-5-32-123-54-65
+
+> For more information see:
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested logon for **New Logon** account. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested logon for **New Logon** account.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event with another event that can contain the same **Logon GUID**, “[4769](event-4769.md)(S, F): A Kerberos service ticket was requested event on a domain controller.
+
+ It also can be used for correlation between a 4964 event and several other events (on the same computer) that can contain the same **Logon GUID**, “[4648](event-4648.md)(S): A logon was attempted using explicit credentials” and “[4624](event-4624.md)(S): An account was successfully logged on.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+**New Logon:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the logon. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the logon.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+- **Logon GUID** \[Type = GUID\]: a GUID that can help you correlate this event with another event that can contain the same **Logon GUID**, “[4769](event-4769.md)(S, F): A Kerberos service ticket was requested event on a domain controller.
+
+ It also can be used for correlation between a 4964 event and several other events (on the same computer) that can contain the same **Logon GUID**, “[4648](event-4648.md)(S): A logon was attempted using explicit credentials” and “[4624](event-4624.md)(S): An account was successfully logged on.”
+
+ This parameter might not be captured in the event, and in that case appears as “{00000000-0000-0000-0000-000000000000}”.
+
+- **Special Groups Assigned** \[Type = UnicodeString\]: the list of special group SIDs, which **New Logon\\Security ID** is a member of.
+
+## Security Monitoring Recommendations
+
+For 4964(S): Special groups have been assigned to a new logon.
+
+- Generally speaking, every [4964](event-4964.md) event should be monitored, because the purpose of Special Groups is to define a list of critical or important groups (Domain Admins, Enterprise Admins, service account groups, and so on) and trigger an event every time a member of these groups logs on to a computer. For example, you can monitor for every Domain Administrators logon to a non-administrative workstation.
+
diff --git a/windows/keep-secure/event-4985.md b/windows/keep-secure/event-4985.md
new file mode 100644
index 0000000000..2044f942d0
--- /dev/null
+++ b/windows/keep-secure/event-4985.md
@@ -0,0 +1,121 @@
+---
+title: 4985(S) The state of a transaction has changed. (Windows 10)
+description: Describes security event 4985(S) The state of a transaction has changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 4985(S): The state of a transaction has changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategories:*** [Audit File System](audit-file-system.md), [Audit Non Sensitive Privilege Use](audit-non-sensitive-privilege-use.md), [Audit Other Privilege Use Events](audit-other-privilege-use-events.md), and [Audit Sensitive Privilege Use](audit-sensitive-privilege-use.md)
+
+***Event Description:***
+
+This is an informational event from file system [Transaction Manager](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366385(v=vs.85).aspx).
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 4985
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+ 274277
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-18
+ DC01$
+ CONTOSO
+ 0x3e7
+ {17EF5E21-5E2C-11E5-810F-00155D987005}
+ 52
+ {5F5ED427-FCCA-11E3-BD73-B54AB417B853}
+ 0x370
+ C:\\Windows\\System32\\svchost.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account through which the state of the transaction was changed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that changed the state of the transaction.
+
+- **Account Domain** \[Type = UnicodeString\]**:** domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Transaction Information:**
+
+- **RM Transaction ID** \[Type = GUID\]: unique GUID of the [transaction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366402(v=vs.85).aspx). This field can help you correlate this event with other events that might contain the same **Transaction ID**, such as “[4656](event-4656.md)(S, F): A handle to an object was requested.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **New State** \[Type = UInt32\]**:** identifier of the new state of the [transaction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366402(v=vs.85).aspx).
+
+- **Resource Manager** \[Type = GUID\]**:** unique GUID-Identifier of the [Resource Manager](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366356(v=vs.85).aspx) which associated with this [transaction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366402(v=vs.85).aspx).
+
+**Process Information:**
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process through which the state of the transaction was changed. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+## Security Monitoring Recommendations
+
+For 4985(S): The state of a transaction has changed.
+
+- This event typically has no security relevance and used for [Transaction Manager](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366385(v=vs.85).aspx) troubleshooting.
+
diff --git a/windows/keep-secure/event-5024.md b/windows/keep-secure/event-5024.md
new file mode 100644
index 0000000000..372ee3b767
--- /dev/null
+++ b/windows/keep-secure/event-5024.md
@@ -0,0 +1,69 @@
+---
+title: 5024(S) The Windows Firewall Service has started successfully. (Windows 10)
+description: Describes security event 5024(S) The Windows Firewall Service has started successfully.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5024(S): The Windows Firewall Service has started successfully.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall (MpsSvc) service has started successfully.
+
+This event is typically logged during operating system startup process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5024
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1101613
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 5024(S): The Windows Firewall Service has started successfully.
+
+- Typically this event has an informational purpose. It’s logged during operating system startup process.
+
+- You should not see this event after system startup, so we recommend that you monitor it when it occurs outside the system startup process.
+
diff --git a/windows/keep-secure/event-5025.md b/windows/keep-secure/event-5025.md
new file mode 100644
index 0000000000..1a83b5eefc
--- /dev/null
+++ b/windows/keep-secure/event-5025.md
@@ -0,0 +1,69 @@
+---
+title: 5025(S) The Windows Firewall Service has been stopped. (Windows 10)
+description: Describes security event 5025(S) The Windows Firewall Service has been stopped.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5025(S): The Windows Firewall Service has been stopped.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall (MpsSvc) service has been stopped.
+
+This event is typically logged during operating system shutdown process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5025
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1101606
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 5025(S): The Windows Firewall Service has been stopped.
+
+- Typically this event has an informational purpose. It’s logged during operating system shutdown process.
+
+- You should not see this event after system startup, so we recommend that you monitor it when it occurs outside the system startup process.
+
diff --git a/windows/keep-secure/event-5027.md b/windows/keep-secure/event-5027.md
new file mode 100644
index 0000000000..f13f6495e7
--- /dev/null
+++ b/windows/keep-secure/event-5027.md
@@ -0,0 +1,75 @@
+---
+title: 5027(F) The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. (Windows 10)
+description: Describes security event 5027(F) The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5027(F): The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This error indicates one of two situations, low memory resources or Windows Firewall group policy registry corruption.
+
+Typically if this event occurs it indicates that Windows Firewall service was not able to start.
+
+It typically occurs with “[5028](event-5028.md)(S): The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.”
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5027
+ 0
+ 0
+ 12292
+ 0
+ 0x8010000000000000
+
+ 1101848
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 2147942413
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Error Code** \[Type = UInt32\]**:** unique error code. For information about error codes meanings for this event use or other informational resources.
+
+## Security Monitoring Recommendations
+
+For 5027(F): The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.
+
+- This event can be a sign of software or operating system issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-5028.md b/windows/keep-secure/event-5028.md
new file mode 100644
index 0000000000..928ccdc1ce
--- /dev/null
+++ b/windows/keep-secure/event-5028.md
@@ -0,0 +1,75 @@
+---
+title: 5028(F) The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. (Windows 10)
+description: Describes security event 5028(F) The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5028(F): The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This error indicates one of two situations, low memory resources or Windows Firewall group policy registry corruption.
+
+Typically if this event occurs it indicates that Windows Firewall service was not able to start.
+
+It typically occurs with “[5027](event-5027.md)(S): The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.”
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5028
+ 0
+ 0
+ 12292
+ 0
+ 0x8010000000000000
+
+ 1101849
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 2147942413
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Error Code** \[Type = UInt32\]**:** unique error code. For information about error codes meanings for this event use or other informational resources.
+
+## Security Monitoring Recommendations
+
+For 5028(F): The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.
+
+- This event can be a sign of software or operating system issues, Windows Firewall registry errors or corruption, or Group Policy setting misconfigurations. We recommend monitoring this event and investigating the reason for the condition. Typically this event indicates configuration issues, not security issues.
+
diff --git a/windows/keep-secure/event-5029.md b/windows/keep-secure/event-5029.md
new file mode 100644
index 0000000000..152bc5dff1
--- /dev/null
+++ b/windows/keep-secure/event-5029.md
@@ -0,0 +1,39 @@
+---
+title: 5029(F) The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. (Windows 10)
+description: Describes security event 5029(F) The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5029(F): The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows logs an error if either the Windows Firewall service or its driver fails to start, or if they unexpectedly terminate. The error message indicates the cause of the service failure by including an error code in the text of the message.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*The Windows Firewall service failed to initialize the driver. Windows Firewall will continue to enforce the current policy.*
+
+*Error Code:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software or operating system issues, or a sign of malicious activity that corrupted Windows Firewall Driver. We recommend monitoring this event and investigating the reason for the condition.
+
diff --git a/windows/keep-secure/event-5030.md b/windows/keep-secure/event-5030.md
new file mode 100644
index 0000000000..3278d73871
--- /dev/null
+++ b/windows/keep-secure/event-5030.md
@@ -0,0 +1,41 @@
+---
+title: 5030(F) The Windows Firewall Service failed to start. (Windows 10)
+description: Describes security event 5030(F) The Windows Firewall Service failed to start.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5030(F): The Windows Firewall Service failed to start.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows logs this event if the Windows Firewall service fails to start, or if it unexpectedly terminates. The error message indicates the cause of the service failure by including an error code in the text of the message.
+
+This event doesn't generate during Windows Firewall service failures if Windows Firewall policy is incorrect\\corrupted or one of the service dependencies was not started.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*The Windows Firewall service failed to start.*
+
+*Error Code:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software or operating system issues, or a sign of malicious activity that corrupted Windows Firewall Driver. We recommend monitoring this event and investigating the reason for the condition.
+
diff --git a/windows/keep-secure/event-5031.md b/windows/keep-secure/event-5031.md
new file mode 100644
index 0000000000..436e60fe7b
--- /dev/null
+++ b/windows/keep-secure/event-5031.md
@@ -0,0 +1,88 @@
+---
+title: 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. (Windows 10)
+description: Describes security event 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Description:***
+
+This event generates when an application was blocked from accepting incoming connections on the network by [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx).
+
+If you don’t have any firewall rules (Allow or Deny) in Windows Firewall for specific applications, you will get this event from [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) layer, because by default this layer is denying any incoming connections.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5031
+ 0
+ 0
+ 12810
+ 0
+ 0x8010000000000000
+
+ 304373
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Domain
+ C:\\documents\\listener.exe
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+- **Profiles** \[Type = UnicodeString\]: network profile using which application was blocked. Possible values:
+
+ - Domain
+
+ - Public
+
+ - Private
+
+- **Application** \[Type = UnicodeString\]: full path and file name of executable file for blocked application.
+
+## Security Monitoring Recommendations
+
+For 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network.
+
+- You can use this event to detect applications for which no Windows Firewall rules were created.
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
diff --git a/windows/keep-secure/event-5032.md b/windows/keep-secure/event-5032.md
new file mode 100644
index 0000000000..2ba6a05fa2
--- /dev/null
+++ b/windows/keep-secure/event-5032.md
@@ -0,0 +1,41 @@
+---
+title: 5032(F) Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. (Windows 10)
+description: Describes security event 5032(F) Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5032(F): Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows Firewall with Advanced Security can be configured to notify the user when an application is blocked by the firewall, and ask if the application should continue to be blocked in the future.
+
+This event generates if Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.*
+
+*Error Code:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5033.md b/windows/keep-secure/event-5033.md
new file mode 100644
index 0000000000..5efe78bfdf
--- /dev/null
+++ b/windows/keep-secure/event-5033.md
@@ -0,0 +1,69 @@
+---
+title: 5033(S) The Windows Firewall Driver has started successfully. (Windows 10)
+description: Describes security event 5033(S) The Windows Firewall Driver has started successfully.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5033(S): The Windows Firewall Driver has started successfully.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall driver (Windows Firewall Authorization Driver service) has started successfully.
+
+This event is typically logged during operating system startup process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5033
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1101612
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 5033(S): The Windows Firewall Driver has started successfully.
+
+- Typically this event has an informational purpose. It’s logged during operating system startup process.
+
+- You should not see this event after system startup, so we recommend that you monitor it when it occurs outside the system startup process.
+
diff --git a/windows/keep-secure/event-5034.md b/windows/keep-secure/event-5034.md
new file mode 100644
index 0000000000..30dafbfd3c
--- /dev/null
+++ b/windows/keep-secure/event-5034.md
@@ -0,0 +1,69 @@
+---
+title: 5034(S) The Windows Firewall Driver was stopped. (Windows 10)
+description: Describes security event 5034(S) The Windows Firewall Driver was stopped.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5034(S): The Windows Firewall Driver was stopped.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when Windows Firewall driver (Windows Firewall Authorization Driver service) was stopped.
+
+This event is NOT logged during the operating system shutdown process.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5034
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1101856
+
+
+ Security
+ DC01.contoso.local
+
+
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 5034(S): The Windows Firewall Driver was stopped.
+
+- This event is NOT logged during the operating system shutdown process.
+
+- You should not see this event during normal operating system operations, so we recommend that when it occurs, you investigate why the Windows Firewall driver was stopped.
+
diff --git a/windows/keep-secure/event-5035.md b/windows/keep-secure/event-5035.md
new file mode 100644
index 0000000000..a5add18971
--- /dev/null
+++ b/windows/keep-secure/event-5035.md
@@ -0,0 +1,39 @@
+---
+title: 5035(F) The Windows Firewall Driver failed to start. (Windows 10)
+description: Describes security event 5035(F) The Windows Firewall Driver failed to start.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5035(F): The Windows Firewall Driver failed to start.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows logs this event if Windows Firewall driver fails to start, or if it unexpectedly terminates. The error message indicates the cause of the failure by including an error code in the text of the message.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*The Windows Firewall Driver failed to start.*
+
+*Error Code:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software or operating system issues, or a sign of malicious activity that corrupted Windows Firewall Driver. We recommend monitoring this event and investigating the reason for the condition.
+
diff --git a/windows/keep-secure/event-5037.md b/windows/keep-secure/event-5037.md
new file mode 100644
index 0000000000..56d93b8dc5
--- /dev/null
+++ b/windows/keep-secure/event-5037.md
@@ -0,0 +1,39 @@
+---
+title: 5037(F) The Windows Firewall Driver detected critical runtime error. Terminating. (Windows 10)
+description: Describes security event 5037(F) The Windows Firewall Driver detected critical runtime error. Terminating.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5037(F): The Windows Firewall Driver detected critical runtime error. Terminating.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Windows logs this event if Windows Firewall driver fails to start, or if it unexpectedly terminates. The error message indicates the cause of the failure by including an error code in the text of the message.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*The Windows Firewall Driver detected a critical runtime error, terminating.*
+
+*Error Code:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of software or operating system issues, or a sign of malicious activity that corrupted Windows Firewall Driver. We recommend monitoring this event and investigating the reason for the condition.
+
diff --git a/windows/keep-secure/event-5038.md b/windows/keep-secure/event-5038.md
new file mode 100644
index 0000000000..800c1a5ffe
--- /dev/null
+++ b/windows/keep-secure/event-5038.md
@@ -0,0 +1,37 @@
+---
+title: 5038(F) Code integrity determined that the image hash of a file is not valid. (Windows 10)
+description: Describes security event 5038(F) Code integrity determined that the image hash of a file is not valid.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5038(F): Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.
+
+This event generates by [Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) feature, if signature of a file is not valid.
+
+Code Integrity is a feature that improves the security of the operating system by validating the integrity of a driver or system file each time it is loaded into memory. Code Integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrative permissions. On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.*
+
+*File Name: %filepath\\filename%*
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
diff --git a/windows/keep-secure/event-5039.md b/windows/keep-secure/event-5039.md
new file mode 100644
index 0000000000..64a191a4b1
--- /dev/null
+++ b/windows/keep-secure/event-5039.md
@@ -0,0 +1,63 @@
+---
+title: 5039(-) A registry key was virtualized. (Windows 10)
+description: Describes security event 5039(-) A registry key was virtualized.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5039(-): A registry key was virtualized.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event should be generated when registry key was virtualized using [LUAFV](http://blogs.msdn.com/b/alexcarp/archive/2009/06/25/the-deal-with-luafv-sys.aspx).
+
+This event occurs very rarely during during standard LUAFV registry key virtualization.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Registry](audit-registry.md)
+
+***Event Schema:***
+
+*A registry key was virtualized.*
+
+*Subject:*
+
+> *Security ID:%1%*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Object:*
+
+> *Key Name:%5*
+>
+> *Virtual Key Name:%6*
+
+*Process Information:*
+
+> *Process ID:%7*
+>
+> *Process Name%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
+
+
diff --git a/windows/keep-secure/event-5051.md b/windows/keep-secure/event-5051.md
new file mode 100644
index 0000000000..80d018b51a
--- /dev/null
+++ b/windows/keep-secure/event-5051.md
@@ -0,0 +1,61 @@
+---
+title: 5051(-) A file was virtualized. (Windows 10)
+description: Describes security event 5051(-) A file was virtualized.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5051(-): A file was virtualized.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event should be generated when file was virtualized using [LUAFV](http://blogs.msdn.com/b/alexcarp/archive/2009/06/25/the-deal-with-luafv-sys.aspx).
+
+This event occurs very rarely during standard LUAFV file virtualization.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit File System](audit-file-system.md)
+
+***Event Schema:***
+
+*A file was virtualized.*
+
+*Subject:*
+
+> *Security ID:%1%*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Object:*
+
+> *File Name:%5*
+>
+> *Virtual File Name:%6*
+
+*Process Information:*
+
+> *Process ID:%7*
+>
+> *Process Name%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5056.md b/windows/keep-secure/event-5056.md
new file mode 100644
index 0000000000..da2580539a
--- /dev/null
+++ b/windows/keep-secure/event-5056.md
@@ -0,0 +1,63 @@
+---
+title: 5056(S) A cryptographic self-test was performed. (Windows 10)
+description: Describes security event 5056(S) A cryptographic self-test was performed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5056(S): A cryptographic self-test was performed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in CNG Self-Test function. This is a Cryptographic Next Generation (CNG) function.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*A cryptographic self test was performed.*
+
+*Subject:*
+
+> *Security ID%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Module:%5*
+
+*Return Code:%6*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related actions with cryptographic keys. If you need to monitor or troubleshoot actions related to specific cryptographic keys and operations, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5057.md b/windows/keep-secure/event-5057.md
new file mode 100644
index 0000000000..d3f29539c1
--- /dev/null
+++ b/windows/keep-secure/event-5057.md
@@ -0,0 +1,71 @@
+---
+title: 5057(F) A cryptographic primitive operation failed. (Windows 10)
+description: Describes security event 5057(F) A cryptographic primitive operation failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5057(F): A cryptographic primitive operation failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in case of CNG primitive operation failure.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*A cryptographic primitive operation failed.*
+
+*Subject:*
+
+> *Security ID%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Cryptographic Parameters:*
+
+> *Provider Name:%5*
+>
+> *Algorithm Name%6*
+
+*Failure Information:*
+
+> *Reason:%7*
+>
+> *Return Code:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related actions with cryptographic keys. If you need to monitor or troubleshoot actions related to specific cryptographic keys and operations, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5058.md b/windows/keep-secure/event-5058.md
new file mode 100644
index 0000000000..b7fb73f686
--- /dev/null
+++ b/windows/keep-secure/event-5058.md
@@ -0,0 +1,161 @@
+---
+title: 5058(S, F) Key file operation. (Windows 10)
+description: Describes security event 5058(S, F) Key file operation.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5058(S, F): Key file operation.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when an operation (read, write, delete, and so on) was performed on a file that contains a KSP key by using a [Key Storage Provider](https://msdn.microsoft.com/en-us/library/windows/desktop/bb931355(v=vs.85).aspx) (KSP). This event generates only if one of the following KSPs were used:
+
+- Microsoft Software Key Storage Provider
+
+- Microsoft Smart Card Key Storage Provider
+
+You can see these events, for example, during certificate renewal or export operations using KSP.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5058
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1048275
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38e2d
+ Microsoft Software Key Storage Provider
+ ECDH\_P521
+ le-SuperAdmin-5e350d8e-ae46-458c-bac0-d8f3279c944e
+ %%2500
+ C:\\Users\\dadmin\\AppData\\Roaming\\Microsoft\\Crypto\\Keys\\c0a496c6786f0d25e8624fee96e4e580\_7a1bf91d-ebdd-449c-825d-c97f2f47cd01
+ %%2459
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested key file operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested key file operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Cryptographic Parameters:**
+
+- **Provider Name** \[Type = UnicodeString\]**:** the name of KSP through which the operation was performed. Can have one of the following values:
+
+ - Microsoft Software Key Storage Provider
+
+ - Microsoft Smart Card Key Storage Provider
+
+- **Algorithm Name** \[Type = UnicodeString\]: the name of cryptographic algorithm through which the key was used or accessed. For “Read persisted key from file” operation, this typically has “**UNKNOWN**” value. Can also have one of the following values:
+
+ - RSA – algorithm created by Ron Rivest, Adi Shamir, and Leonard Adleman.
+
+ - DSA – Digital Signature Algorithm.
+
+ - DH – Diffie-Hellman.
+
+ - ECDH\_P521 – Elliptic Curve Diffie-Hellman algorithm with 512-bit key length.
+
+ - ECDH\_P384 – Elliptic Curve Diffie-Hellman algorithm with 384-bit key length.
+
+ - ECDH\_P256 – Elliptic Curve Diffie-Hellman algorithm with 256-bit key length.
+
+ - ECDSA\_P256 – Elliptic Curve Digital Signature Algorithm with 256-bit key length.
+
+ - ECDSA\_P384 – Elliptic Curve Digital Signature Algorithm with 384-bit key length.
+
+ - ECDSA\_P521 – Elliptic Curve Digital Signature Algorithm with 521-bit key length.
+
+- **Key Name** \[Type = UnicodeString\]: the name of the key (key container) with which operation was performed. For example, to get the list of **Key Names** for certificates for logged in user you can use “**certutil -store -user my**” command and check **Key Container** parameter in the output. Here is an output example:
+
+
+
+- **Key Type** \[Type = UnicodeString\]: can have one of the following values:
+
+ - “User key.” – user’s cryptographic key.
+
+ - “Machine key.” – machine’s cryptographic key.
+
+**Key File Operation Information:**
+
+- **File Path** \[Type = UnicodeString\]: full path and filename of the key file on which the operation was performed.
+
+- **Operation** \[Type = UnicodeString\]: performed operation. Examples:
+
+ - Write persisted key to file.
+
+ - Read persisted key from file.
+
+ - Delete key file.
+
+- **Return Code** \[Type = HexInt32\]: has “**0x0**” value for Success events. For failure events, provides a hexadecimal error code number.
+
+## Security Monitoring Recommendations
+
+For 5058(S, F): Key file operation.
+
+- Typically this event is required for detailed monitoring of KSP-related actions with cryptographic keys. If you need to monitor actions related to specific cryptographic keys (**“Key Name”**) or a specific **“Operation”**, such as **“Delete key file”**, create monitoring rules and use this event as an information source.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
diff --git a/windows/keep-secure/event-5059.md b/windows/keep-secure/event-5059.md
new file mode 100644
index 0000000000..1e5424b033
--- /dev/null
+++ b/windows/keep-secure/event-5059.md
@@ -0,0 +1,156 @@
+---
+title: 5059(S, F) Key migration operation. (Windows 10)
+description: Describes security event 5059(S, F) Key migration operation.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5059(S, F): Key migration operation.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Description:***
+
+This event generates when a cryptographic key is exported or imported using a [Key Storage Provider](https://msdn.microsoft.com/en-us/library/windows/desktop/bb931355(v=vs.85).aspx) (KSP). This event generates only if one of the following KSPs were used:
+
+- Microsoft Software Key Storage Provider
+
+- Microsoft Smart Card Key Storage Provider
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5059
+ 0
+ 0
+ 12292
+ 0
+ 0x8020000000000000
+
+ 1048447
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38e2d
+ Microsoft Software Key Storage Provider
+ ECDH\_P521
+ le-SuperAdmin-795fd6c1-2fae-4bef-a6bc-4f4d464bc083
+ %%2500
+ %%2464
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested key migration operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested key migration operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Cryptographic Parameters:**
+
+- **Provider Name** \[Type = UnicodeString\]**:** the name of KSP through which the operation was performed. Can have one of the following values:
+
+ - Microsoft Software Key Storage Provider
+
+ - Microsoft Smart Card Key Storage Provider
+
+- **Algorithm Name** \[Type = UnicodeString\]: the name of cryptographic algorithm through which the key was used or accessed. For “Read persisted key from file” operation, this typically has “**UNKNOWN**” value. Can also have one of the following values:
+
+ - RSA – algorithm created by Ron Rivest, Adi Shamir, and Leonard Adleman.
+
+ - DSA – Digital Signature Algorithm.
+
+ - DH – Diffie-Hellman.
+
+ - ECDH\_P521 – Elliptic Curve Diffie-Hellman algorithm with 512-bit key length.
+
+ - ECDH\_P384 – Elliptic Curve Diffie-Hellman algorithm with 384-bit key length.
+
+ - ECDH\_P256 – Elliptic Curve Diffie-Hellman algorithm with 256-bit key length.
+
+ - ECDSA\_P256 – Elliptic Curve Digital Signature Algorithm with 256-bit key length.
+
+ - ECDSA\_P384 – Elliptic Curve Digital Signature Algorithm with 384-bit key length.
+
+ - ECDSA\_P521 – Elliptic Curve Digital Signature Algorithm with 521-bit key length.
+
+- **Key Name** \[Type = UnicodeString\]: the name of the key (key container) with which operation was performed. For example, to get the list of **Key Names** for certificates for logged in user you can use “**certutil -store -user my**” command and check **Key Container** parameter in the output. Here is an output example:
+
+
+
+- **Key Type** \[Type = UnicodeString\]: can have one of the following values:
+
+ - “User key.” – user’s cryptographic key.
+
+ - “Machine key.” – machine’s cryptographic key.
+
+**Additional Information:**
+
+- **Operation** \[Type = UnicodeString\]: performed operation. Examples:
+
+ - “**Export of persistent cryptographic key.**” – typically generates during key read operations, which means that the key was taken for read purposes. But it also generates during real key export operations (export certificate with private key, for example).
+
+ - “**Import of persistent cryptographic key.**” – key import operation was performed (import certificate with private key, for example).
+
+- **Return Code** \[Type = HexInt32\]: has “**0x0**” value for Success events. For failure events, provides a hexadecimal error code number.
+
+## Security Monitoring Recommendations
+
+For 5059(S, F): Key migration operation.
+
+- Typically this event is required for detailed monitoring of KSP-related actions with cryptographic keys. If you need to monitor actions related to specific cryptographic keys (**“Key Name”)** or a specific **“Operation”**, such as **“Export of persistent cryptographic key”**, create monitoring rules and use this event as an information source.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+-
+
diff --git a/windows/keep-secure/event-5060.md b/windows/keep-secure/event-5060.md
new file mode 100644
index 0000000000..5a3b66e7da
--- /dev/null
+++ b/windows/keep-secure/event-5060.md
@@ -0,0 +1,75 @@
+'---
+title: 5060(F) Verification operation failed. (Windows 10)
+description: Describes security event 5060(F) Verification operation failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5060(F): Verification operation failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in case of CNG verification operation failure.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Verification operation failed.*
+
+*Subject:*
+
+> *Security ID%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Cryptographic Parameters:*
+
+> *Provider Name:%5*
+>
+> *Algorithm Name%6*
+>
+> *Key Name:%7*
+>
+> *Key Type:%8*
+
+*Failure Information:*
+
+> *Reason:%7*
+>
+> *Return Code:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related actions with cryptographic keys. If you need to monitor or troubleshoot actions related to specific cryptographic keys and operations, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5061.md b/windows/keep-secure/event-5061.md
new file mode 100644
index 0000000000..ecba2fb27f
--- /dev/null
+++ b/windows/keep-secure/event-5061.md
@@ -0,0 +1,166 @@
+---
+title: 5061(S, F) Cryptographic operation. (Windows 10)
+description: Describes security event 5061(S, F) Cryptographic operation.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5061(S, F): Cryptographic operation.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Description:***
+
+This event generates when a cryptographic operation (open key, create key, create key, and so on) was performed using a [Key Storage Provider](https://msdn.microsoft.com/en-us/library/windows/desktop/bb931355(v=vs.85).aspx) (KSP). This event generates only if one of the following KSPs were used:
+
+- Microsoft Software Key Storage Provider
+
+- Microsoft Smart Card Key Storage Provider
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5061
+ 0
+ 0
+ 12290
+ 0
+ 0x8020000000000000
+
+ 1048444
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38e2d
+ Microsoft Software Key Storage Provider
+ ECDH\_P521
+ le-SuperAdmin-795fd6c1-2fae-4bef-a6bc-4f4d464bc083
+ %%2500
+ %%2480
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested specific cryptographic operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested specific cryptographic operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Cryptographic Parameters:**
+
+- **Provider Name** \[Type = UnicodeString\]**:** the name of KSP through which the operation was performed. Can have one of the following values:
+
+ - Microsoft Software Key Storage Provider
+
+ - Microsoft Smart Card Key Storage Provider
+
+- **Algorithm Name** \[Type = UnicodeString\]: the name of cryptographic algorithm through which the key was used or accessed. For “Read persisted key from file” operation, this typically has “**UNKNOWN**” value. Can also have one of the following values:
+
+ - RSA – algorithm created by Ron Rivest, Adi Shamir, and Leonard Adleman.
+
+ - DSA – Digital Signature Algorithm.
+
+ - DH – Diffie-Hellman.
+
+ - ECDH\_P521 – Elliptic Curve Diffie-Hellman algorithm with 512-bit key length.
+
+ - ECDH\_P384 – Elliptic Curve Diffie-Hellman algorithm with 384-bit key length.
+
+ - ECDH\_P256 – Elliptic Curve Diffie-Hellman algorithm with 256-bit key length.
+
+ - ECDSA\_P256 – Elliptic Curve Digital Signature Algorithm with 256-bit key length.
+
+ - ECDSA\_P384 – Elliptic Curve Digital Signature Algorithm with 384-bit key length.
+
+ - ECDSA\_P521 – Elliptic Curve Digital Signature Algorithm with 521-bit key length.
+
+- **Key Name** \[Type = UnicodeString\]: the name of the key (key container) with which operation was performed. For example, to get the list of **Key Names** for certificates for logged in user you can use “**certutil -store -user my**” command and check **Key Container** parameter in the output. Here is an output example:
+
+
+
+- **Key Type** \[Type = UnicodeString\]: can have one of the following values:
+
+ - “User key.” – user’s cryptographic key.
+
+ - “Machine key.” – machine’s cryptographic key.
+
+**Cryptographic Operation:**
+
+- **Operation** \[Type = UnicodeString\]: performed operation. Possible values:
+
+ - Open Key. – open existing cryptographic key.
+
+ - Create Key. – create new cryptographic key.
+
+ - Delete Key. – delete existing cryptographic key.
+
+ - Sign hash. – cryptographic signing operation.
+
+ - Secret agreement.
+
+ - Key Derivation. – key derivation operation.
+
+ - Encrypt. – encryption operation.
+
+ - Decrypt. – decryption operation.
+
+- **Return Code** \[Type = HexInt32\]: has “**0x0**” value for Success events. For failure events, provides a hexadecimal error code number.
+
+## Security Monitoring Recommendations
+
+For 5061(S, F): Cryptographic operation.
+
+- Typically this event is required for detailed monitoring of KSP-related actions with cryptographic keys. If you need to monitor actions related to specific cryptographic keys (**“Key Name”)** or a specific **“Operation”**, such as **“Delete Key”**, create monitoring rules and use this event as an information source.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
diff --git a/windows/keep-secure/event-5062.md b/windows/keep-secure/event-5062.md
new file mode 100644
index 0000000000..3b07e9e43c
--- /dev/null
+++ b/windows/keep-secure/event-5062.md
@@ -0,0 +1,39 @@
+---
+title: 5062(S) A kernel-mode cryptographic self-test was performed. (Windows 10)
+description: Describes security event 5062(S) A kernel-mode cryptographic self-test was performed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5062(S): A kernel-mode cryptographic self-test was performed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event occurs rarely, and in some situations may be difficult to reproduce.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*A kernel-mode cryptographic self test was performed.*
+
+*Module:%1*
+
+*Return Code:%2*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related actions with cryptographic keys. If you need to monitor or troubleshoot actions related to specific cryptographic keys and operations, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5063.md b/windows/keep-secure/event-5063.md
new file mode 100644
index 0000000000..113f459251
--- /dev/null
+++ b/windows/keep-secure/event-5063.md
@@ -0,0 +1,69 @@
+---
+title: 5063(S, F) A cryptographic provider operation was attempted. (Windows 10)
+description: Describes security event 5063(S, F) A cryptographic provider operation was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5063(S, F): A cryptographic provider operation was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in BCryptUnregisterProvider() and BCryptRegisterProvider() functions. These are Cryptographic Next Generation (CNG) functions.
+
+This event generates when cryptographic provider was registered or unregistered.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic provider operation was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Cryptographic Provider:*
+
+> *Name:%5*
+>
+> *Module:%6*
+>
+> *Operation:%7*
+
+*Return Code:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5064.md b/windows/keep-secure/event-5064.md
new file mode 100644
index 0000000000..ce3e19d79e
--- /dev/null
+++ b/windows/keep-secure/event-5064.md
@@ -0,0 +1,69 @@
+---
+title: 5064(S, F) A cryptographic context operation was attempted. (Windows 10)
+description: Describes security event 5064(S, F) A cryptographic context operation was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5064(S, F): A cryptographic context operation was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptCreateContext](https://msdn.microsoft.com/en-us/library/windows/desktop/aa375381(v=vs.85).aspx)() and [BCryptDeleteContext](https://msdn.microsoft.com/en-us/library/windows/desktop/aa375392(v=vs.85).aspx)() functions. These are Cryptographic Next Generation (CNG) functions.
+
+This event generates when cryptographic context was created or deleted.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic context operation was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+
+*Operation:%7*
+
+*Return Code:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5065.md b/windows/keep-secure/event-5065.md
new file mode 100644
index 0000000000..f3cdb958d2
--- /dev/null
+++ b/windows/keep-secure/event-5065.md
@@ -0,0 +1,73 @@
+---
+title: 5065(S, F) A cryptographic context modification was attempted. (Windows 10)
+description: Describes security event 5065(S, F) A cryptographic context modification was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5065(S, F): A cryptographic context modification was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptConfigureContext](https://msdn.microsoft.com/es-es/vstudio/aa375379)() function. This is a Cryptographic Next Generation (CNG) function.
+
+This event generates when configuration information was changed for existing CNG context.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic context modification was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+
+*Change Information:*
+
+> *Old Value:%7*
+>
+> *New Value:%8*
+
+*Return Code:%9*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5066.md b/windows/keep-secure/event-5066.md
new file mode 100644
index 0000000000..b3bc8f6afb
--- /dev/null
+++ b/windows/keep-secure/event-5066.md
@@ -0,0 +1,75 @@
+---
+title: 5066(S, F) A cryptographic function operation was attempted. (Windows 10)
+description: Describes security event 5066(S, F) A cryptographic function operation was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5066(S, F): A cryptographic function operation was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptAddContextFunction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa375360(v=vs.85).aspx)() and [BCryptRemoveContextFunction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa375492(v=vs.85).aspx)() functions. These are Cryptographic Next Generation (CNG) functions.
+
+This event generates when cryptographic function was added or removed from the list of functions that are supported by an existing CNG context.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic function operation was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+>
+> *Interface:%7*
+>
+> *Function:%8*
+>
+> *Position:%9*
+
+*Operation:%10*
+
+*Return Code:%11*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5067.md b/windows/keep-secure/event-5067.md
new file mode 100644
index 0000000000..a5a5618324
--- /dev/null
+++ b/windows/keep-secure/event-5067.md
@@ -0,0 +1,77 @@
+---
+title: 5067(S, F) A cryptographic function modification was attempted. (Windows 10)
+description: Describes security event 5067(S, F) A cryptographic function modification was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5067(S, F): A cryptographic function modification was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptConfigureContextFunction](https://msdn.microsoft.com/en-us/library/windows/desktop/aa375380(v=vs.85).aspx)() function. This is a Cryptographic Next Generation (CNG) function.
+
+This event generates when configuration information for the cryptographic function of an existing CNG context was changed.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic function modification was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+>
+> *Interface:%7*
+>
+> *Function:%8*
+
+*Change Information:*
+
+> *Old Value:%9*
+>
+> *New Value:%10*
+
+*Return Code:%11*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5068.md b/windows/keep-secure/event-5068.md
new file mode 100644
index 0000000000..751ecc249b
--- /dev/null
+++ b/windows/keep-secure/event-5068.md
@@ -0,0 +1,75 @@
+---
+title: 5068(S, F) A cryptographic function provider operation was attempted. (Windows 10)
+description: Describes security event 5068(S, F) A cryptographic function provider operation was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5068(S, F): A cryptographic function provider operation was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in BCryptAddContextFunctionProvider() and BCryptRemoveContextFunctionProvider() functions. These are Cryptographic Next Generation (CNG) functions.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic function provider operation was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+>
+> *Interface:%7*
+>
+> *Function:%8*
+>
+> *Provider:%9*
+>
+> *Position:%10*
+
+*Operation:%11*
+
+*Return Code:%12*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5069.md b/windows/keep-secure/event-5069.md
new file mode 100644
index 0000000000..40159c9c39
--- /dev/null
+++ b/windows/keep-secure/event-5069.md
@@ -0,0 +1,77 @@
+---
+title: 5069(S, F) A cryptographic function property operation was attempted. (Windows 10)
+description: Describes security event 5069(S, F) A cryptographic function property operation was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5069(S, F): A cryptographic function property operation was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptSetContextFunctionProperty](https://msdn.microsoft.com/en-us/library/windows/desktop/Aa375501(v=VS.85).aspx)() function. This is a Cryptographic Next Generation (CNG) function.
+
+This event generates when named property for a cryptographic function in an existing CNG context was added or removed.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic function property operation was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+>
+> *Interface:%7*
+>
+> *Function:%8*
+>
+> Property:%9
+
+Operation:%10
+
+Value:%11
+
+Return Code:%12
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5070.md b/windows/keep-secure/event-5070.md
new file mode 100644
index 0000000000..388d1f39c6
--- /dev/null
+++ b/windows/keep-secure/event-5070.md
@@ -0,0 +1,79 @@
+---
+title: 5070(S, F) A cryptographic function property modification was attempted. (Windows 10)
+description: Describes security event 5070(S, F) A cryptographic function property modification was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5070(S, F): A cryptographic function property modification was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event generates in [BCryptSetContextFunctionProperty](https://msdn.microsoft.com/en-us/library/windows/desktop/Aa375501(v=VS.85).aspx)() function. This is a Cryptographic Next Generation (CNG) function.
+
+This event generates when named property for a cryptographic function in an existing CNG context was updated.
+
+For more information about Cryptographic Next Generation (CNG) visit these pages:
+
+-
+
+-
+
+-
+
+This event is mainly used for Cryptographic Next Generation (CNG) troubleshooting.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Schema:***
+
+*A cryptographic function property modification was attempted.*
+
+*Subject:*
+
+> *Security ID:%1*
+>
+> *Account Name:%2*
+>
+> *Account Domain:%3*
+>
+> *Logon ID:%4*
+
+*Configuration Parameters:*
+
+> *Scope:%5*
+>
+> *Context:%6*
+>
+> *Interface:%7*
+>
+> *Function:%8*
+>
+> Property:%9
+
+Change Information:
+
+> Old Value:%10
+>
+> New Value:%11
+
+Return Code:%12
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- Typically this event is required for detailed monitoring of CNG-related cryptographic functions. If you need to monitor or troubleshoot actions related to specific cryptographic functions, review this event to see if it provides the information you need.
+
diff --git a/windows/keep-secure/event-5136.md b/windows/keep-secure/event-5136.md
new file mode 100644
index 0000000000..1bc1202256
--- /dev/null
+++ b/windows/keep-secure/event-5136.md
@@ -0,0 +1,238 @@
+---
+title: 5136(S) A directory service object was modified. (Windows 10)
+description: Describes security event 5136(S) A directory service object was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5136(S): A directory service object was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Changes](audit-directory-service-changes.md)
+
+***Event Description:***
+
+This event generates every time an Active Directory object is modified.
+
+To generate this event, the modified object must have an appropriate entry in [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx): the “**Write”** action auditing for specific attributes.
+
+For a change operation you will typically see two 5136 events for one action, with different **Operation\\Type** fields: “Value Deleted” and then “Value Added”. “Value Deleted” event typically contains previous value and “Value Added” event contains new value.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+ 410204
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ {02647639-8626-43CE-AFE6-7AA1AD657739}
+ -
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x32004
+ contoso.local
+ %%14676
+ CN=Sergey,CN=Builtin,DC=contoso,DC=local
+ {4FE80A66-5F93-4F73-B215-68678058E613}
+ user
+ userAccountControl
+ 2.5.5.9
+ 512
+ %%14675
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Directory Service:**
+
+- **Name** \[Type = UnicodeString\]: the name of the Active Directory domain where the modified object is located.
+
+- **Type** \[Type = UnicodeString\]**:** has “**Active Directory Domain Services**” value for this event.
+
+**Object:**
+
+- **DN** \[Type = UnicodeString\]: distinguished name of the object that was modified.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **GUID** \[Type = GUID\]**:** each Active Directory object has globally unique identifier (GUID), which is a 128-bit value that is unique not only in the enterprise but also across the world. GUIDs are assigned to every object created by Active Directory. Each object's GUID is stored in its Object-GUID (**objectGUID**) property.
+
+ Active Directory uses GUIDs internally to identify objects. For example, the GUID is one of an object's properties that is published in the global catalog. Searching the global catalog for a User object's GUID will yield results if the user has an account somewhere in the enterprise. In fact, searching for any object by Object-GUID might be the most reliable way of finding the object you want to find. The values of other object properties can change, but the Object-GUID never changes. When an object is assigned a GUID, it keeps that value for life.
+
+ Event Viewer automatically resolves **GUID** field to real object.
+
+ To translate this GUID, use the following procedure:
+
+ - Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(objectGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: a6b34ab5-551b-4626-b8ee-2b36b3ee6672
+
+ - Take first 3 sections a6b34ab5-551b-4626.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this b54ab3a6-1b55-2646
+
+ - Add the last 2 sections without transformation: b54ab3a6-1b55-2646-b8ee-2b36b3ee6672
+
+ - Delete - : b54ab3a61b552646b8ee2b36b3ee6672
+
+ - Divide bytes with backslashes: \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72
+
+ - Filter example: (&(objectClass=\*)(objectGUID = \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72))
+
+ - Scope: Subtree
+
+ - Attributes: objectGUID
+
+
+
+- **Class** \[Type = UnicodeString\]: class of the object that was modified. Some of the common Active Directory object classes:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of this field open Active Directory Schema snap-in (see how to enable this snap-in: ) and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+**Attribute:**
+
+- **LDAP Display Name** \[Type = UnicodeString\]**:** the object attribute that was modified.
+
+> **Note** [LDAP Display Name](https://msdn.microsoft.com/en-us/library/ms676828(v=vs.85).aspx) is the name used by LDAP clients, such as the ADSI LDAP provider, to read and write the attribute by using the LDAP protocol.
+
+- **Syntax (OID)** \[Type = UnicodeString\]**:** The syntax for an attribute defines the storage representation, byte ordering, and matching rules for comparisons of property types. Whether the attribute value must be a string, a number, or a unit of time is also defined. Every attribute of every object is associated with exactly one syntax. The syntaxes are not represented as objects in the schema, but they are programmed to be understood by Active Directory. The allowable syntaxes in Active Directory are predefined.
+
+| OID | Syntax Name | Description |
+|----------|--------------------------------------------|----------------------------------------------------------|
+| 2.5.5.0 | Undefined | Not a legal syntax. |
+| 2.5.5.1 | Object(DN-DN) | The fully qualified name of an object in the directory. |
+| 2.5.5.2 | String(Object-Identifier) | The object identifier. |
+| 2.5.5.3 | Case-Sensitive String | General String. |
+| 2.5.5.4 | CaseIgnoreString(Teletex) | Differentiates uppercase and lowercase. |
+| 2.5.5.5 | String(Printable), String(IA5) | Teletex. Does not differentiate uppercase and lowercase. |
+| 2.5.5.6 | String(Numeric) | Printable string or IA5-String. |
+| 2.5.5.7 | Object(DN-Binary) | Both character sets are case-sensitive. |
+| 2.5.5.8 | Boolean | A sequence of digits. |
+| 2.5.5.9 | Integer, Enumeration | A distinguished name plus a binary large object. |
+| 2.5.5.10 | String(Octet) | TRUE or FALSE values. |
+| 2.5.5.11 | String(UTC-Time), String(Generalized-Time) | A 32-bit number or enumeration. |
+| 2.5.5.12 | String(Unicode) | A string of bytes. |
+| 2.5.5.13 | Object(Presentation-Address) | UTC Time or Generalized-Time. |
+| 2.5.5.14 | Object(DN-String) | Unicode string. |
+| 2.5.5.15 | String(NT-Sec-Desc) | Presentation address. |
+| 2.5.5.16 | LargeInteger | A DN-String plus a Unicode string. |
+| 2.5.5.17 | String(Sid) | A Microsoft® Windows NT® Security descriptor. |
+
+> Table 10. LDAP Attribute Syntax OIDs.
+
+- **Value** \[Type = UnicodeString\]: the value which was added or deleted, depending on the **Operation\\Type** field.
+
+**Operation:**
+
+- **Type** \[Type = UnicodeString\]**:** type of performed operation.
+
+ - **Value Added** – new value added.
+
+ - **Value Deleted** – value deleted (typically “Value Deleted” is a part of change operation).
+
+
+
+- **Correlation ID** \[Type = GUID\]: multiple modifications are often executed as one operation via LDAP. This value allows you to correlate all the modification events that comprise the operation. Just look for other events from current subcategory with the same **Correlation ID**, for example “[5137](event-5137.md): A directory service object was created.” and “[5139](event-5139.md): A directory service object was moved.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Application Correlation ID** \[Type = UnicodeString\]: always has “**-**“ value. Not in use.
+
+## Security Monitoring Recommendations
+
+For 5136(S): A directory service object was modified.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor modifications to specific Active Directory objects, monitor for **DN** field with specific object name. For example, we recommend that you monitor all modifications to “**CN=AdminSDHolder,CN=System,DC=domain,DC=com”** object.
+
+- If you need to monitor modifications to specific Active Directory classes, monitor for **Class** field with specific class name. For example, we recommend that you monitor all modifications to **domainDNS** class.
+
+- If you need to monitor modifications to specific Active Directory attributes, monitor for **LDAP Display Name** field with specific attribute name.
+
+- It is better to monitor **Operation\\Type = Value Added** events, because you will see the new value of attribute. At the same time you can correlate to previous **Operation\\Type = Value Deleted** event with the same **Correlation ID** to see the previous value.
+
diff --git a/windows/keep-secure/event-5137.md b/windows/keep-secure/event-5137.md
new file mode 100644
index 0000000000..d164e1fa1a
--- /dev/null
+++ b/windows/keep-secure/event-5137.md
@@ -0,0 +1,185 @@
+---
+title: 5137(S) A directory service object was created. (Windows 10)
+description: Describes security event 5137(S) A directory service object was created.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5137(S): A directory service object was created.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Changes](audit-directory-service-changes.md)
+
+***Event Description:***
+
+This event generates every time an Active Directory object is created.
+
+This event only generates if the parent object has a particular entry in its [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx): the “**Create**” action, auditing for specific classes or objects. An example is the “**Create Computer objects**” action auditing for the organizational unit.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5137
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+ 410737
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ {4EAD68FF-7229-42A4-8C73-AAB57169858B}
+ -
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x32004
+ contoso.local
+ %%14676
+ cn=Win2000,CN=Users,DC=contoso,DC=local
+ {41D5F7AF-64A2-4985-9A4B-70DAAFC7CCE6}
+ computer
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “create object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “create object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Directory Service:**
+
+- **Name** \[Type = UnicodeString\]: the name of an Active Directory domain, where new object is created.
+
+- **Type** \[Type = UnicodeString\]**:** has “**Active Directory Domain Services**” value for this event.
+
+**Object:**
+
+- **DN** \[Type = UnicodeString\]: distinguished name of the object that was created.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **GUID** \[Type = GUID\]**:** each Active Directory object has globally unique identifier (GUID), which is a 128-bit value that is unique not only in the enterprise but also across the world. GUIDs are assigned to every object created by Active Directory. Each object's GUID is stored in its Object-GUID (**objectGUID**) property.
+
+ Active Directory uses GUIDs internally to identify objects. For example, the GUID is one of an object's properties that is published in the global catalog. Searching the global catalog for a User object's GUID will yield results if the user has an account somewhere in the enterprise. In fact, searching for any object by Object-GUID might be the most reliable way of finding the object you want to find. The values of other object properties can change, but the Object-GUID never changes. When an object is assigned a GUID, it keeps that value for life.
+
+ Event Viewer automatically resolves **GUID** field to real object.
+
+ To translate this GUID, use the following procedure:
+
+ - Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(objectGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: a6b34ab5-551b-4626-b8ee-2b36b3ee6672
+
+ - Take first 3 sections a6b34ab5-551b-4626.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this b54ab3a6-1b55-2646
+
+ - Add the last 2 sections without transformation: b54ab3a6-1b55-2646-b8ee-2b36b3ee6672
+
+ - Delete - : b54ab3a61b552646b8ee2b36b3ee6672
+
+ - Divide bytes with backslashes: \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72
+
+ - Filter example: (&(objectClass=\*)(objectGUID = \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72))
+
+ - Scope: Subtree
+
+ - Attributes: objectGUID
+
+- **Class** \[Type = UnicodeString\]: class of the object that was created. Some of the common Active Directory object classes:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of this field open Active Directory Schema snap-in (see how to enable this snap-in: and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+**Operation:**
+
+- **Correlation ID** \[Type = GUID\]: multiple modifications are often executed as one operation via LDAP. This value allows you to correlate all the modification events that comprise the operation. Just look for other events from current subcategory with the same **Correlation ID**, for example “[5136](event-5136.md): A directory service object was modified.” and “[5139](event-5139.md): A directory service object was moved.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Application Correlation ID** \[Type = UnicodeString\]: always has “**-**“ value. Not in use.
+
+## Security Monitoring Recommendations
+
+For 5137(S): A directory service object was created.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor creation of Active Directory objects with specific classes, monitor for **Class** field with specific class name. For example, we recommend that you monitor all new group policy objects creations: **groupPolicyContainer** class.
+
+- You must set correct auditing access lists (SACLs) for specific classes within Active Directory container to get [5137](event-5137.md). There is no reason to audit all creation events for all types of Active Directory objects; find the most important locations (organizational units, folders, etc.) and monitor for creation of specific classes only (user, computer, group, etc.).
+
diff --git a/windows/keep-secure/event-5138.md b/windows/keep-secure/event-5138.md
new file mode 100644
index 0000000000..846ee2eef9
--- /dev/null
+++ b/windows/keep-secure/event-5138.md
@@ -0,0 +1,188 @@
+---
+title: 5138(S) A directory service object was undeleted. (Windows 10)
+description: Describes security event 5138(S) A directory service object was undeleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5138(S): A directory service object was undeleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Changes](audit-directory-service-changes.md)
+
+***Event Description:***
+
+This event generates every time an Active Directory object is undeleted. It happens, for example, when an Active Directory object was restored from the [Active Directory Recycle Bin](https://technet.microsoft.com/en-us/library/dd392261(v=ws.10).aspx).
+
+This event only generates if the container to which the Active Directory object was restored has a particular entry in its [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx): the “**Create**” action, auditing for specific classes or objects. An example is the “**Create User objects**” action.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5138
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+ 229336
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ {3E2B5ECF-4C35-4C3F-8D82-B8D6F477D846}
+ -
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x3be49
+ contoso.local
+ %%14676
+ CN=Andrei\\0ADEL:53511188-bc98-4995-9d78-2d40143c9711,CN=Deleted Objects,DC=contoso,DC=local
+ CN=Andrei,CN=Users,DC=contoso,DC=local
+ {53511188-BC98-4995-9D78-2D40143C9711}
+ user
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested that the object be undeleted or restored. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** name of account that requested that the object be undeleted or restored.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Directory Service:**
+
+- **Name** \[Type = UnicodeString\]: the name of an Active Directory domain, where the object was undeleted.
+
+- **Type** \[Type = UnicodeString\]**:** has “**Active Directory Domain Services**” value for this event.
+
+**Object:**
+
+- **Old DN** \[Type = UnicodeString\]: Old distinguished name of undeleted object. It will points to [Active Directory Recycle Bin](https://technet.microsoft.com/en-us/library/dd392261(v=ws.10).aspx) folder, in case if it was restored from it.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **New DN** \[Type = UnicodeString\]: New distinguished name of undeleted object. The Active Directory container to which the object was restored.
+
+- **GUID** \[Type = GUID\]**:** each Active Directory object has globally unique identifier (GUID), which is a 128-bit value that is unique not only in the enterprise but also across the world. GUIDs are assigned to every object created by Active Directory. Each object's GUID is stored in its Object-GUID (**objectGUID**) property.
+
+ Active Directory uses GUIDs internally to identify objects. For example, the GUID is one of an object's properties that is published in the global catalog. Searching the global catalog for a User object's GUID will yield results if the user has an account somewhere in the enterprise. In fact, searching for any object by Object-GUID might be the most reliable way of finding the object you want to find. The values of other object properties can change, but the Object-GUID never changes. When an object is assigned a GUID, it keeps that value for life.
+
+ Event Viewer automatically resolves **GUID** field to real object.
+
+ To translate this GUID, use the following procedure:
+
+ - Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(objectGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: a6b34ab5-551b-4626-b8ee-2b36b3ee6672
+
+ - Take first 3 sections a6b34ab5-551b-4626.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this b54ab3a6-1b55-2646
+
+ - Add the last 2 sections without transformation: b54ab3a6-1b55-2646-b8ee-2b36b3ee6672
+
+ - Delete - : b54ab3a61b552646b8ee2b36b3ee6672
+
+ - Divide bytes with backslashes: \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72
+
+ - Filter example: (&(objectClass=\*)(objectGUID = \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72))
+
+ - Scope: Subtree
+
+ - Attributes: objectGUID
+
+- **Class** \[Type = UnicodeString\]: class of the object that was undeleted. Some of the common Active Directory object classes:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of this field open Active Directory Schema snap-in (see how to enable this snap-in: and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+**Operation:**
+
+- **Correlation ID** \[Type = GUID\]: multiple modifications are often executed as one operation via LDAP. This value allows you to correlate all the modification events that comprise the operation. Just look for other events from current subcategory with the same **Correlation ID**, for example “[5137](event-5137.md): A directory service object was created.” and “[5139](event-5139.md): A directory service object was moved.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Application Correlation ID** \[Type = UnicodeString\]: always has “**-**“ value. Not in use.
+
+## Security Monitoring Recommendations
+
+For 5138(S): A directory service object was undeleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor undelete operations (restoration) of Active Directory objects with specific classes, monitor for **Class** field with specific class name.
+
+- It may be a good idea to monitor all undelete events, because the operation is not performed very often. Confirm that there is a reason for the object to be undeleted.
+
diff --git a/windows/keep-secure/event-5139.md b/windows/keep-secure/event-5139.md
new file mode 100644
index 0000000000..192a1c890f
--- /dev/null
+++ b/windows/keep-secure/event-5139.md
@@ -0,0 +1,188 @@
+---
+title: 5139(S) A directory service object was moved. (Windows 10)
+description: Describes security event 5139(S) A directory service object was moved.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5139(S): A directory service object was moved.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Changes](audit-directory-service-changes.md)
+
+***Event Description:***
+
+This event generates every time an Active Directory object is moved.
+
+This event only generates if the destination object has a particular entry in its [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx): the “**Create**” action, auditing for specific classes or objects. An example is the “**Create Computer objects**” action, auditing for the organizational unit.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5139
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+ 409532
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ {67A42C05-A70D-4348-AF19-E883CB1FCA9C}
+ -
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x35867
+ contoso.local
+ %%14676
+ CN=NewUser,CN=Builtin,DC=contoso,DC=local
+ CN=NewUser,CN=Users,DC=contoso,DC=local
+ {06713960-9CC3-4B5D-A594-35883A04F934}
+ user
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “move object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “move object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Directory Service:**
+
+- **Name** \[Type = UnicodeString\]: the name of an Active Directory domain, where the object was moved.
+
+- **Type** \[Type = UnicodeString\]**:** has “**Active Directory Domain Services**” value for this event.
+
+**Object:**
+
+- **Old DN** \[Type = UnicodeString\]: Old distinguished name of moved object.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **New DN** \[Type = UnicodeString\]: New distinguished name of moved object. The Active Directory container to which the object was moved.
+
+- **GUID** \[Type = GUID\]**:** each Active Directory object has globally unique identifier (GUID), which is a 128-bit value that is unique not only in the enterprise but also across the world. GUIDs are assigned to every object created by Active Directory. Each object's GUID is stored in its Object-GUID (**objectGUID**) property.
+
+ Active Directory uses GUIDs internally to identify objects. For example, the GUID is one of an object's properties that is published in the global catalog. Searching the global catalog for a User object's GUID will yield results if the user has an account somewhere in the enterprise. In fact, searching for any object by Object-GUID might be the most reliable way of finding the object you want to find. The values of other object properties can change, but the Object-GUID never changes. When an object is assigned a GUID, it keeps that value for life.
+
+ Event Viewer automatically resolves **GUID** field to real object.
+
+ To translate this GUID, use the following procedure:
+
+ - Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(objectGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: a6b34ab5-551b-4626-b8ee-2b36b3ee6672
+
+ - Take first 3 sections a6b34ab5-551b-4626.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this b54ab3a6-1b55-2646
+
+ - Add the last 2 sections without transformation: b54ab3a6-1b55-2646-b8ee-2b36b3ee6672
+
+ - Delete - : b54ab3a61b552646b8ee2b36b3ee6672
+
+ - Divide bytes with backslashes: \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72
+
+ - Filter example: (&(objectClass=\*)(objectGUID = \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72))
+
+ - Scope: Subtree
+
+ - Attributes: objectGUID
+
+- **Class** \[Type = UnicodeString\]: class of the object that was moved. Some of the common Active Directory object classes:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of this field open Active Directory Schema snap-in (see how to enable this snap-in: and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+**Operation:**
+
+- **Correlation ID** \[Type = GUID\]: multiple modifications are often executed as one operation via LDAP. This value allows you to correlate all the modification events that comprise the operation. Just look for other events from current subcategory with the same **Correlation ID**, for example “[5137](event-5137.md): A directory service object was created.” and “[5141](event-5141.md): A directory service object was deleted.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Application Correlation ID** \[Type = UnicodeString\]: always has “**-**“ value. Not in use.
+
+## Security Monitoring Recommendations
+
+For 5139(S): A directory service object was moved.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor movement of Active Directory objects with specific classes, monitor for **Class** field with specific class name.
+
+- You must set correct auditing access lists (SACLs) for specific classes within Active Directory container to get [5139](event-5139.md). There is no reason to audit all movement events for all types of Active Directory objects, you need to find the most important locations (organizational units, folders, etc.) and monitor for movement of specific classes only to these locations (user, computer, group, etc.).
+
diff --git a/windows/keep-secure/event-5140.md b/windows/keep-secure/event-5140.md
new file mode 100644
index 0000000000..bb6cf5f7aa
--- /dev/null
+++ b/windows/keep-secure/event-5140.md
@@ -0,0 +1,153 @@
+---
+title: 5140(S, F) A network share object was accessed. (Windows 10)
+description: Describes security event 5140(S, F) A network share object was accessed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5140(S, F): A network share object was accessed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File Share](audit-file-share.md)
+
+***Event Description:***
+
+This event generates every time network share object was accessed.
+
+This event generates once per session, when first access attempt was made.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5140
+ 1
+ 0
+ 12808
+ 0
+ 0x8020000000000000
+
+ 268495
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x541f35
+ File
+ 10.0.0.100
+ 49212
+ \\\\\*\\Documents
+ \\??\\C:\\Documents
+ 0x1
+ %%4416
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:***
+
+- 0 - Windows Server 2008, Windows Vista.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested access to network share object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested access to network share object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Network Information:**
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always “**File**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Source Address** \[Type = UnicodeString\]**:** source IP address from which access was performed.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+- **Source Port** \[Type = UnicodeString\]: source TCP or UDP port which was used from remote or local machine to request the access.
+
+ - 0 for local access attempts.
+
+**Share Information:**
+
+- **Share Name** \[Type = UnicodeString\]**:** the name of accessed network share. The format is: \\\\\*\\SHARE\_NAME.
+
+- **Share Path** \[Type = UnicodeString\]**:** the full system (NTFS) path for accessed share. The format is: \\\\??\\PATH. Can be empty, for example for **Share Name**: \\\\\*\\IPC$.
+
+**Access Request Information:**
+
+- **Access Mask** \[Type = HexInt32\]: the sum of hexadecimal values of requested access rights. See “Table 13. File access codes.” for different hexadecimal values for access rights. Has always “**0x1**” value for this event.
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were requested by **Subject\\Security ID**. These access rights depend on **Object Type**. Has always “**ReadData (or ListDirectory)**” value for this event.
+
+## Security Monitoring Recommendations
+
+For 5140(S, F): A network share object was accessed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have high-value computers for which you need to monitor all access to all shares or specific shares (“**Share Name**”), monitor this event**.** For example, you could monitor share **C$** on domain controllers.
+
+- Monitor this event if the **Network Information\\Source Address** is not from your internal IP range.
+
+- Monitor this event if the **Network Information\\Source Address** should not be able to connect with the specific computer (**Computer:**).
+
+- If you need to monitor access attempts to local shares from a specific IP address (“**Network Information\\Source Address”)**, use this event.
+
+- If you need to monitor for specific Access Types (for example, ReadData or WriteData), for all or specific shares (“**Share Name**”), monitor this event for the “**Access Type**.”
+
diff --git a/windows/keep-secure/event-5141.md b/windows/keep-secure/event-5141.md
new file mode 100644
index 0000000000..994302f871
--- /dev/null
+++ b/windows/keep-secure/event-5141.md
@@ -0,0 +1,196 @@
+---
+title: 5141(S) A directory service object was deleted. (Windows 10)
+description: Describes security event 5141(S) A directory service object was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5141(S): A directory service object was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Directory Service Changes](audit-directory-service-changes.md)
+
+***Event Description:***
+
+This event generates every time an Active Directory object is deleted.
+
+This event only generates if the deleted object has a particular entry in its [SACL](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx): the “**Delete”** action, auditing for specific objects.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5141
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+ 411118
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ {C8A9000C-C618-4EE9-87FF-F852C0564F18}
+ -
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x32004
+ contoso.local
+ %%14676
+ CN=WIN2003,CN=Users,DC=contoso,DC=local
+ {CA15B875-AFB1-4E5A-86B2-96E61DE09110}
+ computer
+ %%14679
+
+
+
+```
+
+***Required Server Roles:*** Active Directory domain controller.
+
+***Minimum OS Version:*** Windows Server 2008.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Directory Service:**
+
+- **Name** \[Type = UnicodeString\]: the name of an Active Directory domain, where the object was deleted.
+
+- **Type** \[Type = UnicodeString\]**:** has “**Active Directory Domain Services**” value for this event.
+
+**Object:**
+
+- **DN** \[Type = UnicodeString\]: distinguished name of the object that was deleted.
+
+> **Note** The LDAP API references an LDAP object by its **distinguished name (DN)**. A DN is a sequence of relative distinguished names (RDN) connected by commas.
+
+> An RDN is an attribute with an associated value in the form attribute=value; . These are examples of RDNs attributes:
+
+> • DC - domainComponent
+
+> • CN - commonName
+
+> • OU - organizationalUnitName
+
+> • O - organizationName
+
+- **GUID** \[Type = GUID\]**:** each Active Directory object has globally unique identifier (GUID), which is a 128-bit value that is unique not only in the enterprise but also across the world. GUIDs are assigned to every object created by Active Directory. Each object's GUID is stored in its Object-GUID (**objectGUID**) property.
+
+ Active Directory uses GUIDs internally to identify objects. For example, the GUID is one of an object's properties that is published in the global catalog. Searching the global catalog for a User object's GUID will yield results if the user has an account somewhere in the enterprise. In fact, searching for any object by Object-GUID might be the most reliable way of finding the object you want to find. The values of other object properties can change, but the Object-GUID never changes. When an object is assigned a GUID, it keeps that value for life.
+
+ Event Viewer automatically resolves **GUID** field to real object. For deleted objects **GUID** will be resolved to new destination of object, for example: OU=My\\0ADEL:cc94c0d7-dd53-4061-9791-e53478dbbc3b,CN=Deleted Objects,DC=contoso,DC=local.
+
+ To translate this GUID, use the following procedure:
+
+ - Perform the following LDAP search using LDP.exe tool:
+
+ - Base DN: CN=Schema,CN=Configuration,DC=XXX,DC=XXX
+
+ - Filter: (&(objectClass=\*)(objectGUID=GUID))
+
+ - Perform the following operations with the GUID before using it in a search request:
+
+ - We have this GUID to search for: a6b34ab5-551b-4626-b8ee-2b36b3ee6672
+
+ - Take first 3 sections a6b34ab5-551b-4626.
+
+ - For each of these 3 sections you need to change (Invert) the order of bytes, like this b54ab3a6-1b55-2646
+
+ - Add the last 2 sections without transformation: b54ab3a6-1b55-2646-b8ee-2b36b3ee6672
+
+ - Delete - : b54ab3a61b552646b8ee2b36b3ee6672
+
+ - Divide bytes with backslashes: \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72
+
+ - Filter example: (&(objectClass=\*)(objectGUID = \\b5\\4a\\b3\\a6\\1b\\55\\26\\46\\b8\\ee\\2b\\36\\b3\\ee\\66\\72))
+
+ - Scope: Subtree
+
+ - Attributes: objectGUID
+
+
+
+- **Class** \[Type = UnicodeString\]: class of the object that was deleted. Some of the common Active Directory object classes:
+
+ - container – for containers.
+
+ - user – for users.
+
+ - group – for groups.
+
+ - domainDNS – for domain object.
+
+ - groupPolicyContainer – for group policy objects.
+
+ For all possible values of this field open Active Directory Schema snap-in (see how to enable this snap-in: and navigate to **Active Directory Schema\\Classes**. Or use this document:
+
+**Operation:**
+
+- **Tree Delete** \[Type = UnicodeString\]**:**
+
+ - **Yes** – “Delete Subtree” operation was performed. It happens, for example, if “Use Delete Subtree server control” check box was checked during delete operation using Active Directory Users and Computers management console.
+
+ - **No** – delete operation was performed without “Delete Subtree” server control.
+
+
+
+- **Correlation ID** \[Type = GUID\]: multiple modifications are often executed as one operation via LDAP. This value allows you to correlate all the modification events that comprise the operation. Just look for other events from current subcategory with the same **Correlation ID**, for example “[5137](event-5137.md): A directory service object was created.” and “[5139](event-5139.md): A directory service object was moved.”
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Application Correlation ID** \[Type = UnicodeString\]: always has “**-**“ value. Not in use.
+
+## Security Monitoring Recommendations
+
+For 5141(S): A directory service object was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor deletion of Active Directory objects with specific classes, monitor for **Class** field with specific class name. For example, we recommend that you monitor for group policy objects deletions: **groupPolicyContainer** class.
+
+- If you need to monitor deletion of specific Active Directory objects, monitor for **DN** field with specific object name. For example, if you have critical Active Directory objects which should not be deleted, monitor for their deletion.
+
diff --git a/windows/keep-secure/event-5142.md b/windows/keep-secure/event-5142.md
new file mode 100644
index 0000000000..291378d2ee
--- /dev/null
+++ b/windows/keep-secure/event-5142.md
@@ -0,0 +1,106 @@
+---
+title: 5142(S) A network share object was added. (Windows 10)
+description: Describes security event 5142(S) A network share object was added.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5142(S): A network share object was added.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File Share](audit-file-share.md)
+
+***Event Description:***
+
+This event generates every time network share object was added.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5142
+ 0
+ 0
+ 12808
+ 0
+ 0x8020000000000000
+
+ 268462
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38d12
+ \\\\\*\\Documents
+ C:\\Documents
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “add network share object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “add network share object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Share Information:**
+
+- **Share Name** \[Type = UnicodeString\]**:** the name of the added share object. The format is: \\\\\*\\SHARE\_NAME.
+
+- **Share Path** \[Type = UnicodeString\]**:** the full system (NTFS) path for the added share object. The format is: \\\\??\\PATH.
+
+## Security Monitoring Recommendations
+
+For 5142(S): A network share object was added.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have high-value computers for which you need to monitor creation of new file shares, monitor this event**.** For example, you could monitor domain controllers.
+
+- We recommend checking “**Share Path**”, because it should not point to system directories, such as **C:\\Windows** or **C:\\**, or to critical local folders which contain private or high value information.
+
diff --git a/windows/keep-secure/event-5143.md b/windows/keep-secure/event-5143.md
new file mode 100644
index 0000000000..3a1fbd38b1
--- /dev/null
+++ b/windows/keep-secure/event-5143.md
@@ -0,0 +1,259 @@
+---
+title: 5143(S) A network share object was modified. (Windows 10)
+description: Describes security event 5143(S) A network share object was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5143(S): A network share object was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File Share](audit-file-share.md)
+
+***Event Description:***
+
+This event generates every time network share object was modified.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5143
+ 0
+ 0
+ 12808
+ 0
+ 0x8020000000000000
+
+ 268483
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38d12
+ Directory
+ \\\\\*\\Documents
+ C:\\Documents
+ N/A
+ N/A
+ 0xffffffff
+ 0xffffffff
+ 0x800
+ 0x800
+ O:S-1-5-21-3457937927-2839227994-823803824-1104G:DAD:(A;OICI;FA;;;BA)(A;OICI;FA;;;WD)
+ O:BAG:DAD:(D;;FA;;;S-1-5-21-3457937927-2839227994-823803824-1104)(A;OICI;FA;;;WD)(A;OICI;FA;;;BA)
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify network share object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify network share object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Share Information:**
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was modified. Always “**Directory**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Share Name** \[Type = UnicodeString\]**:** the name of the modified share object. The format is: \\\\\*\\SHARE\_NAME
+
+- **Share Path** \[Type = UnicodeString\]**:** the full system (NTFS) path for the added share object. The format is: \\\\??\\PATH. Can be empty, for example for **Share Name**: \\\\\*\\IPC$.
+
+
+
+- **Old Remark** \[Type = UnicodeString\]: the old value of network share “**Comments:**” field. Has “**N/A**” value if it is not set.
+
+- **New Remark** \[Type = UnicodeString\]: the new value of network share “**Comments:**” field. Has “**N/A**” value if it is not set.
+
+- **Old MaxUsers** \[Type = HexInt32\]: old hexadecimal value of “**Limit the number of simultaneous user to:**” field. Has “**0xFFFFFFFF**” value if the number of connections is unlimited.
+
+- **New Maxusers** \[Type = HexInt32\]**:** new hexadecimal value of “**Limit the number of simultaneous user to:**” field. Has “**0xFFFFFFFF**” value if the number of connections is unlimited.
+
+- **Old ShareFlags** \[Type = HexInt32\]: old hexadecimal value of “**Offline Settings**” caching settings window flags.
+
+
+
+- **New ShareFlags** \[Type = HexInt32\]: new hexadecimal value of “**Offline Settings**” caching settings window flags.
+
+- **Old SD** \[Type = UnicodeString\]**:** the old Security Descriptor Definition Language (SDDL) value for network share security descriptor.
+
+- **New SD** \[Type = UnicodeString\]**:** the new Security Descriptor Definition Language (SDDL) value for network share security descriptor.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below:
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 5143(S): A network share object was modified.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have high-value computers for which you need to monitor all modifications to all shares or specific shares (“**Share Name**”), monitor this event**.** For example, you could monitor all changes to the SYSVOL share on domain controllers.
+
diff --git a/windows/keep-secure/event-5144.md b/windows/keep-secure/event-5144.md
new file mode 100644
index 0000000000..18df4dd0df
--- /dev/null
+++ b/windows/keep-secure/event-5144.md
@@ -0,0 +1,106 @@
+---
+title: 5144(S) A network share object was deleted. (Windows 10)
+description: Describes security event 5144(S) A network share object was deleted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5144(S): A network share object was deleted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File Share](audit-file-share.md)
+
+***Event Description:***
+
+This event generates every time a network share object is deleted.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5144
+ 0
+ 0
+ 12808
+ 0
+ 0x8020000000000000
+
+ 268368
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38d12
+ \\\\\*\\Documents
+ C:\\Documents
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete network share object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete network share object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Share Information:**
+
+- **Share Name** \[Type = UnicodeString\]**:** the name of the deleted share object. The format is: \\\\\*\\SHARE\_NAME
+
+- **Share Path** \[Type = UnicodeString\]**:** the full system (NTFS) path for the deleted share object. The format is: \\\\??\\PATH.
+
+## Security Monitoring Recommendations
+
+For 5144(S): A network share object was deleted.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have critical network shares for which you need to monitor all changes (especially, the deletion of that share), monitor for specific “**Share Information\\Share Name”.**
+
+- If you have high-value computers for which you need to monitor all changes (especially, deletion of file shares), monitor for all [5144](event-5144.md) events on these computers**.** For example, you could monitor file shares on domain controllers.
+
diff --git a/windows/keep-secure/event-5145.md b/windows/keep-secure/event-5145.md
new file mode 100644
index 0000000000..defe7dd401
--- /dev/null
+++ b/windows/keep-secure/event-5145.md
@@ -0,0 +1,323 @@
+---
+title: 5145(S, F) A network share object was checked to see whether client can be granted desired access. (Windows 10)
+description: Describes security event 5145(S, F) A network share object was checked to see whether client can be granted desired access.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5145(S, F): A network share object was checked to see whether client can be granted desired access.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Detailed File Share](audit-detailed-file-share.md)
+
+***Event Description:***
+
+This event generates every time network share object (file or folder) was accessed.
+
+*Important*: Failure events are generated only when access is denied at the file share level. No events are generated if access was denied on the file system (NTFS) level.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5145
+ 0
+ 0
+ 12811
+ 0
+ 0x8020000000000000
+
+ 267092
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x38d34
+ File
+ fe80::31ea:6c3c:f40d:1973
+ 56926
+ \\\\\*\\Documents
+ \\??\\C:\\Documents
+ Bginfo.exe
+ 0x100081
+ %%1541 %%4416 %%4423
+ %%1541: %%1801 D:(A;;FA;;;WD) %%4416: %%1801 D:(A;;FA;;;WD) %%4423: %%1801 D:(A;;FA;;;WD)
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested access to network share object. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested access to network share object.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Network Information:**
+
+- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always “**File**” for this event.
+
+ The following table contains the list of the most common **Object Types**:
+
+| Directory | Event | Timer | Device |
+|-------------------------|--------------|----------------------|--------------|
+| Mutant | Type | File | Token |
+| Thread | Section | WindowStation | DebugObject |
+| FilterCommunicationPort | EventPair | Driver | IoCompletion |
+| Controller | SymbolicLink | WmiGuid | Process |
+| Profile | Desktop | KeyedEvent | Adapter |
+| Key | WaitablePort | Callback | Semaphore |
+| Job | Port | FilterConnectionPort | ALPC Port |
+
+- **Source Address** \[Type = UnicodeString\]**:** source IP address from which access was performed.
+
+ - IPv6 address or ::ffff:IPv4 address of a client.
+
+ - ::1 or 127.0.0.1 means localhost.
+
+- **Source Port** \[Type = UnicodeString\]: source TCP or UDP port which was used from remote or local machine to request the access.
+
+ - 0 for local access attempts.
+
+**Share Information:**
+
+- **Share Name** \[Type = UnicodeString\]**:** the name of accessed network share. The format is: \\\\\*\\SHARE\_NAME.
+
+- **Share Path** \[Type = UnicodeString\]**:** the full system (NTFS) path for accessed share. The format is: \\\\??\\PATH. Can be empty, for example for **Share Name**: \\\\\*\\IPC$.
+
+- **Relative Target Name** \[Type = UnicodeString\]**:** relative name of the accessed target file or folder. This file-path is relative to the network share. If access was requested for the share itself, then this field appears as “**\\**”.
+
+**Access Request Information:**
+
+- **Access Mask** \[Type = HexInt32\]: the sum of hexadecimal values of requested access rights. See “Table 13. File access codes.” for different hexadecimal values for access rights.
+
+- **Accesses** \[Type = UnicodeString\]: the list of access rights which were requested by **Subject\\Security ID**. These access rights depend on **Object Type**.
+
+## Table of file access codes
+
+| Access | Hex Value,
Schema Value | Description |
+|-----------------------------------------------------------|----------------------------|---------------|
+| ReadData (or ListDirectory) | 0x1,
%%4416 | **ReadData -** For a file object, the right to read the corresponding file data. For a directory object, the right to read the corresponding directory data.
**ListDirectory -** For a directory, the right to list the contents of the directory. |
+| WriteData (or AddFile) | 0x2,
%%4417 | **WriteData -** For a file object, the right to write data to the file. For a directory object, the right to create a file in the directory (**FILE\_ADD\_FILE**).
**AddFile -** For a directory, the right to create a file in the directory. |
+| AppendData (or AddSubdirectory or CreatePipeInstance) | 0x4,
%%4418 | **AppendData -** For a file object, the right to append data to the file. (For local files, write operations will not overwrite existing data if this flag is specified without **FILE\_WRITE\_DATA**.) For a directory object, the right to create a subdirectory (**FILE\_ADD\_SUBDIRECTORY**).
**AddSubdirectory -** For a directory, the right to create a subdirectory.
**CreatePipeInstance -** For a named pipe, the right to create a pipe. |
+| ReadEA | 0x8,
%%4419 | The right to read extended file attributes. |
+| WriteEA | 0x10,
%%4420 | The right to write extended file attributes. |
+| Execute/Traverse | 0x20,
%%4421 | **Execute** - For a native code file, the right to execute the file. This access right given to scripts may cause the script to be executable, depending on the script interpreter.
**Traverse -** For a directory, the right to traverse the directory. By default, users are assigned the **BYPASS\_TRAVERSE\_CHECKING** [privilege](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379306(v=vs.85).aspx), which ignores the **FILE\_TRAVERSE** [access right](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374902(v=vs.85).aspx). See the remarks in [File Security and Access Rights](https://msdn.microsoft.com/en-us/library/windows/desktop/aa364399(v=vs.85).aspx) for more information. |
+| DeleteChild | 0x40,
%%4422 | For a directory, the right to delete a directory and all the files it contains, including read-only files. |
+| ReadAttributes | 0x80,
%%4423 | The right to read file attributes. |
+| WriteAttributes | 0x100,
%%4424 | The right to write file attributes. |
+| DELETE | 0x10000,
%%1537 | The right to delete the object. |
+| READ\_CONTROL | 0x20000,
%%1538 | The right to read the information in the object's security descriptor, not including the information in the system access control list (SACL). |
+| WRITE\_DAC | 0x40000,
%%1539 | The right to modify the discretionary access control list (DACL) in the object's security descriptor. |
+| WRITE\_OWNER | 0x80000,
%%1540 | The right to change the owner in the object's security descriptor |
+| SYNCHRONIZE | 0x100000,
%%1541 | The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right. |
+| ACCESS\_SYS\_SEC | 0x1000000,
%%1542 | The ACCESS\_SYS\_SEC access right controls the ability to get or set the SACL in an object's security descriptor. |
+
+> Table 13. File access codes.
+
+**Access Check Results** \[Type = UnicodeString\]: the list of access check results. The format of the result is:
+
+REQUESTED\_ACCESS: RESULT ACE\_WHICH\_ ALLOWED\_OR\_DENIED\_ACCESS.
+
+- REQUESTED\_ACCESS – the name of requested access. See [Table of file access codes](#table-of-file-access-codes), earlier in this topic.
+
+- RESULT:
+
+ - Granted by – if access was granted.
+
+ - Denied by – if access was denied.
+
+- ACE\_WHICH\_ ALLOWED\_OR\_DENIED\_ACCESS: the Security Descriptor Definition Language (SDDL) value for Access Control Entry (ACE), which granted or denied access.
+
+> **Note** The ** Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
+
+> Example:
+
+> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
+
+> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
+> See the list of possible values in the table below.
+
+## SDDL values for Access Control Entry
+
+| Value | Description | Value | Description |
+|-------|--------------------------------------|-------|---------------------------------|
+| "AO" | Account operators | "PA" | Group Policy administrators |
+| "RU" | Alias to allow previous Windows 2000 | "IU" | Interactively logged-on user |
+| "AN" | Anonymous logon | "LA" | Local administrator |
+| "AU" | Authenticated users | "LG" | Local guest |
+| "BA" | Built-in administrators | "LS" | Local service account |
+| "BG" | Built-in guests | "SY" | Local system |
+| "BO" | Backup operators | "NU" | Network logon user |
+| "BU" | Built-in users | "NO" | Network configuration operators |
+| "CA" | Certificate server administrators | "NS" | Network service account |
+| "CG" | Creator group | "PO" | Printer operators |
+| "CO" | Creator owner | "PS" | Personal self |
+| "DA" | Domain administrators | "PU" | Power users |
+| "DC" | Domain computers | "RS" | RAS servers group |
+| "DD" | Domain controllers | "RD" | Terminal server users |
+| "DG" | Domain guests | "RE" | Replicator |
+| "DU" | Domain users | "RC" | Restricted code |
+| "EA" | Enterprise administrators | "SA" | Schema administrators |
+| "ED" | Enterprise domain controllers | "SO" | Server operators |
+| "WD" | Everyone | "SU" | Service logon user |
+
+- *G*: = Primary Group.
+- *D*: = DACL Entries.
+- *S*: = SACL Entries.
+
+*DACL/SACL entry format:* entry\_type:inheritance\_flags(ace\_type;ace\_flags;rights;object\_guid;inherit\_object\_guid;account\_sid)
+
+Example: D:(A;;FA;;;WD)
+
+- entry\_type:
+
+“D” - DACL
+
+“S” - SACL
+
+- inheritance\_flags:
+
+"P” - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
+
+"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" Is not also set.
+
+"AR" - SDDL\_AUTO\_INHERIT\_REQ, Child objects inherit permissions from this object.
+
+- ace\_type:
+
+"A" - ACCESS ALLOWED
+
+"D" - ACCESS DENIED
+
+"OA" - OBJECT ACCESS ALLOWED: only applies to a subset of the object(s).
+
+"OD" - OBJECT ACCESS DENIED: only applies to a subset of the object(s).
+
+"AU" - SYSTEM AUDIT
+
+"A" - SYSTEM ALARM
+
+"OU" - OBJECT SYSTEM AUDIT
+
+"OL" - OBJECT SYSTEM ALARM
+
+- ace\_flags:
+
+"CI" - CONTAINER INHERIT: Child objects that are containers, such as directories, inherit the ACE as an explicit ACE.
+
+"OI" - OBJECT INHERIT: Child objects that are not containers inherit the ACE as an explicit ACE.
+
+"NP" - NO PROPAGATE: only immediate children inherit this ace.
+
+"IO" - INHERITANCE ONLY: ace doesn’t apply to this object, but may affect children via inheritance.
+
+"ID" - ACE IS INHERITED
+
+"SA" - SUCCESSFUL ACCESS AUDIT
+
+"FA" - FAILED ACCESS AUDIT
+- rights: A hexadecimal string which denotes the access mask or reserved value, for example: FA (File All Access), FX (File Execute), FW (File Write), etc.
+
+| Value | Description | Value | Description |
+|----------------------------|---------------------------------|----------------------|--------------------------|
+| Generic access rights | Directory service access rights |
+| "GA" | GENERIC ALL | "RC" | Read Permissions |
+| "GR" | GENERIC READ | "SD" | Delete |
+| "GW" | GENERIC WRITE | "WD" | Modify Permissions |
+| "GX" | GENERIC EXECUTE | "WO" | Modify Owner |
+| File access rights | "RP" | Read All Properties |
+| "FA" | FILE ALL ACCESS | "WP" | Write All Properties |
+| "FR" | FILE GENERIC READ | "CC" | Create All Child Objects |
+| "FW" | FILE GENERIC WRITE | "DC" | Delete All Child Objects |
+| "FX" | FILE GENERIC EXECUTE | "LC" | List Contents |
+| Registry key access rights | "SW" | All Validated Writes |
+| "KA" | "LO" | "LO" | List Object |
+| "K" | KEY READ | "DT" | Delete Subtree |
+| "KW" | KEY WRITE | "CR" | All Extended Rights |
+| "KX" | KEY EXECUTE | | |
+
+- object\_guid: N/A
+- inherit\_object\_guid: N/A
+- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. See the table above for more details.
+
+For more information about SDDL syntax, see these articles: , .
+
+## Security Monitoring Recommendations
+
+For 5145(S, F): A network share object was checked to see whether client can be granted desired access.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Monitor this event if the **Network Information\\Source Address** is not from your internal IP range.
+
+- Monitor this event if the **Network Information\\Source Address** should not be able to connect with the specific computer (**Computer:**).
+
+- If you have critical files or folders on specific network shares, for which you need to monitor access attempts (Success and Failure), monitor for specific **Share Information\\Share Name** and **Share Information\\Relative Target Name**.
+
+- If you have domain or local accounts that should only be able to access a specific list of shared files or folders, you can monitor for access attempts outside the allowed list.
+
+- We recommend that you monitor for these **Access Request Information\\Accesses** rights (especially for Failure):
+
+ - WriteData (or AddFile)
+
+ - AppendData (or AddSubdirectory or CreatePipeInstance)
+
+ - WriteEA
+
+ - DeleteChild
+
+ - WriteAttributes
+
+ - DELETE
+
+ - WRITE\_DAC
+
+ - WRITE\_OWNER
+
+
+
diff --git a/windows/keep-secure/event-5148.md b/windows/keep-secure/event-5148.md
new file mode 100644
index 0000000000..7f25c44c05
--- /dev/null
+++ b/windows/keep-secure/event-5148.md
@@ -0,0 +1,41 @@
+---
+title: 5148(F) The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. (Windows 10)
+description: Describes security event 5148(F) The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5148(F): The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+In most circumstances, this event occurs very rarely. It is designed to be generated when an ICPM DoS attack starts or was detected.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Schema:***
+
+*The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.*
+
+*Network Information:*
+
+> *Type:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of ICMP DoS attack or, among other things, hardware or network device related problems. In both cases, we recommend triggering an alert and investigating the reason the event was generated.
+
diff --git a/windows/keep-secure/event-5149.md b/windows/keep-secure/event-5149.md
new file mode 100644
index 0000000000..d50b0bb76b
--- /dev/null
+++ b/windows/keep-secure/event-5149.md
@@ -0,0 +1,43 @@
+---
+title: 5149(F) The DoS attack has subsided and normal processing is being resumed. (Windows 10)
+description: Describes security event 5149(F) The DoS attack has subsided and normal processing is being resumed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5149(F): The DoS attack has subsided and normal processing is being resumed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+In most circumstances, this event occurs very rarely. It is designed to be generated when an ICPM DoS attack ended.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Schema:***
+
+*The DoS attack has subsided and normal processing is being resumed.*
+
+*Network Information:*
+
+> *Type:%1*
+>
+> *Packets Discarded:%2*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- This event can be a sign of ICMP DoS attack or, among other things, hardware or network device related problems. In both cases, we recommend triggering an alert and investigating the reason the event was generated.
+
diff --git a/windows/keep-secure/event-5150.md b/windows/keep-secure/event-5150.md
new file mode 100644
index 0000000000..4d63a3d41e
--- /dev/null
+++ b/windows/keep-secure/event-5150.md
@@ -0,0 +1,61 @@
+---
+title: 5150(-) The Windows Filtering Platform blocked a packet. (Windows 10)
+description: Describes security event 5150(-) The Windows Filtering Platform blocked a packet.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5150(-): The Windows Filtering Platform blocked a packet.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is logged if the Windows Filtering Platform [MAC filter](https://msdn.microsoft.com/en-us/library/windows/hardware/hh440262(v=vs.85).aspx) blocked a packet.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Schema:***
+
+*The Windows Filtering Platform has blocked a packet.*
+
+*Network Information:*
+
+> *Direction:%1*
+>
+> *Source Address:%2*
+>
+> *Destination Address:%3*
+>
+> *EtherType:%4*
+>
+> *MediaType:%5*
+>
+> *InterfaceType:%6*
+>
+> *VlanTag:%7*
+
+*Filter Information:*
+
+> *Filter Run-Time ID:%8*
+>
+> *Layer Name:%9*
+>
+> *Layer Run-Time ID:%10 *
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5151.md b/windows/keep-secure/event-5151.md
new file mode 100644
index 0000000000..b37ebfdcff
--- /dev/null
+++ b/windows/keep-secure/event-5151.md
@@ -0,0 +1,61 @@
+---
+title: 5151(-) A more restrictive Windows Filtering Platform filter has blocked a packet. (Windows 10)
+description: Describes security event 5151(-) A more restrictive Windows Filtering Platform filter has blocked a packet.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5151(-): A more restrictive Windows Filtering Platform filter has blocked a packet.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is logged if a more restrictive Windows Filtering Platform [MAC filter](https://msdn.microsoft.com/en-us/library/windows/hardware/hh440262(v=vs.85).aspx) has blocked a packet.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Schema:***
+
+*A more restrictive Windows Filtering Platform filter has blocked a packet.*
+
+*Network Information:*
+
+> *Direction:%1*
+>
+> *Source Address:%2*
+>
+> *Destination Address:%3*
+>
+> *EtherType:%4*
+>
+> *MediaType:%5*
+>
+> *InterfaceType:%6*
+>
+> *VlanTag:%7*
+
+*Filter Information:*
+
+> *Filter Run-Time ID:%8*
+>
+> *Layer Name:%9*
+>
+> *Layer Run-Time ID:%10 *
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012, Windows 8.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5152.md b/windows/keep-secure/event-5152.md
new file mode 100644
index 0000000000..d106c21fad
--- /dev/null
+++ b/windows/keep-secure/event-5152.md
@@ -0,0 +1,185 @@
+---
+title: 5152(F) The Windows Filtering Platform blocked a packet. (Windows 10)
+description: Describes security event 5152(F) The Windows Filtering Platform blocked a packet.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5152(F): The Windows Filtering Platform blocked a packet.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Packet Drop](audit-filtering-platform-packet-drop.md)
+
+***Event Description:***
+
+This event generates when [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) has blocked a network packet.
+
+This event is generated for every received network packet.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5152
+ 0
+ 0
+ 12809
+ 0
+ 0x8010000000000000
+
+ 321323
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4556
+ \\device\\harddiskvolume2\\documents\\listener.exe
+ %%14592
+ 10.0.0.100
+ 49278
+ 10.0.0.10
+ 3333
+ 6
+ 0
+ %%14610
+ 44
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Application Information**:
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process to which blocked network packet was sent. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+ Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**:
+
+
+
+**Network Information:**
+
+- **Direction** \[Type = UnicodeString\]: direction of blocked connection.
+
+ - Inbound – for inbound connections.
+
+ - Outbound – for unbound connections.
+
+- **Source Address** \[Type = UnicodeString\]**:** local IP address on which application received the packet.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Source Port** \[Type = UnicodeString\]**:** port number on which application received the packet.
+
+- **Destination Address** \[Type = UnicodeString\]**:** IP address ***from*** which packet was received or initiated.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Destination Port** \[Type = UnicodeString\]**:** port number which was used from remote machine to send the packet.
+
+- **Protocol** \[Type = UInt32\]: number of protocol which was used.
+
+| Service | Protocol Number |
+|----------------------------------------------------|-----------------|
+| Internet Control Message Protocol (ICMP) | 1 |
+| Transmission Control Protocol (TCP) | 6 |
+| User Datagram Protocol (UDP) | 17 |
+| General Routing Encapsulation (PPTP data over GRE) | 47 |
+| Authentication Header (AH) IPSec | 51 |
+| Encapsulation Security Payload (ESP) IPSec | 50 |
+| Exterior Gateway Protocol (EGP) | 8 |
+| Gateway-Gateway Protocol (GGP) | 3 |
+| Host Monitoring Protocol (HMP) | 20 |
+| Internet Group Management Protocol (IGMP) | 88 |
+| MIT Remote Virtual Disk (RVD) | 66 |
+| OSPF Open Shortest Path First | 89 |
+| PARC Universal Packet Protocol (PUP) | 12 |
+| Reliable Datagram Protocol (RDP) | 27 |
+| Reservation Protocol (RSVP) QoS | 46 |
+
+**Filter Information:**
+
+- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which blocked the packet.
+
+ To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As result of this command **filters.xml** file will be generated. You need to open this file and find specific substring with required filter ID (**<filterId>**)**,** for example:
+
+
+
+- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363971(v=vs.85).aspx) layer name.
+
+- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example:
+
+
+
+## Security Monitoring Recommendations
+
+For 5152(F): The Windows Filtering Platform blocked a packet.
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
+- Check that **Source Address** is one of the addresses assigned to the computer.
+
+- If the computer or device should not have access to the Internet, or contains only applications that don’t connect to the Internet, monitor for [5152](event-5152.md) events where **Destination Address** is an IP address from the Internet (not from private IP ranges).
+
+- If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.”
+
+- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in **“Destination Address”** that are not in the whitelist.
+
+- If you need to monitor all inbound connections to a specific local port, monitor for [5152](event-5152.md) events with that “**Source Port**.**”**
+
+- Monitor for all connections with a “**Protocol Number”** that is not typical for this device or compter, for example, anything other than 1, 6, or 17.
+
+- If the computer’s communication with “**Destination Address”** should always use a specific “**Destination Port**,**”** monitor for any other “**Destination Port**.”
+
diff --git a/windows/keep-secure/event-5153.md b/windows/keep-secure/event-5153.md
new file mode 100644
index 0000000000..9f5a9081bd
--- /dev/null
+++ b/windows/keep-secure/event-5153.md
@@ -0,0 +1,59 @@
+---
+title: 5153(S) A more restrictive Windows Filtering Platform filter has blocked a packet. (Windows 10)
+description: Describes security event 5153(S) A more restrictive Windows Filtering Platform filter has blocked a packet.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5153(S): A more restrictive Windows Filtering Platform filter has blocked a packet.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is logged if a more restrictive Windows Filtering Platform filter has blocked a packet.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Filtering Platform Packet Drop](audit-filtering-platform-packet-drop.md)
+
+***Event Schema:***
+
+*A more restrictive Windows Filtering Platform filter has blocked a packet.*
+
+*Application Information:*
+
+> *Process ID:%1*
+>
+> *Application Name:%2*
+
+*Network Information:*
+
+> *Source Address:%3*
+>
+> *Source Port:%4*
+>
+> *Protocol:%5*
+
+*Filter Information:*
+
+> *Filter Run-Time ID:%6*
+>
+> *Layer Name:%7*
+>
+> *Layer Run-Time ID:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5154.md b/windows/keep-secure/event-5154.md
new file mode 100644
index 0000000000..b5362105d2
--- /dev/null
+++ b/windows/keep-secure/event-5154.md
@@ -0,0 +1,144 @@
+---
+title: 5154(S) The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. (Windows 10)
+description: Describes security event 5154(S) The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5154(S): The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Description:***
+
+This event generates every time [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) permits an application or service to listen on a port.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5154
+ 0
+ 0
+ 12810
+ 0
+ 0x8020000000000000
+
+ 287929
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4152
+ \\device\\harddiskvolume2\\documents\\listener.exe
+ 0.0.0.0
+ 4444
+ 6
+ 0
+ %%14609
+ 40
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Application Information**:
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which was permitted to listen on the port. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+ Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**:
+
+
+
+**Network Information:**
+
+- **Source Address** \[Type = UnicodeString\]**:** local IP address on which application requested to listen on the port.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Source Port** \[Type = UnicodeString\]: source TCP\\UDP port number which was requested for listening by application.
+
+- **Protocol** \[Type = UInt32\]: protocol number. For example:
+
+ - 6 – TCP.
+
+ - 17 – UDP.
+
+ More information about possible values for this field: .
+
+**Filter Information:**
+
+- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which allows application to listen on the specific port. By default Windows firewall won't prevent a port from being listened by an application and if this application doesn’t match any filters you will get value **0** in this field.
+
+ To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As result of this command **filters.xml** file will be generated. You need to open this file and find specific substring with required filter ID (**<filterId>**)**,** for example:
+
+
+
+- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363971(v=vs.85).aspx) layer name.
+
+- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example:
+
+
+
+## Security Monitoring Recommendations
+
+For 5154(S): The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.
+
+- If you have a “whitelist” of applications that are associated with certain operating systems or server roles, and that are expected to listen on specific ports, monitor this event for **“Application Name”** and other relevant information.
+
+- If a certain application is allowed to listen only on specific port numbers, monitor this event for **“Application Name”** and **“Network Information\\Source Port**.**”**
+
+- If a certain application is allowed to listen only on a specific IP address, monitor this event for **“Application Name”** and **“Network Information\\Source Address**.**”**
+
+- If a certain application is allowed to use only TCP or UDP protocols, monitor this event for **“Application Name”** and the protocol number in **“Network Information\\Protocol**.**”**
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
+- Typically this event has an informational purpose.
+
diff --git a/windows/keep-secure/event-5155.md b/windows/keep-secure/event-5155.md
new file mode 100644
index 0000000000..1ab050cf24
--- /dev/null
+++ b/windows/keep-secure/event-5155.md
@@ -0,0 +1,61 @@
+---
+title: 5155(F) The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. (Windows 10)
+description: Describes security event 5155(F) The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5155(F): The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+By default Windows firewall won't prevent a port from being listened by an application. In the other word, Windows system will not generate Event 5155 by itself.
+
+You can add your own filters using the WFP APIs to block listen to reproduce this event: .
+
+There is no event example in this document.
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Schema:***
+
+*The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.*
+
+*Application Information:*
+
+> *Process ID:%1*
+>
+> *Application Name:%2*
+
+*Network Information:*
+
+> *Source Address:%3*
+>
+> *Source Port:%4*
+>
+> *Protocol:%5*
+
+*Filter Information:*
+
+> *Filter Run-Time ID:%6*
+>
+> *Layer Name:%7*
+>
+> *Layer Run-Time ID:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- If you use Windows Filtering Platform APIs to block application or services from listening on a port, then you can use this event for troubleshooting and monitoring.
+
diff --git a/windows/keep-secure/event-5156.md b/windows/keep-secure/event-5156.md
new file mode 100644
index 0000000000..d9f761b96c
--- /dev/null
+++ b/windows/keep-secure/event-5156.md
@@ -0,0 +1,185 @@
+---
+title: 5156(S) The Windows Filtering Platform has permitted a connection. (Windows 10)
+description: Describes security event 5156(S) The Windows Filtering Platform has permitted a connection.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5156(S): The Windows Filtering Platform has permitted a connection.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Description:***
+
+This event generates when [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) has allowed a connection.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5156
+ 1
+ 0
+ 12810
+ 0
+ 0x8020000000000000
+
+ 308129
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4556
+ \\device\\harddiskvolume2\\documents\\listener.exe
+ %%14592
+ 10.0.0.10
+ 3333
+ 10.0.0.100
+ 49278
+ 6
+ 70201
+ %%14610
+ 44
+ S-1-0-0
+ S-1-0-0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Application Information**:
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which received the connection. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+ Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**:
+
+
+
+**Network Information:**
+
+- **Direction** \[Type = UnicodeString\]: direction of allowed connection.
+
+ - Inbound – for inbound connections.
+
+ - Outbound – for unbound connections.
+
+- **Source Address** \[Type = UnicodeString\]**:** local IP address on which application received the connection.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Source Port** \[Type = UnicodeString\]**:** port number on which application received the connection.
+
+- **Destination Address** \[Type = UnicodeString\]**:** IP address ***from*** which connection was received or initiated.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Destination Port** \[Type = UnicodeString\]**:** port number which was used from remote machine to initiate connection.
+
+- **Protocol** \[Type = UInt32\]: number of protocol which was used.
+
+| Service | Protocol Number |
+|----------------------------------------------------|-----------------|
+| Internet Control Message Protocol (ICMP) | 1 |
+| Transmission Control Protocol (TCP) | 6 |
+| User Datagram Protocol (UDP) | 17 |
+| General Routing Encapsulation (PPTP data over GRE) | 47 |
+| Authentication Header (AH) IPSec | 51 |
+| Encapsulation Security Payload (ESP) IPSec | 50 |
+| Exterior Gateway Protocol (EGP) | 8 |
+| Gateway-Gateway Protocol (GGP) | 3 |
+| Host Monitoring Protocol (HMP) | 20 |
+| Internet Group Management Protocol (IGMP) | 88 |
+| MIT Remote Virtual Disk (RVD) | 66 |
+| OSPF Open Shortest Path First | 89 |
+| PARC Universal Packet Protocol (PUP) | 12 |
+| Reliable Datagram Protocol (RDP) | 27 |
+| Reservation Protocol (RSVP) QoS | 46 |
+
+**Filter Information:**
+
+- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which allowed the connection.
+
+ To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As result of this command **filters.xml** file will be generated. You need to open this file and find specific substring with required filter ID (**<filterId>**)**,** for example:
+
+
+
+- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363971(v=vs.85).aspx) layer name.
+
+- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example:
+
+
+
+## Security Monitoring Recommendations
+
+For 5156(S): The Windows Filtering Platform has permitted a connection.
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
+- Check that “**Source Address”** is one of the addresses assigned to the computer.
+
+- If the computer or device should not have access to the Internet, or contains only applications that don’t connect to the Internet, monitor for [5156](event-5156.md) events where “**Destination Address”** is an IP address from the Internet (not from private IP ranges).
+
+- If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.**”**
+
+- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the whitelist.
+
+- If you need to monitor all inbound connections to a specific local port, monitor for [5156](event-5156.md) events with that “**Source Port**.**”**
+
+- Monitor for all connections with a “**Protocol Number”** that is not typical for this device or compter, for example, anything other than 1, 6, or 17.
+
+- If the computer’s communication with “**Destination Address”** should always use a specific “**Destination Port**,**”** monitor for any other “**Destination Port**.”
+
diff --git a/windows/keep-secure/event-5157.md b/windows/keep-secure/event-5157.md
new file mode 100644
index 0000000000..fe9fb634f0
--- /dev/null
+++ b/windows/keep-secure/event-5157.md
@@ -0,0 +1,185 @@
+---
+title: 5157(F) The Windows Filtering Platform has blocked a connection. (Windows 10)
+description: Describes security event 5157(F) The Windows Filtering Platform has blocked a connection.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5157(F): The Windows Filtering Platform has blocked a connection.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Description:***
+
+This event generates when [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) has blocked a connection.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5157
+ 1
+ 0
+ 12810
+ 0
+ 0x8010000000000000
+
+ 304390
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4556
+ \\device\\harddiskvolume2\\documents\\listener.exe
+ %%14592
+ 10.0.0.10
+ 3333
+ 10.0.0.100
+ 49218
+ 6
+ 110398
+ %%14610
+ 44
+ S-1-0-0
+ S-1-0-0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Application Information**:
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted to create the connection. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+ Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**:
+
+
+
+**Network Information:**
+
+- **Direction** \[Type = UnicodeString\]: direction of blocked connection.
+
+ - Inbound – for inbound connections.
+
+ - Outbound – for unbound connections.
+
+- **Source Address** \[Type = UnicodeString\]**:** local IP address on which application received the connection.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Source Port** \[Type = UnicodeString\]**:** port number on which application received the connection.
+
+- **Destination Address** \[Type = UnicodeString\]**:** IP address ***from*** which connection was received or initiated.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Destination Port** \[Type = UnicodeString\]**:** port number which was used from remote machine to initiate connection.
+
+- **Protocol** \[Type = UInt32\]: number of protocol which was used.
+
+| Service | Protocol Number |
+|----------------------------------------------------|-----------------|
+| Internet Control Message Protocol (ICMP) | 1 |
+| Transmission Control Protocol (TCP) | 6 |
+| User Datagram Protocol (UDP) | 17 |
+| General Routing Encapsulation (PPTP data over GRE) | 47 |
+| Authentication Header (AH) IPSec | 51 |
+| Encapsulation Security Payload (ESP) IPSec | 50 |
+| Exterior Gateway Protocol (EGP) | 8 |
+| Gateway-Gateway Protocol (GGP) | 3 |
+| Host Monitoring Protocol (HMP) | 20 |
+| Internet Group Management Protocol (IGMP) | 88 |
+| MIT Remote Virtual Disk (RVD) | 66 |
+| OSPF Open Shortest Path First | 89 |
+| PARC Universal Packet Protocol (PUP) | 12 |
+| Reliable Datagram Protocol (RDP) | 27 |
+| Reservation Protocol (RSVP) QoS | 46 |
+
+**Filter Information:**
+
+- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which blocked the connection.
+
+ To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As result of this command **filters.xml** file will be generated. You need to open this file and find specific substring with required filter ID (**<filterId>**)**,** for example:
+
+
+
+- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363971(v=vs.85).aspx) layer name.
+
+- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example:
+
+
+
+## Security Monitoring Recommendations
+
+For 5157(F): The Windows Filtering Platform has blocked a connection.
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
+- Check that “**Source Address”** is one of the addresses assigned to the computer.
+
+- If the\` computer or device should not have access to the Internet, or contains only applications that don’t connect to the Internet, monitor for [5157](event-5157.md) events where “**Destination Address”** is an IP address from the Internet (not from private IP ranges).
+
+- If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.**”**
+
+- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the whitelist.
+
+- If you need to monitor all inbound connections to a specific local port, monitor for [5157](event-5157.md) events with that “**Source Port**.**”**
+
+- Monitor for all connections with a “**Protocol Number”** that is not typical for this device or compter, for example, anything other than 1, 6, or 17.
+
+- If the computer’s communication with “**Destination Address”** should always use a specific “**Destination Port**,**”** monitor for any other “**Destination Port**.”
+
diff --git a/windows/keep-secure/event-5158.md b/windows/keep-secure/event-5158.md
new file mode 100644
index 0000000000..3f28870be7
--- /dev/null
+++ b/windows/keep-secure/event-5158.md
@@ -0,0 +1,156 @@
+---
+title: 5158(S) The Windows Filtering Platform has permitted a bind to a local port. (Windows 10)
+description: Describes security event 5158(S) The Windows Filtering Platform has permitted a bind to a local port.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5158(S): The Windows Filtering Platform has permitted a bind to a local port.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Description:***
+
+This event generates every time [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) permits an application or service to bind to a local port.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5158
+ 0
+ 0
+ 12810
+ 0
+ 0x8020000000000000
+
+ 308122
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 4556
+ \\device\\harddiskvolume2\\documents\\listener.exe
+ 0.0.0.0
+ 3333
+ 6
+ 0
+ %%14608
+ 36
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Application Information**:
+
+- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which was permitted to bind to the local port. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column):
+
+
+
+ If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
+
+ You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**.
+
+
+
+- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
+
+ Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**:
+
+
+
+**Network Information:**
+
+- **Source Address** \[Type = UnicodeString\]**:** local IP address on which application was bind the port.
+
+ - IPv4 Address
+
+ - IPv6 Address
+
+ - :: - all IP addresses in IPv6 format
+
+ - 0.0.0.0 - all IP addresses in IPv4 format
+
+ - 127.0.0.1 , ::1 - localhost
+
+- **Source Port** \[Type = UnicodeString\]**:** port number which application was bind.
+
+- **Protocol** \[Type = UInt32\]: number of protocol which was used.
+
+| Service | Protocol Number |
+|----------------------------------------------------|-----------------|
+| Internet Control Message Protocol (ICMP) | 1 |
+| Transmission Control Protocol (TCP) | 6 |
+| User Datagram Protocol (UDP) | 17 |
+| General Routing Encapsulation (PPTP data over GRE) | 47 |
+| Authentication Header (AH) IPSec | 51 |
+| Encapsulation Security Payload (ESP) IPSec | 50 |
+| Exterior Gateway Protocol (EGP) | 8 |
+| Gateway-Gateway Protocol (GGP) | 3 |
+| Host Monitoring Protocol (HMP) | 20 |
+| Internet Group Management Protocol (IGMP) | 88 |
+| MIT Remote Virtual Disk (RVD) | 66 |
+| OSPF Open Shortest Path First | 89 |
+| PARC Universal Packet Protocol (PUP) | 12 |
+| Reliable Datagram Protocol (RDP) | 27 |
+| Reservation Protocol (RSVP) QoS | 46 |
+
+**Filter Information:**
+
+- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which allows application to bind the port. By default Windows firewall won't prevent a port from being binded by an application and if this application doesn’t match any filters you will get value 0 in this field.
+
+ To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As result of this command **filters.xml** file will be generated. You need to open this file and find specific substring with required filter ID (**<filterId>**)**,** for example:
+
+
+
+- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/en-us/library/windows/desktop/aa363971(v=vs.85).aspx) layer name.
+
+- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example:
+
+
+
+## Security Monitoring Recommendations
+
+For 5158(S): The Windows Filtering Platform has permitted a bind to a local port.
+
+- If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application.
+
+- You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
+
+- If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”
+
+- Check that “**Source Address”** is one of the addresses assigned to the computer.
+
+- If you need to monitor all actions with a specific local port, monitor for [5158](event-5158.md) events with that “**Source Port.”**
+
+- Monitor for all connections with a “**Protocol Number”** that is not typical for this device or compter, for example, anything other than 6 or 17.
+
+- If the computer’s communication with “**Destination Address”** should always use a specific “**Destination Port**,**”** monitor for any other “**Destination Port**.”
+
diff --git a/windows/keep-secure/event-5159.md b/windows/keep-secure/event-5159.md
new file mode 100644
index 0000000000..0904b2d8d5
--- /dev/null
+++ b/windows/keep-secure/event-5159.md
@@ -0,0 +1,59 @@
+---
+title: 5159(F) The Windows Filtering Platform has blocked a bind to a local port. (Windows 10)
+description: Describes security event 5159(F) The Windows Filtering Platform has blocked a bind to a local port.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5159(F): The Windows Filtering Platform has blocked a bind to a local port.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event is logged if the Windows Filtering Platform has blocked a bind to a local port.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md)
+
+***Event Schema:***
+
+*The Windows Filtering Platform has blocked a bind to a local port.*
+
+*Application Information:*
+
+> *Process ID:%1*
+>
+> *Application Name:%2*
+
+*Network Information:*
+
+> *Source Address:%3*
+>
+> *Source Port:%4*
+>
+> *Protocol:%5*
+
+*Filter Information:*
+
+> *Filter Run-Time ID:%6*
+>
+> *Layer Name:%7*
+>
+> *Layer Run-Time ID:%8*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5168.md b/windows/keep-secure/event-5168.md
new file mode 100644
index 0000000000..f9f2941bb6
--- /dev/null
+++ b/windows/keep-secure/event-5168.md
@@ -0,0 +1,119 @@
+---
+title: 5168(F) SPN check for SMB/SMB2 failed. (Windows 10)
+description: Describes security event 5168(F) SPN check for SMB/SMB2 failed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5168(F): SPN check for SMB/SMB2 failed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit File Share](audit-file-share.md)
+
+***Event Description:***
+
+This event generates when SMB SPN check fails.
+
+It often happens because of NTLMv1 or LM protocols usage from client side when “[Microsoft Network Server: Server SPN target name validation level](https://technet.microsoft.com/en-us/library/jj852272.aspx)” group policy set to “Require from client” on server side. SPN only sent to server when NTLMv2 or Kerberos protocols are used, and after that SPN can be validated.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5168
+ 0
+ 0
+ 12808
+ 0
+ 0x8010000000000000
+
+ 268946
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0xd0cd4
+ N/A
+ 0xc0000022
+ CONTOSO;contoso.local;DC01.contoso.local;DC01;LocalHost;
+ N/A
+ 127.0.0.1;::1;10.0.0.10;;fe80::31ea:6c3c:f40d:1973;;fe80::5efe:10.0.0.10;
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account for which SPN check operation was failed. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which SPN check operation was failed.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**SPN**:
+
+- **SPN Name** \[Type = UnicodeString\]: SPN which was used to access the server. If SPN was not provided, then the value will be “N/A”.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Error Code** \[Type = HexInt32\]: hexadecimal error code, for example “0xC0000022” = STATUS\_ACCESS\_DENIED. You can find description for all SMB error codes here: .
+
+**Server Information**:
+
+- **Server Names** \[Type = UnicodeString\]: information about possible server names to use to access the target server (NETBIOS, DNS, localhost, etc.).
+
+- **Configured Names** \[Type = UnicodeString\]: information about the names which were provided for validation. If no information was provided the value will be “**N/A**”.
+
+- **IP Addresses** \[Type = UnicodeString\]: information about possible IP addresses to use to access the target server (IPv4, IPv6).
+
+## Security Monitoring Recommendations
+
+For 5168(F): SPN check for SMB/SMB2 failed.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- We recommend monitoring for any [5168](event-5168.md) event, because it can be a sign of a configuration issue or a malicious authentication attempt.
+
diff --git a/windows/keep-secure/event-5376.md b/windows/keep-secure/event-5376.md
new file mode 100644
index 0000000000..abf37d856d
--- /dev/null
+++ b/windows/keep-secure/event-5376.md
@@ -0,0 +1,100 @@
+---
+title: 5376(S) Credential Manager credentials were backed up. (Windows 10)
+description: Describes security event 5376(S) Credential Manager credentials were backed up.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5376(S): Credential Manager credentials were backed up.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time the user (**Subject**) successfully backs up the [credential manager](https://technet.microsoft.com/library/jj554668.aspx) database.
+
+Typically this can be done by clicking “Back up Credentials” in Credential Manager in the Control Panel.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5376
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175779
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d7c
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the backup operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the backup operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+## Security Monitoring Recommendations
+
+For 5376(S): Credential Manager credentials were backed up.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Every [5376](event-5376.md) event should be recorded for all local and domain accounts, because this action (back up Credential Manager) is very rarely used by users and can indicate a virus, or other harmful or malicious activity.
+
diff --git a/windows/keep-secure/event-5377.md b/windows/keep-secure/event-5377.md
new file mode 100644
index 0000000000..7984897329
--- /dev/null
+++ b/windows/keep-secure/event-5377.md
@@ -0,0 +1,100 @@
+---
+title: 5377(S) Credential Manager credentials were restored from a backup. (Windows 10)
+description: Describes security event 5377(S) Credential Manager credentials were restored from a backup.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5377(S): Credential Manager credentials were restored from a backup.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit User Account Management](audit-user-account-management.md)
+
+***Event Description:***
+
+This event generates every time the user (**Subject**) successfully restores the [credential manager](https://technet.microsoft.com/library/jj554668.aspx) database.
+
+Typically this can be done by clicking “Restore Credentials” in Credential Manager in the Control Panel.
+
+This event generates on domain controllers, member servers, and workstations.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5377
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+ 175780
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x30d7c
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that performed the restore operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that performed the restore operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+## Security Monitoring Recommendations
+
+For 5377(S): Credential Manager credentials were restored from a backup.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Every [5377](event-5377.md) event should be recorded for all local and domain accounts, because this action (restore Credential Manager credentials from a backup) is very rarely used by users, and can indicate a virus, or other harmful or malicious activity.
+
diff --git a/windows/keep-secure/event-5378.md b/windows/keep-secure/event-5378.md
new file mode 100644
index 0000000000..2de862ac9c
--- /dev/null
+++ b/windows/keep-secure/event-5378.md
@@ -0,0 +1,122 @@
+---
+title: 5378(F) The requested credentials delegation was disallowed by policy. (Windows 10)
+description: Describes security event 5378(F) The requested credentials delegation was disallowed by policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5378(F): The requested credentials delegation was disallowed by policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event generates requested [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) credentials delegation was disallowed by [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) delegation policy.
+
+It typically occurs when [CredSSP](https://msdn.microsoft.com/en-us/library/cc226764.aspx) delegation for [WinRM](https://msdn.microsoft.com/en-us/library/aa384426(v=vs.85).aspx) [double-hop](https://msdn.microsoft.com/en-us/library/ee309365(v=vs.85).aspx) session was not set properly.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5378
+ 0
+ 0
+ 12551
+ 0
+ 0x8010000000000000
+
+ 1198733
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 0x2b1e04
+ CREDSSP
+ dadmin@contoso
+ WSMAN/dc01.contoso.local
+ %%8098
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested credentials delegation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested credentials delegation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Credential Delegation Information:**
+
+- **Security Package** \[Type = UnicodeString\]: the name of [Security Package](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380501(v=vs.85).aspx) which was used. Always **CREDSSP** for this event.
+
+- **User's UPN** \[Type = UnicodeString\]: [UPN](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380525(v=vs.85).aspx) of the account for which delegation was requested.
+
+- **Target Server** \[Type = UnicodeString\]: SPN of the target service for which delegation was requested.
+
+> **Note** **Service Principal Name (SPN)** is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN. A given service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running, so a service instance might register an SPN for each name or alias of its host.
+
+- **Credential Type** \[Type = UnicodeString\]: types of credentials which were presented for delegation:
+
+| Credentials Type | Description |
+|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------|
+| Default credentials | The credentials obtained when the user first logs on to Windows. |
+| Fresh credentials | The credentials that the user is prompted for when executing an application. |
+| Saved credentials | The credentials that are saved using [Credential Manager](https://msdn.microsoft.com/en-us/library/windows/desktop/aa374792(v=vs.85).aspx). |
+
+## Security Monitoring Recommendations
+
+For 5378(F): The requested credentials delegation was disallowed by policy.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have defined CredSSP delegation policy, then this event will show you policy violations. We recommend collecting these events and investigating every policy violation.
+
+- This event also can be used for CredSSP delegation troubleshooting.
+
diff --git a/windows/keep-secure/event-5447.md b/windows/keep-secure/event-5447.md
new file mode 100644
index 0000000000..a17127df05
--- /dev/null
+++ b/windows/keep-secure/event-5447.md
@@ -0,0 +1,86 @@
+---
+title: 5447(S) A Windows Filtering Platform filter has been changed. (Windows 10)
+description: Describes security event 5447(S) A Windows Filtering Platform filter has been changed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5447(S): A Windows Filtering Platform filter has been changed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates every time a [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) filter has been changed.
+
+It typically generates during Group Policy update procedures.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5447
+ 0
+ 0
+ 13573
+ 0
+ 0x8020000000000000
+
+ 1060216
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 284
+ S-1-5-19
+ NT AUTHORITY\\LOCAL SERVICE
+ {DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62}
+ Microsoft Corporation
+ %%16385
+ {91334E6D-FFAB-40F1-8C43-5554965C228D}
+ Port Scanning Prevention Filter
+ %%16388
+ 100100
+ {AC4A9833-F69D-4648-B261-6DC84835EF39}
+ Inbound Transport v4 Discard Layer
+ 13
+ 13835058055315718144
+ Condition ID: {632ce23b-5167-435c-86d7-e903684aa80c} Match value: No flags set Condition value: 0x00000003
+ %%16391
+ {EDA08606-2494-4D78-89BC-67837C03B969}
+ WFP Built-in Silent Drop Transport v4 Discard Layer Callout
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+For 5447(S): A Windows Filtering Platform filter has been changed.
+
+- This event mainly used for Windows Filtering Platform troubleshooting and typically has little to no security relevance.
+
diff --git a/windows/keep-secure/event-5632.md b/windows/keep-secure/event-5632.md
new file mode 100644
index 0000000000..b247130082
--- /dev/null
+++ b/windows/keep-secure/event-5632.md
@@ -0,0 +1,140 @@
+---
+title: 5632(S, F) A request was made to authenticate to a wireless network. (Windows 10)
+description: Describes security event 5632(S, F) A request was made to authenticate to a wireless network.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5632(S, F): A request was made to authenticate to a wireless network.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event generates when [802.1x](https://technet.microsoft.com/en-us/library/hh831831.aspx) authentication attempt was made for wireless network.
+
+It typically generates when network adapter connects to new wireless network.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5632
+ 1
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 44113845
+
+
+ Security
+ XXXXXXX.redmond.corp.microsoft.com
+
+
+-
+ Nokia
+ host/XXXXXXXX.redmond.corp.microsoft.com
+ -
+ -
+ 0x0
+ 18:64:72:F3:33:91
+ 02:1A:C5:14:59:C9
+ {2BB33827-6BB6-48DB-8DE6-DB9E0B9F9C9B}
+ 0x0
+ The operation was successful.
+ 0x0
+ 0x0
+
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = UnicodeString\]**:** User Principal Name (UPN) or another type of account identifier for which 802.1x authentication request was made.
+
+> **Note** [User principal name](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380525(v=vs.85).aspx) (UPN) format is used to specify an Internet-style name, such as UserName@Example.Microsoft.com.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which 802.1x authentication request was made.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Network Information:**
+
+- **Name (SSID)** \[Type = UnicodeString\]**:** SSID of the wireless network to which authentication request was sent.
+
+> **Note** A **service set identifier (SSID)** is a sequence of characters that uniquely names a wireless local area network (WLAN). An SSID is sometimes referred to as a "network name." This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area.
+
+- **Interface GUID** \[Type = GUID\]**:** GUID of the network interface which was used for authentication request.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+You can see interface’s GUID using the following commands:
+
+- “netsh lan show interfaces” – for wired interfaces.
+
+- “netsh wlan show interfaces” – for wireless interfaces.
+
+
+
+- **Local MAC Address** \[Type = UnicodeString\]**:** local interface’s MAC-address.
+
+- **Peer MAC Address** \[Type = UnicodeString\]**:** peer’s (typically – access point) MAC-address.
+
+**Additional Information:**
+
+- **Reason Code** \[Type = UnicodeString\]**:** contains Reason Text (explanation of Reason Code) and Reason Code for wireless authentication results. See more information about reason codes for wireless authentication here: , .
+
+- **Error Code** \[Type = HexInt32\]**:** there is no information about this field in this document.
+
+- **EAP Reason Code** \[Type = HexInt32\]**:** there is no information about this field in this document. See additional information here: .
+
+- **EAP Root Cause String** \[Type = UnicodeString\]**:** there is no information about this field in this document.
+
+- **EAP Error Code** \[Type = HexInt32\]**:** there is no information about this field in this document.
+
+## Security Monitoring Recommendations
+
+For 5632(S, F): A request was made to authenticate to a wireless network.
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5633.md b/windows/keep-secure/event-5633.md
new file mode 100644
index 0000000000..f1e46ce4cf
--- /dev/null
+++ b/windows/keep-secure/event-5633.md
@@ -0,0 +1,112 @@
+---
+title: 5633(S, F) A request was made to authenticate to a wired network. (Windows 10)
+description: Describes security event 5633(S, F) A request was made to authenticate to a wired network.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5633(S, F): A request was made to authenticate to a wired network.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md)
+
+***Event Description:***
+
+This event generates when [802.1x](https://technet.microsoft.com/en-us/library/hh831831.aspx) authentication attempt was made for wired network.
+
+It typically generates when network adapter connects to new wired network.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5633
+ 0
+ 0
+ 12551
+ 0
+ 0x8020000000000000
+
+ 1198715
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ Microsoft Hyper-V Network Adapter
+ -
+ -
+ -
+ 0x0
+ 0x70003
+ The network does not support authentication
+ 0x0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = UnicodeString\]**:** User Principal Name (UPN) of account for which 802.1x authentication request was made.
+
+> **Note** [User principal name](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380525(v=vs.85).aspx) (UPN) format is used to specify an Internet-style name, such as UserName@Example.Microsoft.com.
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account for which 802.1x authentication request was made.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Interface:**
+
+- **Name** \[Type = UnicodeString\]: the name (description) of network interface which was used for authentication request. You can get the list of all available network adapters using “**ipconfig /all**” command. See “Description” row for every network adapter:
+
+
+
+**Additional Information:**
+
+- **Reason Code** \[Type = UnicodeString\]: contains Reason Text (explanation of Reason Code) and Reason Code for wired authentication results. See more information about reason codes for wired authentication here: , .
+
+- **Error Code** \[Type = HexInt32\]: unique [EAP error code](https://msdn.microsoft.com/en-us/library/windows/desktop/aa813691(v=vs.85).aspx).
+
+## Security Monitoring Recommendations
+
+For 5633(S, F): A request was made to authenticate to a wired network.
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5712.md b/windows/keep-secure/event-5712.md
new file mode 100644
index 0000000000..4a935e0272
--- /dev/null
+++ b/windows/keep-secure/event-5712.md
@@ -0,0 +1,66 @@
+---
+title: 5712(S) A Remote Procedure Call (RPC) was attempted. (Windows 10)
+description: Describes security event 5712(S) A Remote Procedure Call (RPC) was attempted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5712(S): A Remote Procedure Call (RPC) was attempted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+It appears that this event never occurs.
+
+***Subcategory:*** [Audit RPC Events](audit-rpc-events.md)
+
+***Event Schema:***
+
+*A Remote Procedure Call (RPC) was attempted.*
+
+*Subject:*
+
+> *SID:%1*
+>
+> *Name:%2*
+>
+> *Account Domain:%3*
+>
+> *LogonId:%4*
+
+*Process Information:*
+
+> *PID:%5
+> Name:%6*
+
+*Network Information:*
+
+> *Remote IP Address:%7*
+>
+> *Remote Port:%8*
+
+*RPC Attributes:*
+
+> *Interface UUID:%9*
+>
+> *Protocol Sequence:%10*
+>
+> *Authentication Service:%11*
+>
+> *Authentication Level:%12*
+
+***Required Server Roles:*** no information.
+
+***Minimum OS Version:*** no information.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-5888.md b/windows/keep-secure/event-5888.md
new file mode 100644
index 0000000000..edf33acd92
--- /dev/null
+++ b/windows/keep-secure/event-5888.md
@@ -0,0 +1,157 @@
+---
+title: 5888(S) An object in the COM+ Catalog was modified. (Windows 10)
+description: Describes security event 5888(S) An object in the COM+ Catalog was modified.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5888(S): An object in the COM+ Catalog was modified.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates when the object in [COM+ Catalog](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679196(v=vs.85).aspx) was modified.
+
+For some reason this event belongs to [Audit System Integrity](event-5890.md) subcategory, but generation of this event enables in this subcategory.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5888
+ 0
+ 0
+ 12290
+ 0
+ 0x8020000000000000
+
+ 344994
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 222443
+ Applications
+ ID = {1D34B2DC-0E43-4040-BA7B-2F1C181FD86A} AppPartitionID = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}
+ Name = 'COMApp' -> 'COMApp-New' cCOL\_SecurityDescriptor = '' -> ''
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “modify/change object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “modify/change object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **COM+ Catalog Collection** \[Type = UnicodeString\]: the name of COM+ collection in which the object was modified. Here is the list of possible collection values with descriptions:
+
+| Collection | Description |
+|------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| [ApplicationCluster](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683600(v=vs.85).aspx) | Contains a list of the servers in the application cluster. |
+| [ApplicationInstances](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679173(v=vs.85).aspx) | Contains an object for each instance of a running COM+ application. |
+| [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx) | Contains an object for each COM+ application installed on the local computer. |
+| [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) | Contains an object for each component in the application to which it is related. |
+| [ComputerList](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681320(v=vs.85).aspx) | Contains a list of the computers found in the Computers folder of the Component Services administration tool. |
+| [DCOMProtocols](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688297(v=vs.85).aspx) | Contains a list of the protocols to be used by DCOM. It contains an object for each protocol. |
+| [ErrorInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686530(v=vs.85).aspx) | Retrieves extended error information regarding methods that deal with multiple objects. |
+| [EventClassesForIID](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679576(v=vs.85).aspx) | Retrieves information regarding event classes. |
+| [FilesForImport](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685046(v=vs.85).aspx) | Retrieves information from its MSI file about an application that can be imported. |
+| [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system. It contains an object for each component. |
+| [InterfacesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687751(v=vs.85).aspx) | Contains an object for each interface exposed by the component to which the collection is related. |
+| [LegacyComponents](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683616(v=vs.85).aspx) | Contains an object for each unconfigured component in the application to which it is related. |
+| [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) | Identical to the [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) collection except that this collection also includes local servers. |
+| [LocalComputer](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682790(v=vs.85).aspx) | Contains a single object that holds computer level settings information for the computer whose catalog you are accessing. |
+| [MethodsForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687595(v=vs.85).aspx) | Contains an object for each method on the interface to which the collection is related. |
+| [Partitions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679480(v=vs.85).aspx) | Used to specify the applications contained in each partition. |
+| [PartitionUsers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686081(v=vs.85).aspx) | Used to specify the users contained in each partition. |
+| [PropertyInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681735(v=vs.85).aspx) | Retrieves information about the properties that a specified collection supports. |
+| [PublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682794(v=vs.85).aspx) | Contains an object for each publisher property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [RelatedCollectionInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686925(v=vs.85).aspx) | Retrieves information about other collections related to the collection from which it is called. |
+| [Roles](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683613(v=vs.85).aspx) | Contains an object for each role assigned to the application to which it is related. |
+| [RolesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686119(v=vs.85).aspx) | Contains an object for each role assigned to the component to which the collection is related. |
+| [RolesForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688303(v=vs.85).aspx) | Contains an object for each role assigned to the interface to which the collection is related. |
+| [RolesForMethod](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679943(v=vs.85).aspx) | Contains an object for each role assigned to the method to which the collection is related. |
+| [RolesForPartition](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681316(v=vs.85).aspx) | Contains an object for each role assigned to the partition to which the collection is related. |
+| [Root](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682277(v=vs.85).aspx) | Contains the top-level collections on the catalog. |
+| [SubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681611(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) | Contains an object for each subscription for the parent [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) collection. |
+| [TransientPublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681793(v=vs.85).aspx) | Contains an object for each publisher property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686051(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) | Contains an object for each transient subscription. |
+| [UsersInPartitionRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686441(v=vs.85).aspx) | Contains an object for each user in the partition role to which the collection is related. |
+| [UsersInRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687622(v=vs.85).aspx) | Contains an object for each user in the role to which the collection is related. |
+| [WOWInprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681249(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system for 32-bit components on 64-bit computers. |
+| [WOWLegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682774(v=vs.85).aspx) | Identical to the [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) collection except that this collection is drawn from the 32-bit registry on 64-bit computers. |
+
+- **Object Name** \[Type = UnicodeString\]: object-specific fields with the names and identifiers for the modified object. It depends on **COM+ Catalog Collection** value, for example, if **COM+ Catalog Collection** = [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx), then you can find that:
+
+ - **ID** - A GUID representing the application. This property is returned when the [Key](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679201(v=vs.85).aspx) property method is called on an object of this collection.
+
+ - **AppPartitionID** - A GUID representing the application partition ID.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Object Properties Modified** \[Type = UnicodeString\]: the list of object’s (**Object Name**) properties which were modified.
+
+ The items have the following format: Property\_Name = ‘OLD\_VALUE’ -> ‘NEW\_VALUE’
+
+ Check description for specific **COM+ Catalog Collection** to see the list of object’s properties and descriptions.
+
+## Security Monitoring Recommendations
+
+For 5888(S): An object in the COM+ Catalog was modified.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a specific COM+ object for which you need to monitor all modifications, monitor all [5888](event-5888.md) events with the corresponding **Object Name**.
+
diff --git a/windows/keep-secure/event-5889.md b/windows/keep-secure/event-5889.md
new file mode 100644
index 0000000000..88eacdbca6
--- /dev/null
+++ b/windows/keep-secure/event-5889.md
@@ -0,0 +1,157 @@
+---
+title: 5889(S) An object was deleted from the COM+ Catalog. (Windows 10)
+description: Describes security event 5889(S) An object was deleted from the COM+ Catalog.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5889(S): An object was deleted from the COM+ Catalog.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates when the object in the [COM+ Catalog](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679196(v=vs.85).aspx) was deleted.
+
+For some reason this event belongs to [Audit System Integrity](event-5890.md) subcategory, but generation of this event enables in this subcategory.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5889
+ 0
+ 0
+ 12290
+ 0
+ 0x8020000000000000
+
+ 344998
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 222443
+ Applications
+ ID = {1D34B2DC-0E43-4040-BA7B-2F1C181FD86A} AppPartitionID = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}
+ Name = COMApp-New ApplicationProxyServerName = ProcessType = 2 CommandLine = ServiceName = RunAsUserType = 1 Identity = Interactive User Description = IsSystem = N Authentication = 4 ShutdownAfter = 3 RunForever = N Password = \*\*\*\*\*\*\*\* Activation = Local Changeable = Y Deleteable = Y CreatedBy = AccessChecksLevel = 1 ApplicationAccessChecksEnabled = 1 cCOL\_SecurityDescriptor = ImpersonationLevel = 3 AuthenticationCapability = 64 CRMEnabled = 0 3GigSupportEnabled = 0 QueuingEnabled = 0 QueueListenerEnabled = N EventsEnabled = 1 ProcessFlags = 0 ThreadMax = 0 ApplicationProxy = 0 CRMLogFile = DumpEnabled = 0 DumpOnException = 0 DumpOnFailfast = 0 MaxDumpCount = 5 DumpPath = %systemroot%\\system32\\com\\dmp IsEnabled = 1 AppPartitionID = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70} ConcurrentApps = 1 RecycleLifetimeLimit = 0 RecycleCallLimit = 0 RecycleActivationLimit = 0 RecycleMemoryLimit = 0 RecycleExpirationTimeout = 15 QCListenerMaxThreads = 0 QCAuthenticateMsgs = 0 ApplicationDirectory = SRPTrustLevel = 262144 SRPEnabled = 0 SoapActivated = 0 SoapVRoot = SoapMailTo = SoapBaseUrl = Replicable = 1
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “delete object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “delete object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **COM+ Catalog Collection** \[Type = UnicodeString\]: the name of COM+ collection in which COM+ object was deleted. Here is the list of possible collection values with descriptions:
+
+| Collection | Description |
+|------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| [ApplicationCluster](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683600(v=vs.85).aspx) | Contains a list of the servers in the application cluster. |
+| [ApplicationInstances](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679173(v=vs.85).aspx) | Contains an object for each instance of a running COM+ application. |
+| [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx) | Contains an object for each COM+ application installed on the local computer. |
+| [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) | Contains an object for each component in the application to which it is related. |
+| [ComputerList](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681320(v=vs.85).aspx) | Contains a list of the computers found in the Computers folder of the Component Services administration tool. |
+| [DCOMProtocols](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688297(v=vs.85).aspx) | Contains a list of the protocols to be used by DCOM. It contains an object for each protocol. |
+| [ErrorInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686530(v=vs.85).aspx) | Retrieves extended error information regarding methods that deal with multiple objects. |
+| [EventClassesForIID](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679576(v=vs.85).aspx) | Retrieves information regarding event classes. |
+| [FilesForImport](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685046(v=vs.85).aspx) | Retrieves information from its MSI file about an application that can be imported. |
+| [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system. It contains an object for each component. |
+| [InterfacesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687751(v=vs.85).aspx) | Contains an object for each interface exposed by the component to which the collection is related. |
+| [LegacyComponents](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683616(v=vs.85).aspx) | Contains an object for each unconfigured component in the application to which it is related. |
+| [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) | Identical to the [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) collection except that this collection also includes local servers. |
+| [LocalComputer](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682790(v=vs.85).aspx) | Contains a single object that holds computer level settings information for the computer whose catalog you are accessing. |
+| [MethodsForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687595(v=vs.85).aspx) | Contains an object for each method on the interface to which the collection is related. |
+| [Partitions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679480(v=vs.85).aspx) | Used to specify the applications contained in each partition. |
+| [PartitionUsers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686081(v=vs.85).aspx) | Used to specify the users contained in each partition. |
+| [PropertyInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681735(v=vs.85).aspx) | Retrieves information about the properties that a specified collection supports. |
+| [PublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682794(v=vs.85).aspx) | Contains an object for each publisher property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [RelatedCollectionInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686925(v=vs.85).aspx) | Retrieves information about other collections related to the collection from which it is called. |
+| [Roles](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683613(v=vs.85).aspx) | Contains an object for each role assigned to the application to which it is related. |
+| [RolesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686119(v=vs.85).aspx) | Contains an object for each role assigned to the component to which the collection is related. |
+| [RolesForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688303(v=vs.85).aspx) | Contains an object for each role assigned to the interface to which the collection is related. |
+| [RolesForMethod](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679943(v=vs.85).aspx) | Contains an object for each role assigned to the method to which the collection is related. |
+| [RolesForPartition](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681316(v=vs.85).aspx) | Contains an object for each role assigned to the partition to which the collection is related. |
+| [Root](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682277(v=vs.85).aspx) | Contains the top-level collections on the catalog. |
+| [SubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681611(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) | Contains an object for each subscription for the parent [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) collection. |
+| [TransientPublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681793(v=vs.85).aspx) | Contains an object for each publisher property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686051(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) | Contains an object for each transient subscription. |
+| [UsersInPartitionRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686441(v=vs.85).aspx) | Contains an object for each user in the partition role to which the collection is related. |
+| [UsersInRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687622(v=vs.85).aspx) | Contains an object for each user in the role to which the collection is related. |
+| [WOWInprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681249(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system for 32-bit components on 64-bit computers. |
+| [WOWLegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682774(v=vs.85).aspx) | Identical to the [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) collection except that this collection is drawn from the 32-bit registry on 64-bit computers. |
+
+- **Object Name** \[Type = UnicodeString\]: object-specific fields with the names and identifiers for the deleted object. It depends on **COM+ Catalog Collection** value, for example, if **COM+ Catalog Collection** = [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx), then you can find that:
+
+ - **ID** - A GUID representing the application. This property is returned when the [Key](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679201(v=vs.85).aspx) property method is called on an object of this collection.
+
+ - **AppPartitionID** - A GUID representing the application partition ID.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Object Details** \[Type = UnicodeString\]: the list of deleted object’s (**Object Name**) properties.
+
+ The items have the following format: Property\_Name = VALUE
+
+ Check description for specific **COM+ Catalog Collection** to see the list of object’s properties and descriptions.
+
+## Security Monitoring Recommendations
+
+For 5889(S): An object was deleted from the COM+ Catalog.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you have a specific COM+ object for which you need to monitor all modifications (especially delete operations), monitor all [5889](event-5889.md) events with the corresponding **Object Name**.
+
diff --git a/windows/keep-secure/event-5890.md b/windows/keep-secure/event-5890.md
new file mode 100644
index 0000000000..2e41087f62
--- /dev/null
+++ b/windows/keep-secure/event-5890.md
@@ -0,0 +1,159 @@
+---
+title: 5890(S) An object was added to the COM+ Catalog. (Windows 10)
+description: Describes security event 5890(S) An object was added to the COM+ Catalog.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 5890(S): An object was added to the COM+ Catalog.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Object Access Events](audit-other-object-access-events.md)
+
+***Event Description:***
+
+This event generates when new object was added to the [COM+ Catalog](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679196(v=vs.85).aspx).
+
+For some reason this event belongs to [Audit System Integrity](event-5890.md) subcategory, but generation of this event enables in this subcategory.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 5890
+ 0
+ 0
+ 12290
+ 0
+ 0x8020000000000000
+
+ 344980
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ S-1-5-21-3457937927-2839227994-823803824-1104
+ dadmin
+ CONTOSO
+ 222443
+ Roles
+ ApplId = {1D34B2DC-0E43-4040-BA7B-2F1C181FD86A} Name = CreatorOwner
+ Description =
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that requested the “add object” operation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that requested the “add object” operation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Object**:
+
+- **COM+ Catalog Collection** \[Type = UnicodeString\]: the name of COM+ collection to which the new object was added. Here is the list of possible collection values with descriptions:
+
+| Collection | Description |
+|------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| [ApplicationCluster](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683600(v=vs.85).aspx) | Contains a list of the servers in the application cluster. |
+| [ApplicationInstances](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679173(v=vs.85).aspx) | Contains an object for each instance of a running COM+ application. |
+| [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx) | Contains an object for each COM+ application installed on the local computer. |
+| [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) | Contains an object for each component in the application to which it is related. |
+| [ComputerList](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681320(v=vs.85).aspx) | Contains a list of the computers found in the Computers folder of the Component Services administration tool. |
+| [DCOMProtocols](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688297(v=vs.85).aspx) | Contains a list of the protocols to be used by DCOM. It contains an object for each protocol. |
+| [ErrorInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686530(v=vs.85).aspx) | Retrieves extended error information regarding methods that deal with multiple objects. |
+| [EventClassesForIID](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679576(v=vs.85).aspx) | Retrieves information regarding event classes. |
+| [FilesForImport](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685046(v=vs.85).aspx) | Retrieves information from its MSI file about an application that can be imported. |
+| [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system. It contains an object for each component. |
+| [InterfacesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687751(v=vs.85).aspx) | Contains an object for each interface exposed by the component to which the collection is related. |
+| [LegacyComponents](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683616(v=vs.85).aspx) | Contains an object for each unconfigured component in the application to which it is related. |
+| [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) | Identical to the [InprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms678949(v=vs.85).aspx) collection except that this collection also includes local servers. |
+| [LocalComputer](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682790(v=vs.85).aspx) | Contains a single object that holds computer level settings information for the computer whose catalog you are accessing. |
+| [MethodsForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687595(v=vs.85).aspx) | Contains an object for each method on the interface to which the collection is related. |
+| [Partitions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679480(v=vs.85).aspx) | Used to specify the applications contained in each partition. |
+| [PartitionUsers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686081(v=vs.85).aspx) | Used to specify the users contained in each partition. |
+| [PropertyInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681735(v=vs.85).aspx) | Retrieves information about the properties that a specified collection supports. |
+| [PublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682794(v=vs.85).aspx) | Contains an object for each publisher property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [RelatedCollectionInfo](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686925(v=vs.85).aspx) | Retrieves information about other collections related to the collection from which it is called. |
+| [Roles](https://msdn.microsoft.com/en-us/library/windows/desktop/ms683613(v=vs.85).aspx) | Contains an object for each role assigned to the application to which it is related. |
+| [RolesForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686119(v=vs.85).aspx) | Contains an object for each role assigned to the component to which the collection is related. |
+| [RolesForInterface](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688303(v=vs.85).aspx) | Contains an object for each role assigned to the interface to which the collection is related. |
+| [RolesForMethod](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679943(v=vs.85).aspx) | Contains an object for each role assigned to the method to which the collection is related. |
+| [RolesForPartition](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681316(v=vs.85).aspx) | Contains an object for each role assigned to the partition to which the collection is related. |
+| [Root](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682277(v=vs.85).aspx) | Contains the top-level collections on the catalog. |
+| [SubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681611(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) collection. |
+| [SubscriptionsForComponent](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687726(v=vs.85).aspx) | Contains an object for each subscription for the parent [Components](https://msdn.microsoft.com/en-us/library/windows/desktop/ms688285(v=vs.85).aspx) collection. |
+| [TransientPublisherProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681793(v=vs.85).aspx) | Contains an object for each publisher property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriberProperties](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686051(v=vs.85).aspx) | Contains an object for each subscriber property for the parent [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) collection. |
+| [TransientSubscriptions](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686100(v=vs.85).aspx) | Contains an object for each transient subscription. |
+| [UsersInPartitionRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686441(v=vs.85).aspx) | Contains an object for each user in the partition role to which the collection is related. |
+| [UsersInRole](https://msdn.microsoft.com/en-us/library/windows/desktop/ms687622(v=vs.85).aspx) | Contains an object for each user in the role to which the collection is related. |
+| [WOWInprocServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms681249(v=vs.85).aspx) | Contains a list of the in-process servers registered with the system for 32-bit components on 64-bit computers. |
+| [WOWLegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms682774(v=vs.85).aspx) | Identical to the [LegacyServers](https://msdn.microsoft.com/en-us/library/windows/desktop/ms685965(v=vs.85).aspx) collection except that this collection is drawn from the 32-bit registry on 64-bit computers. |
+
+- **Object Name** \[Type = UnicodeString\]: object-specific fields with the names and identifiers for the new object. It depends on **COM+ Catalog Collection** value, for example, if **COM+ Catalog Collection** = [Applications](https://msdn.microsoft.com/en-us/library/windows/desktop/ms686107(v=vs.85).aspx), then you can find that:
+
+ - **ID** - A GUID representing the application. This property is returned when the [Key](https://msdn.microsoft.com/en-us/library/windows/desktop/ms679201(v=vs.85).aspx) property method is called on an object of this collection.
+
+ - **AppPartitionID** - A GUID representing the application partition ID.
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+- **Object Details** \[Type = UnicodeString\]: the list of new object’s (**Object Name**) properties.
+
+ The items have the following format: Property\_Name = VALUE
+
+ Check description for specific **COM+ Catalog Collection** to see the list of object’s properties and descriptions.
+
+## Security Monitoring Recommendations
+
+For 5890(S): An object was added to the COM+ Catalog.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you need to monitor for creation of new COM+ objects within specific COM+ collection, monitor all [5890](event-5890.md) events with the corresponding **COM+ Catalog Collection** field value.
+
+
+
diff --git a/windows/keep-secure/event-6144.md b/windows/keep-secure/event-6144.md
new file mode 100644
index 0000000000..89777613cc
--- /dev/null
+++ b/windows/keep-secure/event-6144.md
@@ -0,0 +1,86 @@
+---
+title: 6144(S) Security policy in the group policy objects has been applied successfully. (Windows 10)
+description: Describes security event 6144(S) Security policy in the group policy objects has been applied successfully.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6144(S): Security policy in the group policy objects has been applied successfully.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates every time settings from the “Security Settings” section in the group policy object are applied successfully to a computer, without any errors. This event generates on the target computer itself.
+
+It is a routine event which shows you the list of Group Policy Objects that include “Security Settings” policies, and that were applied to the computer.
+
+This event generates every time Group Policy is applied to the computer.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6144
+ 0
+ 0
+ 13573
+ 0
+ 0x8020000000000000
+
+ 1055041
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 0
+ {8AB9311A-E5FB-4A5A-8FB7-027D1B877D6D} DC Main Policy
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Return Code** \[Type = UInt32\]: always has “**0**” value for this event.
+
+**GPO List** \[Type = UnicodeString\]: the list of Group Policy Objects that include “Security Settings” policies, and that were applied to the computer. The format of the list item is: “GROUP\_POLICY\_GUID GROUP\_POLICY\_NAME”.
+
+You can find specific GROUP\_POLICY\_GUID using **Get-GPO** PowerShell cmdlet with “**–Name** GROUP\_POLICY\_NAME” parameter. Row “Id” is the GUID of the Group Policy:
+
+
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+## Security Monitoring Recommendations
+
+For 6144(S): Security policy in the group policy objects has been applied successfully.
+
+- If you have a pre-defined list of Group Policy Objects which contain Security Settings and must be applied to specific computers, then you can compare the list from this event with your list and in case of any difference trigger an alert.
+
+- This event is mostly an informational event.
+
diff --git a/windows/keep-secure/event-6145.md b/windows/keep-secure/event-6145.md
new file mode 100644
index 0000000000..440684ab1d
--- /dev/null
+++ b/windows/keep-secure/event-6145.md
@@ -0,0 +1,88 @@
+---
+title: 6145(F) One or more errors occurred while processing security policy in the group policy objects. (Windows 10)
+description: Describes security event 6145(F) One or more errors occurred while processing security policy in the group policy objects.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6145(F): One or more errors occurred while processing security policy in the group policy objects.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit Other Policy Change Events](audit-other-policy-change-events.md)
+
+***Event Description:***
+
+This event generates every time settings from the “Security Settings” section in the group policy object are applied to a computer with one or more errors. This event generates on the target computer itself.
+
+This event generates, for example, if the [SID](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx) of a security principal which was included in one of the Group Policy settings cannot be resolved or translated to the real account name.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6145
+ 0
+ 0
+ 13573
+ 0
+ 0x8010000000000000
+
+ 1052680
+
+
+ Security
+ DC01.contoso.local
+
+
+-
+ 1332
+ {6AC1786C-016F-11D2-945F-00C04fB984F9} Default Domain Controllers Policy {31B2F340-016D-11D2-945F-00C04FB984F9} Default Domain Policy
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008, Windows Vista.
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Error Code** \[Type = UInt32\]: specific error code which shows the error which happened during Group Policy processing. You can find the meaning of specific error code here: . For example, error code 1332 means that “no mapping between account names and security IDs was done”.
+
+**GPO List** \[Type = UnicodeString\]: the list of Group Policy Objects that include “Security Settings” policies, and that were applied with errors to the computer. The format of the list item is: “GROUP\_POLICY\_GUID GROUP\_POLICY\_NAME”.
+
+You can find specific GROUP\_POLICY\_GUID using **Get-GPO** PowerShell cmdlet with “**–Name** GROUP\_POLICY\_NAME” parameter. Row “Id” is the GUID of the Group Policy:
+
+
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+## Security Monitoring Recommendations
+
+For 6145(F): One or more errors occurred while processing security policy in the group policy objects.
+
+- This event indicates that Group Policy Objects which were applied to the computer or device had some errors during processing. If you see this event, we recommend checking settings in the GPOs from **GPO List** and resolving the cause of the errors.
+
+- If you have a pre-defined list of Group Policy Objects that contain Security Settings and that must be applied to specific computers, check this event to see if errors occurred when the Security Settings were applied. If so, you can review the error codes and investigate the cause of the failure.
+
+- Typically this event has an informational purpose and the reason is configuration errors in Group Policy’s security settings.
+
+- This event might be used for Group Policy troubleshooting purposes.
+
diff --git a/windows/keep-secure/event-6281.md b/windows/keep-secure/event-6281.md
new file mode 100644
index 0000000000..3e5e8b369e
--- /dev/null
+++ b/windows/keep-secure/event-6281.md
@@ -0,0 +1,43 @@
+---
+title: 6281(F) Code Integrity determined that the page hashes of an image file are not valid. (Windows 10)
+description: Describes security event 6281(F) Code Integrity determined that the page hashes of an image file are not valid.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6281(F): Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.
+
+[Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) is a feature that improves the security of the operating system by validating the integrity of a driver or system file each time it is loaded into memory. Code Integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrative permissions. On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+
+This event generates when [code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. This event also generates when signing certificate was revoked. The invalid hashes could indicate a potential disk device error.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.*
+
+*File Name:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
diff --git a/windows/keep-secure/event-6400.md b/windows/keep-secure/event-6400.md
new file mode 100644
index 0000000000..3dfd20b90a
--- /dev/null
+++ b/windows/keep-secure/event-6400.md
@@ -0,0 +1,39 @@
+---
+title: 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content. (Windows 10)
+description: Describes security event 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6400(-): BranchCache: Received an incorrectly formatted response while discovering availability of content.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Received an incorrectly formatted response while discovering availability of content.*
+
+*IP address of the client that sent this response:%1 *
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6401.md b/windows/keep-secure/event-6401.md
new file mode 100644
index 0000000000..d9f9af15e8
--- /dev/null
+++ b/windows/keep-secure/event-6401.md
@@ -0,0 +1,39 @@
+---
+title: 6401(-) BranchCache Received invalid data from a peer. Data discarded. (Windows 10)
+description: Describes security event 6401(-) BranchCache Received invalid data from a peer. Data discarded.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6401(-): BranchCache: Received invalid data from a peer. Data discarded.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Received invalid data from a peer. Data discarded. *
+
+*IP address of the client that sent this data:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6402.md b/windows/keep-secure/event-6402.md
new file mode 100644
index 0000000000..1aacc012a3
--- /dev/null
+++ b/windows/keep-secure/event-6402.md
@@ -0,0 +1,39 @@
+---
+title: 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted. (Windows 10)
+description: Describes security event 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6402(-): BranchCache: The message to the hosted cache offering it data is incorrectly formatted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: The message to the hosted cache offering it data is incorrectly formatted. *
+
+*IP address of the client that sent this message: %1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6403.md b/windows/keep-secure/event-6403.md
new file mode 100644
index 0000000000..60b2123425
--- /dev/null
+++ b/windows/keep-secure/event-6403.md
@@ -0,0 +1,39 @@
+---
+title: 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client. (Windows 10)
+description: Describes security event 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6403(-): BranchCache: The hosted cache sent an incorrectly formatted response to the client.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: The hosted cache sent an incorrectly formatted response to the client’s message to offer it data. *
+
+*Domain name of the hosted cache is:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6404.md b/windows/keep-secure/event-6404.md
new file mode 100644
index 0000000000..2cdc4ef54c
--- /dev/null
+++ b/windows/keep-secure/event-6404.md
@@ -0,0 +1,41 @@
+---
+title: 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate. (Windows 10)
+description: Describes security event 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6404(-): BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. *
+
+*Domain name of the hosted cache:%1*
+
+*Error Code:%2*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6405.md b/windows/keep-secure/event-6405.md
new file mode 100644
index 0000000000..696f837a08
--- /dev/null
+++ b/windows/keep-secure/event-6405.md
@@ -0,0 +1,37 @@
+---
+title: 6405(-) BranchCache %2 instance(s) of event id %1 occurred. (Windows 10)
+description: Describes security event 6405(-) BranchCache %2 instance(s) of event id %1 occurred.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6405(-): BranchCache: %2 instance(s) of event id %1 occurred.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: %2 instance(s) of event id %1 occurred.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6406.md b/windows/keep-secure/event-6406.md
new file mode 100644
index 0000000000..ca1f2b9601
--- /dev/null
+++ b/windows/keep-secure/event-6406.md
@@ -0,0 +1,39 @@
+---
+title: 6406(-) %1 registered to Windows Firewall to control filtering for the following %2. (Windows 10)
+description: Describes security event 6406(-) %1 registered to Windows Firewall to control filtering for the following %2.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6406(-): %1 registered to Windows Firewall to control filtering for the following: %2.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*%1 registered to Windows Firewall to control filtering for the following:*
+
+*%2.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6407.md b/windows/keep-secure/event-6407.md
new file mode 100644
index 0000000000..30149be4fd
--- /dev/null
+++ b/windows/keep-secure/event-6407.md
@@ -0,0 +1,37 @@
+---
+title: 6407(-) 1%. (Windows 10)
+description: Describes security event 6407(-) 1%.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6407(-): 1%.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6408.md b/windows/keep-secure/event-6408.md
new file mode 100644
index 0000000000..f968473bbd
--- /dev/null
+++ b/windows/keep-secure/event-6408.md
@@ -0,0 +1,37 @@
+---
+title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. (Windows 10)
+description: Describes security event 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6408(-): Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6409.md b/windows/keep-secure/event-6409.md
new file mode 100644
index 0000000000..bc69be15aa
--- /dev/null
+++ b/windows/keep-secure/event-6409.md
@@ -0,0 +1,39 @@
+---
+title: 6409(-) BranchCache A service connection point object could not be parsed. (Windows 10)
+description: Describes security event 6409(-) BranchCache A service connection point object could not be parsed.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6409(-): BranchCache: A service connection point object could not be parsed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: A service connection point object could not be parsed. *
+
+*SCP object GUID: %1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6410.md b/windows/keep-secure/event-6410.md
new file mode 100644
index 0000000000..95a4a6daed
--- /dev/null
+++ b/windows/keep-secure/event-6410.md
@@ -0,0 +1,43 @@
+---
+title: 6410(F) Code integrity determined that a file does not meet the security requirements to load into a process. (Windows 10)
+description: Describes security event 6410(F) Code integrity determined that a file does not meet the security requirements to load into a process.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6410(F): Code integrity determined that a file does not meet the security requirements to load into a process.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) is a feature that improves the security of the operating system by validating the integrity of a driver or system file each time it is loaded into memory. Code Integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrative permissions. On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+
+This event generates due to writable [shared sections](https://msdn.microsoft.com/en-us/library/windows/desktop/cc307397.aspx) being present in a file image.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues.*
+
+*File Name:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012 R2, Windows 8.1.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
+
+
diff --git a/windows/keep-secure/event-6416.md b/windows/keep-secure/event-6416.md
new file mode 100644
index 0000000000..18237f7cc4
--- /dev/null
+++ b/windows/keep-secure/event-6416.md
@@ -0,0 +1,154 @@
+---
+title: 6416(S) A new external device was recognized by the System. (Windows 10)
+description: Describes security event 6416(S) A new external device was recognized by the System.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6416(S): A new external device was recognized by the System.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time a new external device is recognized by a system.
+
+This event generates, for example, when a new external device is connected or enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6416
+ 1
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 436
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ SCSI\\Disk&Ven\_Seagate&Prod\_Expansion\\000000
+ Seagate Expansion SCSI Disk Device
+ {4D36E967-E325-11CE-BFC1-08002BE10318}
+ DiskDrive
+ SCSI\\DiskSeagate\_Expansion\_\_\_\_\_\_\_0636 SCSI\\DiskSeagate\_Expansion\_\_\_\_\_\_\_ SCSI\\DiskSeagate\_ SCSI\\Seagate\_Expansion\_\_\_\_\_\_\_0 Seagate\_Expansion\_\_\_\_\_\_\_0 GenDisk
+ SCSI\\Disk SCSI\\RAW
+ Bus Number 0, Target Id 0, LUN 0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:***
+
+- 0 - Windows 10.
+
+- 1 - Windows 10 \[Version 1511\].
+
+ - Added “Device ID” field.
+
+ - Added “Device Name” field.
+
+ - Added “Class Name” field.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that registered the new device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that registered the new device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\] \[Version 1\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\] \[Version 1\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\] \[Version 1\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Vendor IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6416(S): A new external device was recognized by the System.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|-----------------------------------------------------|----------------------------|
+| Device recognition events, **Device Instance Path** | “**Device ID**” |
+| Device recognition events, **Device Description** | “**Device Name**” |
+| Device recognition events, **Class GUID** | “**Class ID**” |
+| Device recognition events, **Hardware IDs** | “**Vendor IDs**” |
+| Device recognition events, **Compatible IDs** | “**Compatible IDs**” |
+| Device recognition events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6419.md b/windows/keep-secure/event-6419.md
new file mode 100644
index 0000000000..c34be4a0ec
--- /dev/null
+++ b/windows/keep-secure/event-6419.md
@@ -0,0 +1,142 @@
+---
+title: 6419(S) A request was made to disable a device. (Windows 10)
+description: Describes security event 6419(S) A request was made to disable a device.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6419(S): A request was made to disable a device.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time when someone made a request to disable a device.
+
+This event doesn’t mean that device was disabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6419
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 483
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-21-2695983153-1310895815-1903476278-1001
+ ladmin
+ DESKTOP-NFC0HVN
+ 0x3fcc7
+ USB\\VID\_138A&PID\_0017\\FFBC12C950A0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made the request. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made the request.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6419(S): A request was made to disable a device.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|---------------------------------------------------|----------------------------|
+| Device disable requests, **Device Instance Path** | “**Device ID**” |
+| Device disable requests, **Device Description** | “**Device Name**” |
+| Device disable requests, **Class GUID** | “**Class ID**” |
+| Device disable requests, **Hardware IDs** | “**Hardware IDs**” |
+| Device disable requests, **Compatible IDs** | “**Compatible IDs**” |
+| Device disable requests, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6420.md b/windows/keep-secure/event-6420.md
new file mode 100644
index 0000000000..cc5ae0a245
--- /dev/null
+++ b/windows/keep-secure/event-6420.md
@@ -0,0 +1,140 @@
+---
+title: 6420(S) A device was disabled. (Windows 10)
+description: Describes security event 6420(S) A device was disabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6420(S): A device was disabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time specific device was disabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6420
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 484
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_138A&PID\_0017\\ffbc12c950a0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that disabled the device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that disabled the device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6420(S): A device was disabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|-------------------------------------------------|----------------------------|
+| Device disable events, **Device Instance Path** | “**Device ID**” |
+| Device disable events, **Device Description** | “**Device Name**” |
+| Device disable events, **Class GUID** | “**Class ID**” |
+| Device disable events, **Hardware IDs** | “**Hardware IDs**” |
+| Device disable events, **Compatible IDs** | “**Compatible IDs**” |
+| Device disable events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6421.md b/windows/keep-secure/event-6421.md
new file mode 100644
index 0000000000..ec9290968a
--- /dev/null
+++ b/windows/keep-secure/event-6421.md
@@ -0,0 +1,142 @@
+---
+title: 6421(S) A request was made to enable a device. (Windows 10)
+description: Describes security event 6421(S) A request was made to enable a device.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6421(S): A request was made to enable a device.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time when someone made a request to enable a device.
+
+This event doesn’t mean that device was enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6421
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 485
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-21-2695983153-1310895815-1903476278-1001
+ ladmin
+ DESKTOP-NFC0HVN
+ 0x3fcc7
+ USB\\VID\_138A&PID\_0017\\FFBC12C950A0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made the request. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made the request.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6421(S): A request was made to enable a device.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|--------------------------------------------------|----------------------------|
+| Device enable requests, **Device Instance Path** | “**Device ID**” |
+| Device enable requests, **Device Description** | “**Device Name**” |
+| Device enable requests, **Class GUID** | “**Class ID**” |
+| Device enable requests, **Hardware IDs** | “**Hardware IDs**” |
+| Device enable requests, **Compatible IDs** | “**Compatible IDs**” |
+| Device enable requests, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6422.md b/windows/keep-secure/event-6422.md
new file mode 100644
index 0000000000..c001a3c903
--- /dev/null
+++ b/windows/keep-secure/event-6422.md
@@ -0,0 +1,142 @@
+---
+title: 6422(S) A device was enabled. (Windows 10)
+description: Describes security event 6422(S) A device was enabled.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6422(S): A device was enabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time specific device was enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6422
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 486
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_138A&PID\_0017\\ffbc12c950a0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that enabled the device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that enabled the device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6422(S): A device was enabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|------------------------------------------------|----------------------------|
+| Device enable events, **Device Instance Path** | “**Device ID**” |
+| Device enable events, **Device Description** | “**Device Name**” |
+| Device enable events, **Class GUID** | “**Class ID**” |
+| Device enable events, **Hardware IDs** | “**Hardware IDs**” |
+| Device enable events, **Compatible IDs** | “**Compatible IDs**” |
+| Device enable events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6423.md b/windows/keep-secure/event-6423.md
new file mode 100644
index 0000000000..1145307d13
--- /dev/null
+++ b/windows/keep-secure/event-6423.md
@@ -0,0 +1,148 @@
+---
+title: 6423(S) The installation of this device is forbidden by system policy. (Windows 10)
+description: Describes security event 6423(S) The installation of this device is forbidden by system policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6423(S): The installation of this device is forbidden by system policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time installation of this device is forbidden by system policy.
+
+Device installation restriction group policies are located here: **\\Computer Configuration\\Administrative Templates\\System\\Device Installation\\Device Installation Restrictions**. If one of the policies restricts installation of a specific device, this event will be generated.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6423
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 488
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_04F3&PID\_012D\\7&1E3A8971&0&2
+ Touchscreen
+ {00000000-0000-0000-0000-000000000000}
+
+ USB\\VID\_04F3&PID\_012D&REV\_0013 USB\\VID\_04F3&PID\_012D
+ USB\\Class\_03&SubClass\_00&Prot\_00 USB\\Class\_03&SubClass\_00 USB\\Class\_03
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that forbids the device installation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that forbids the device installation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6423(S): The installation of this device is forbidden by system policy.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you want to track device installation policy violations then you need to track every event of this type.
+
+
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the policy violations and related information shown in the following table by using the listed fields:
+
+| Policy violation and related information to monitor | Field to use |
+|-----------------------------------------------------------------|----------------------------|
+| Device installation policy violations, **Device Instance Path** | “**Device ID**” |
+| Device installation policy violations, **Device Description** | “**Device Name**” |
+| Device installation policy violations, **Class GUID** | “**Class ID**” |
+| Device installation policy violations, **Hardware IDs** | “**Hardware IDs**” |
+| Device installation policy violations, **Compatible IDs** | “**Compatible IDs**” |
+| Device installation policy violations, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6424.md b/windows/keep-secure/event-6424.md
new file mode 100644
index 0000000000..10c2a2eb9e
--- /dev/null
+++ b/windows/keep-secure/event-6424.md
@@ -0,0 +1,31 @@
+---
+title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. (Windows 10)
+description: Describes security event 6424(S) The installation of this device was allowed, after having previously been forbidden by policy.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6424(S): The installation of this device was allowed, after having previously been forbidden by policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event occurs rarely, and in some situations may be difficult to reproduce.
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/images/ad-sites-and-services.png b/windows/keep-secure/images/ad-sites-and-services.png
new file mode 100644
index 0000000000..74758aef69
Binary files /dev/null and b/windows/keep-secure/images/ad-sites-and-services.png differ
diff --git a/windows/keep-secure/images/adsi-edit.png b/windows/keep-secure/images/adsi-edit.png
new file mode 100644
index 0000000000..2d0c4d0af7
Binary files /dev/null and b/windows/keep-secure/images/adsi-edit.png differ
diff --git a/windows/keep-secure/images/advanced-sharing.png b/windows/keep-secure/images/advanced-sharing.png
new file mode 100644
index 0000000000..f72b7dd37b
Binary files /dev/null and b/windows/keep-secure/images/advanced-sharing.png differ
diff --git a/windows/keep-secure/images/auditpol-guid-list.png b/windows/keep-secure/images/auditpol-guid-list.png
new file mode 100644
index 0000000000..d69583ad89
Binary files /dev/null and b/windows/keep-secure/images/auditpol-guid-list.png differ
diff --git a/windows/keep-secure/images/auditpol-list-subcategory.png b/windows/keep-secure/images/auditpol-list-subcategory.png
new file mode 100644
index 0000000000..91f043fc24
Binary files /dev/null and b/windows/keep-secure/images/auditpol-list-subcategory.png differ
diff --git a/windows/keep-secure/images/auditpol-list-user.png b/windows/keep-secure/images/auditpol-list-user.png
new file mode 100644
index 0000000000..cabf86563d
Binary files /dev/null and b/windows/keep-secure/images/auditpol-list-user.png differ
diff --git a/windows/keep-secure/images/auditpol.png b/windows/keep-secure/images/auditpol.png
new file mode 100644
index 0000000000..cabf86563d
Binary files /dev/null and b/windows/keep-secure/images/auditpol.png differ
diff --git a/windows/keep-secure/images/branchcache-properties.png b/windows/keep-secure/images/branchcache-properties.png
new file mode 100644
index 0000000000..31f13be679
Binary files /dev/null and b/windows/keep-secure/images/branchcache-properties.png differ
diff --git a/windows/keep-secure/images/certutil-command.png b/windows/keep-secure/images/certutil-command.png
new file mode 100644
index 0000000000..ce60fa8034
Binary files /dev/null and b/windows/keep-secure/images/certutil-command.png differ
diff --git a/windows/keep-secure/images/computer-management.png b/windows/keep-secure/images/computer-management.png
new file mode 100644
index 0000000000..74548ab836
Binary files /dev/null and b/windows/keep-secure/images/computer-management.png differ
diff --git a/windows/keep-secure/images/diskpart.png b/windows/keep-secure/images/diskpart.png
new file mode 100644
index 0000000000..f2ebf04b35
Binary files /dev/null and b/windows/keep-secure/images/diskpart.png differ
diff --git a/windows/keep-secure/images/event-1100.png b/windows/keep-secure/images/event-1100.png
new file mode 100644
index 0000000000..aea16fdfc2
Binary files /dev/null and b/windows/keep-secure/images/event-1100.png differ
diff --git a/windows/keep-secure/images/event-1102.png b/windows/keep-secure/images/event-1102.png
new file mode 100644
index 0000000000..3d342a51fa
Binary files /dev/null and b/windows/keep-secure/images/event-1102.png differ
diff --git a/windows/keep-secure/images/event-1104.png b/windows/keep-secure/images/event-1104.png
new file mode 100644
index 0000000000..b275530d7a
Binary files /dev/null and b/windows/keep-secure/images/event-1104.png differ
diff --git a/windows/keep-secure/images/event-1105.png b/windows/keep-secure/images/event-1105.png
new file mode 100644
index 0000000000..cedf9019f6
Binary files /dev/null and b/windows/keep-secure/images/event-1105.png differ
diff --git a/windows/keep-secure/images/event-1108.png b/windows/keep-secure/images/event-1108.png
new file mode 100644
index 0000000000..aa55df090d
Binary files /dev/null and b/windows/keep-secure/images/event-1108.png differ
diff --git a/windows/keep-secure/images/event-4608.png b/windows/keep-secure/images/event-4608.png
new file mode 100644
index 0000000000..256605977f
Binary files /dev/null and b/windows/keep-secure/images/event-4608.png differ
diff --git a/windows/keep-secure/images/event-4610.png b/windows/keep-secure/images/event-4610.png
new file mode 100644
index 0000000000..0046d6c73d
Binary files /dev/null and b/windows/keep-secure/images/event-4610.png differ
diff --git a/windows/keep-secure/images/event-4611.png b/windows/keep-secure/images/event-4611.png
new file mode 100644
index 0000000000..f0721a4860
Binary files /dev/null and b/windows/keep-secure/images/event-4611.png differ
diff --git a/windows/keep-secure/images/event-4614.png b/windows/keep-secure/images/event-4614.png
new file mode 100644
index 0000000000..aaa731eacb
Binary files /dev/null and b/windows/keep-secure/images/event-4614.png differ
diff --git a/windows/keep-secure/images/event-4616.png b/windows/keep-secure/images/event-4616.png
new file mode 100644
index 0000000000..f33eb34fef
Binary files /dev/null and b/windows/keep-secure/images/event-4616.png differ
diff --git a/windows/keep-secure/images/event-4618.png b/windows/keep-secure/images/event-4618.png
new file mode 100644
index 0000000000..7e98ebf7d0
Binary files /dev/null and b/windows/keep-secure/images/event-4618.png differ
diff --git a/windows/keep-secure/images/event-4622.png b/windows/keep-secure/images/event-4622.png
new file mode 100644
index 0000000000..4283128955
Binary files /dev/null and b/windows/keep-secure/images/event-4622.png differ
diff --git a/windows/keep-secure/images/event-4624.png b/windows/keep-secure/images/event-4624.png
new file mode 100644
index 0000000000..f12908f0b0
Binary files /dev/null and b/windows/keep-secure/images/event-4624.png differ
diff --git a/windows/keep-secure/images/event-4625.png b/windows/keep-secure/images/event-4625.png
new file mode 100644
index 0000000000..4ca8559f18
Binary files /dev/null and b/windows/keep-secure/images/event-4625.png differ
diff --git a/windows/keep-secure/images/event-4626.png b/windows/keep-secure/images/event-4626.png
new file mode 100644
index 0000000000..9d2aa55f16
Binary files /dev/null and b/windows/keep-secure/images/event-4626.png differ
diff --git a/windows/keep-secure/images/event-4627.png b/windows/keep-secure/images/event-4627.png
new file mode 100644
index 0000000000..53e75a4a88
Binary files /dev/null and b/windows/keep-secure/images/event-4627.png differ
diff --git a/windows/keep-secure/images/event-4634.png b/windows/keep-secure/images/event-4634.png
new file mode 100644
index 0000000000..e014592cc8
Binary files /dev/null and b/windows/keep-secure/images/event-4634.png differ
diff --git a/windows/keep-secure/images/event-4647.png b/windows/keep-secure/images/event-4647.png
new file mode 100644
index 0000000000..f11ddf8996
Binary files /dev/null and b/windows/keep-secure/images/event-4647.png differ
diff --git a/windows/keep-secure/images/event-4648.png b/windows/keep-secure/images/event-4648.png
new file mode 100644
index 0000000000..54721193e7
Binary files /dev/null and b/windows/keep-secure/images/event-4648.png differ
diff --git a/windows/keep-secure/images/event-4656.png b/windows/keep-secure/images/event-4656.png
new file mode 100644
index 0000000000..aba3b592a8
Binary files /dev/null and b/windows/keep-secure/images/event-4656.png differ
diff --git a/windows/keep-secure/images/event-4657.png b/windows/keep-secure/images/event-4657.png
new file mode 100644
index 0000000000..4b0ffbad21
Binary files /dev/null and b/windows/keep-secure/images/event-4657.png differ
diff --git a/windows/keep-secure/images/event-4658.png b/windows/keep-secure/images/event-4658.png
new file mode 100644
index 0000000000..7bf584e4f4
Binary files /dev/null and b/windows/keep-secure/images/event-4658.png differ
diff --git a/windows/keep-secure/images/event-4660.png b/windows/keep-secure/images/event-4660.png
new file mode 100644
index 0000000000..55c57de435
Binary files /dev/null and b/windows/keep-secure/images/event-4660.png differ
diff --git a/windows/keep-secure/images/event-4661.png b/windows/keep-secure/images/event-4661.png
new file mode 100644
index 0000000000..f2b6f57b5b
Binary files /dev/null and b/windows/keep-secure/images/event-4661.png differ
diff --git a/windows/keep-secure/images/event-4662.png b/windows/keep-secure/images/event-4662.png
new file mode 100644
index 0000000000..d2d50bda5a
Binary files /dev/null and b/windows/keep-secure/images/event-4662.png differ
diff --git a/windows/keep-secure/images/event-4663.png b/windows/keep-secure/images/event-4663.png
new file mode 100644
index 0000000000..13629253a0
Binary files /dev/null and b/windows/keep-secure/images/event-4663.png differ
diff --git a/windows/keep-secure/images/event-4664.png b/windows/keep-secure/images/event-4664.png
new file mode 100644
index 0000000000..07b9624fdf
Binary files /dev/null and b/windows/keep-secure/images/event-4664.png differ
diff --git a/windows/keep-secure/images/event-4670.png b/windows/keep-secure/images/event-4670.png
new file mode 100644
index 0000000000..664fdca981
Binary files /dev/null and b/windows/keep-secure/images/event-4670.png differ
diff --git a/windows/keep-secure/images/event-4672.png b/windows/keep-secure/images/event-4672.png
new file mode 100644
index 0000000000..12a54cb1a8
Binary files /dev/null and b/windows/keep-secure/images/event-4672.png differ
diff --git a/windows/keep-secure/images/event-4673.png b/windows/keep-secure/images/event-4673.png
new file mode 100644
index 0000000000..ac773069eb
Binary files /dev/null and b/windows/keep-secure/images/event-4673.png differ
diff --git a/windows/keep-secure/images/event-4674.png b/windows/keep-secure/images/event-4674.png
new file mode 100644
index 0000000000..a10eaaa6f7
Binary files /dev/null and b/windows/keep-secure/images/event-4674.png differ
diff --git a/windows/keep-secure/images/event-4688.png b/windows/keep-secure/images/event-4688.png
new file mode 100644
index 0000000000..5ce471eda2
Binary files /dev/null and b/windows/keep-secure/images/event-4688.png differ
diff --git a/windows/keep-secure/images/event-4689.png b/windows/keep-secure/images/event-4689.png
new file mode 100644
index 0000000000..1c80bf5428
Binary files /dev/null and b/windows/keep-secure/images/event-4689.png differ
diff --git a/windows/keep-secure/images/event-4690.png b/windows/keep-secure/images/event-4690.png
new file mode 100644
index 0000000000..400c1aa7df
Binary files /dev/null and b/windows/keep-secure/images/event-4690.png differ
diff --git a/windows/keep-secure/images/event-4691.png b/windows/keep-secure/images/event-4691.png
new file mode 100644
index 0000000000..8b5563f136
Binary files /dev/null and b/windows/keep-secure/images/event-4691.png differ
diff --git a/windows/keep-secure/images/event-4692.png b/windows/keep-secure/images/event-4692.png
new file mode 100644
index 0000000000..a26a483b4e
Binary files /dev/null and b/windows/keep-secure/images/event-4692.png differ
diff --git a/windows/keep-secure/images/event-4693.png b/windows/keep-secure/images/event-4693.png
new file mode 100644
index 0000000000..6180d34954
Binary files /dev/null and b/windows/keep-secure/images/event-4693.png differ
diff --git a/windows/keep-secure/images/event-4696.png b/windows/keep-secure/images/event-4696.png
new file mode 100644
index 0000000000..1169b0e437
Binary files /dev/null and b/windows/keep-secure/images/event-4696.png differ
diff --git a/windows/keep-secure/images/event-4697.png b/windows/keep-secure/images/event-4697.png
new file mode 100644
index 0000000000..4cafd71282
Binary files /dev/null and b/windows/keep-secure/images/event-4697.png differ
diff --git a/windows/keep-secure/images/event-4698.png b/windows/keep-secure/images/event-4698.png
new file mode 100644
index 0000000000..d8c35fc625
Binary files /dev/null and b/windows/keep-secure/images/event-4698.png differ
diff --git a/windows/keep-secure/images/event-4699.png b/windows/keep-secure/images/event-4699.png
new file mode 100644
index 0000000000..5e11312a32
Binary files /dev/null and b/windows/keep-secure/images/event-4699.png differ
diff --git a/windows/keep-secure/images/event-4700.png b/windows/keep-secure/images/event-4700.png
new file mode 100644
index 0000000000..922b70cbbb
Binary files /dev/null and b/windows/keep-secure/images/event-4700.png differ
diff --git a/windows/keep-secure/images/event-4701.png b/windows/keep-secure/images/event-4701.png
new file mode 100644
index 0000000000..71d9ba8d82
Binary files /dev/null and b/windows/keep-secure/images/event-4701.png differ
diff --git a/windows/keep-secure/images/event-4702.png b/windows/keep-secure/images/event-4702.png
new file mode 100644
index 0000000000..58b66921ff
Binary files /dev/null and b/windows/keep-secure/images/event-4702.png differ
diff --git a/windows/keep-secure/images/event-4703-partial.png b/windows/keep-secure/images/event-4703-partial.png
new file mode 100644
index 0000000000..61df0471f9
Binary files /dev/null and b/windows/keep-secure/images/event-4703-partial.png differ
diff --git a/windows/keep-secure/images/event-4703.png b/windows/keep-secure/images/event-4703.png
new file mode 100644
index 0000000000..2ddb6584cd
Binary files /dev/null and b/windows/keep-secure/images/event-4703.png differ
diff --git a/windows/keep-secure/images/event-4704.png b/windows/keep-secure/images/event-4704.png
new file mode 100644
index 0000000000..a12b3d0e8e
Binary files /dev/null and b/windows/keep-secure/images/event-4704.png differ
diff --git a/windows/keep-secure/images/event-4705.png b/windows/keep-secure/images/event-4705.png
new file mode 100644
index 0000000000..fbea053355
Binary files /dev/null and b/windows/keep-secure/images/event-4705.png differ
diff --git a/windows/keep-secure/images/event-4706.png b/windows/keep-secure/images/event-4706.png
new file mode 100644
index 0000000000..d692c6de11
Binary files /dev/null and b/windows/keep-secure/images/event-4706.png differ
diff --git a/windows/keep-secure/images/event-4707.png b/windows/keep-secure/images/event-4707.png
new file mode 100644
index 0000000000..455e4aea5c
Binary files /dev/null and b/windows/keep-secure/images/event-4707.png differ
diff --git a/windows/keep-secure/images/event-4713.png b/windows/keep-secure/images/event-4713.png
new file mode 100644
index 0000000000..a5577751f2
Binary files /dev/null and b/windows/keep-secure/images/event-4713.png differ
diff --git a/windows/keep-secure/images/event-4714.png b/windows/keep-secure/images/event-4714.png
new file mode 100644
index 0000000000..b7aba8b550
Binary files /dev/null and b/windows/keep-secure/images/event-4714.png differ
diff --git a/windows/keep-secure/images/event-4715.png b/windows/keep-secure/images/event-4715.png
new file mode 100644
index 0000000000..d61cdf4bee
Binary files /dev/null and b/windows/keep-secure/images/event-4715.png differ
diff --git a/windows/keep-secure/images/event-4716.png b/windows/keep-secure/images/event-4716.png
new file mode 100644
index 0000000000..34b7456f04
Binary files /dev/null and b/windows/keep-secure/images/event-4716.png differ
diff --git a/windows/keep-secure/images/event-4717.png b/windows/keep-secure/images/event-4717.png
new file mode 100644
index 0000000000..2ada59cc59
Binary files /dev/null and b/windows/keep-secure/images/event-4717.png differ
diff --git a/windows/keep-secure/images/event-4718.png b/windows/keep-secure/images/event-4718.png
new file mode 100644
index 0000000000..1cfddd3e3b
Binary files /dev/null and b/windows/keep-secure/images/event-4718.png differ
diff --git a/windows/keep-secure/images/event-4719.png b/windows/keep-secure/images/event-4719.png
new file mode 100644
index 0000000000..4cc7540a6c
Binary files /dev/null and b/windows/keep-secure/images/event-4719.png differ
diff --git a/windows/keep-secure/images/event-4720.png b/windows/keep-secure/images/event-4720.png
new file mode 100644
index 0000000000..d5c0d35986
Binary files /dev/null and b/windows/keep-secure/images/event-4720.png differ
diff --git a/windows/keep-secure/images/event-4722.png b/windows/keep-secure/images/event-4722.png
new file mode 100644
index 0000000000..0796375b65
Binary files /dev/null and b/windows/keep-secure/images/event-4722.png differ
diff --git a/windows/keep-secure/images/event-4723.png b/windows/keep-secure/images/event-4723.png
new file mode 100644
index 0000000000..e8f55a4cf3
Binary files /dev/null and b/windows/keep-secure/images/event-4723.png differ
diff --git a/windows/keep-secure/images/event-4724.png b/windows/keep-secure/images/event-4724.png
new file mode 100644
index 0000000000..d51ee410e3
Binary files /dev/null and b/windows/keep-secure/images/event-4724.png differ
diff --git a/windows/keep-secure/images/event-4725.png b/windows/keep-secure/images/event-4725.png
new file mode 100644
index 0000000000..961f810c35
Binary files /dev/null and b/windows/keep-secure/images/event-4725.png differ
diff --git a/windows/keep-secure/images/event-4726.png b/windows/keep-secure/images/event-4726.png
new file mode 100644
index 0000000000..6bcdae24fb
Binary files /dev/null and b/windows/keep-secure/images/event-4726.png differ
diff --git a/windows/keep-secure/images/event-4731.png b/windows/keep-secure/images/event-4731.png
new file mode 100644
index 0000000000..3547a1397c
Binary files /dev/null and b/windows/keep-secure/images/event-4731.png differ
diff --git a/windows/keep-secure/images/event-4732.png b/windows/keep-secure/images/event-4732.png
new file mode 100644
index 0000000000..62cdd84ef7
Binary files /dev/null and b/windows/keep-secure/images/event-4732.png differ
diff --git a/windows/keep-secure/images/event-4733.png b/windows/keep-secure/images/event-4733.png
new file mode 100644
index 0000000000..7ebc924898
Binary files /dev/null and b/windows/keep-secure/images/event-4733.png differ
diff --git a/windows/keep-secure/images/event-4734.png b/windows/keep-secure/images/event-4734.png
new file mode 100644
index 0000000000..4df94214f8
Binary files /dev/null and b/windows/keep-secure/images/event-4734.png differ
diff --git a/windows/keep-secure/images/event-4735.png b/windows/keep-secure/images/event-4735.png
new file mode 100644
index 0000000000..dc3fbe0f84
Binary files /dev/null and b/windows/keep-secure/images/event-4735.png differ
diff --git a/windows/keep-secure/images/event-4738.png b/windows/keep-secure/images/event-4738.png
new file mode 100644
index 0000000000..3b540b816e
Binary files /dev/null and b/windows/keep-secure/images/event-4738.png differ
diff --git a/windows/keep-secure/images/event-4739.png b/windows/keep-secure/images/event-4739.png
new file mode 100644
index 0000000000..5fb89bb560
Binary files /dev/null and b/windows/keep-secure/images/event-4739.png differ
diff --git a/windows/keep-secure/images/event-4740.png b/windows/keep-secure/images/event-4740.png
new file mode 100644
index 0000000000..19d652dac4
Binary files /dev/null and b/windows/keep-secure/images/event-4740.png differ
diff --git a/windows/keep-secure/images/event-4741.png b/windows/keep-secure/images/event-4741.png
new file mode 100644
index 0000000000..b06a01a83e
Binary files /dev/null and b/windows/keep-secure/images/event-4741.png differ
diff --git a/windows/keep-secure/images/event-4742.png b/windows/keep-secure/images/event-4742.png
new file mode 100644
index 0000000000..8922eb978b
Binary files /dev/null and b/windows/keep-secure/images/event-4742.png differ
diff --git a/windows/keep-secure/images/event-4743.png b/windows/keep-secure/images/event-4743.png
new file mode 100644
index 0000000000..1225c25c02
Binary files /dev/null and b/windows/keep-secure/images/event-4743.png differ
diff --git a/windows/keep-secure/images/event-4749.png b/windows/keep-secure/images/event-4749.png
new file mode 100644
index 0000000000..fad8e00ade
Binary files /dev/null and b/windows/keep-secure/images/event-4749.png differ
diff --git a/windows/keep-secure/images/event-4750.png b/windows/keep-secure/images/event-4750.png
new file mode 100644
index 0000000000..08d0b6c848
Binary files /dev/null and b/windows/keep-secure/images/event-4750.png differ
diff --git a/windows/keep-secure/images/event-4751.png b/windows/keep-secure/images/event-4751.png
new file mode 100644
index 0000000000..d9fd6c7928
Binary files /dev/null and b/windows/keep-secure/images/event-4751.png differ
diff --git a/windows/keep-secure/images/event-4752.png b/windows/keep-secure/images/event-4752.png
new file mode 100644
index 0000000000..3464cca5a3
Binary files /dev/null and b/windows/keep-secure/images/event-4752.png differ
diff --git a/windows/keep-secure/images/event-4753.png b/windows/keep-secure/images/event-4753.png
new file mode 100644
index 0000000000..41ee823086
Binary files /dev/null and b/windows/keep-secure/images/event-4753.png differ
diff --git a/windows/keep-secure/images/event-4764.png b/windows/keep-secure/images/event-4764.png
new file mode 100644
index 0000000000..5c376a7176
Binary files /dev/null and b/windows/keep-secure/images/event-4764.png differ
diff --git a/windows/keep-secure/images/event-4767.png b/windows/keep-secure/images/event-4767.png
new file mode 100644
index 0000000000..bb3c9a8524
Binary files /dev/null and b/windows/keep-secure/images/event-4767.png differ
diff --git a/windows/keep-secure/images/event-4768.png b/windows/keep-secure/images/event-4768.png
new file mode 100644
index 0000000000..6150806515
Binary files /dev/null and b/windows/keep-secure/images/event-4768.png differ
diff --git a/windows/keep-secure/images/event-4769.png b/windows/keep-secure/images/event-4769.png
new file mode 100644
index 0000000000..ad96b8df58
Binary files /dev/null and b/windows/keep-secure/images/event-4769.png differ
diff --git a/windows/keep-secure/images/event-4770.png b/windows/keep-secure/images/event-4770.png
new file mode 100644
index 0000000000..e780578ec3
Binary files /dev/null and b/windows/keep-secure/images/event-4770.png differ
diff --git a/windows/keep-secure/images/event-4771.png b/windows/keep-secure/images/event-4771.png
new file mode 100644
index 0000000000..b87ef7dc23
Binary files /dev/null and b/windows/keep-secure/images/event-4771.png differ
diff --git a/windows/keep-secure/images/event-4776.png b/windows/keep-secure/images/event-4776.png
new file mode 100644
index 0000000000..b0ffefdee9
Binary files /dev/null and b/windows/keep-secure/images/event-4776.png differ
diff --git a/windows/keep-secure/images/event-4778.png b/windows/keep-secure/images/event-4778.png
new file mode 100644
index 0000000000..0888c950de
Binary files /dev/null and b/windows/keep-secure/images/event-4778.png differ
diff --git a/windows/keep-secure/images/event-4779.png b/windows/keep-secure/images/event-4779.png
new file mode 100644
index 0000000000..f578cdd53f
Binary files /dev/null and b/windows/keep-secure/images/event-4779.png differ
diff --git a/windows/keep-secure/images/event-4781.png b/windows/keep-secure/images/event-4781.png
new file mode 100644
index 0000000000..f344879f9d
Binary files /dev/null and b/windows/keep-secure/images/event-4781.png differ
diff --git a/windows/keep-secure/images/event-4782.png b/windows/keep-secure/images/event-4782.png
new file mode 100644
index 0000000000..3f2822bf9c
Binary files /dev/null and b/windows/keep-secure/images/event-4782.png differ
diff --git a/windows/keep-secure/images/event-4793.png b/windows/keep-secure/images/event-4793.png
new file mode 100644
index 0000000000..2def52c754
Binary files /dev/null and b/windows/keep-secure/images/event-4793.png differ
diff --git a/windows/keep-secure/images/event-4794.png b/windows/keep-secure/images/event-4794.png
new file mode 100644
index 0000000000..08b15adb1e
Binary files /dev/null and b/windows/keep-secure/images/event-4794.png differ
diff --git a/windows/keep-secure/images/event-4798.png b/windows/keep-secure/images/event-4798.png
new file mode 100644
index 0000000000..727cf0ce90
Binary files /dev/null and b/windows/keep-secure/images/event-4798.png differ
diff --git a/windows/keep-secure/images/event-4799.png b/windows/keep-secure/images/event-4799.png
new file mode 100644
index 0000000000..2bbb69f812
Binary files /dev/null and b/windows/keep-secure/images/event-4799.png differ
diff --git a/windows/keep-secure/images/event-4800.png b/windows/keep-secure/images/event-4800.png
new file mode 100644
index 0000000000..e7354b3995
Binary files /dev/null and b/windows/keep-secure/images/event-4800.png differ
diff --git a/windows/keep-secure/images/event-4801.png b/windows/keep-secure/images/event-4801.png
new file mode 100644
index 0000000000..695e124a94
Binary files /dev/null and b/windows/keep-secure/images/event-4801.png differ
diff --git a/windows/keep-secure/images/event-4802.png b/windows/keep-secure/images/event-4802.png
new file mode 100644
index 0000000000..1225e2c79f
Binary files /dev/null and b/windows/keep-secure/images/event-4802.png differ
diff --git a/windows/keep-secure/images/event-4803.png b/windows/keep-secure/images/event-4803.png
new file mode 100644
index 0000000000..677663e56a
Binary files /dev/null and b/windows/keep-secure/images/event-4803.png differ
diff --git a/windows/keep-secure/images/event-4817.png b/windows/keep-secure/images/event-4817.png
new file mode 100644
index 0000000000..4d71e12ad1
Binary files /dev/null and b/windows/keep-secure/images/event-4817.png differ
diff --git a/windows/keep-secure/images/event-4818.png b/windows/keep-secure/images/event-4818.png
new file mode 100644
index 0000000000..65c049a552
Binary files /dev/null and b/windows/keep-secure/images/event-4818.png differ
diff --git a/windows/keep-secure/images/event-4819.png b/windows/keep-secure/images/event-4819.png
new file mode 100644
index 0000000000..7f56089668
Binary files /dev/null and b/windows/keep-secure/images/event-4819.png differ
diff --git a/windows/keep-secure/images/event-4826.png b/windows/keep-secure/images/event-4826.png
new file mode 100644
index 0000000000..326f7a2a02
Binary files /dev/null and b/windows/keep-secure/images/event-4826.png differ
diff --git a/windows/keep-secure/images/event-4865.png b/windows/keep-secure/images/event-4865.png
new file mode 100644
index 0000000000..ddbe9a6034
Binary files /dev/null and b/windows/keep-secure/images/event-4865.png differ
diff --git a/windows/keep-secure/images/event-4866.png b/windows/keep-secure/images/event-4866.png
new file mode 100644
index 0000000000..2015250a48
Binary files /dev/null and b/windows/keep-secure/images/event-4866.png differ
diff --git a/windows/keep-secure/images/event-4867.png b/windows/keep-secure/images/event-4867.png
new file mode 100644
index 0000000000..0f0b6c0662
Binary files /dev/null and b/windows/keep-secure/images/event-4867.png differ
diff --git a/windows/keep-secure/images/event-4902.png b/windows/keep-secure/images/event-4902.png
new file mode 100644
index 0000000000..9df8c87ecd
Binary files /dev/null and b/windows/keep-secure/images/event-4902.png differ
diff --git a/windows/keep-secure/images/event-4904.png b/windows/keep-secure/images/event-4904.png
new file mode 100644
index 0000000000..016ebf2d95
Binary files /dev/null and b/windows/keep-secure/images/event-4904.png differ
diff --git a/windows/keep-secure/images/event-4905.png b/windows/keep-secure/images/event-4905.png
new file mode 100644
index 0000000000..1366e366ef
Binary files /dev/null and b/windows/keep-secure/images/event-4905.png differ
diff --git a/windows/keep-secure/images/event-4906.png b/windows/keep-secure/images/event-4906.png
new file mode 100644
index 0000000000..043d6827aa
Binary files /dev/null and b/windows/keep-secure/images/event-4906.png differ
diff --git a/windows/keep-secure/images/event-4907.png b/windows/keep-secure/images/event-4907.png
new file mode 100644
index 0000000000..d29b170401
Binary files /dev/null and b/windows/keep-secure/images/event-4907.png differ
diff --git a/windows/keep-secure/images/event-4908.png b/windows/keep-secure/images/event-4908.png
new file mode 100644
index 0000000000..523cb84a9b
Binary files /dev/null and b/windows/keep-secure/images/event-4908.png differ
diff --git a/windows/keep-secure/images/event-4911.png b/windows/keep-secure/images/event-4911.png
new file mode 100644
index 0000000000..bfc3830df3
Binary files /dev/null and b/windows/keep-secure/images/event-4911.png differ
diff --git a/windows/keep-secure/images/event-4912.png b/windows/keep-secure/images/event-4912.png
new file mode 100644
index 0000000000..9a01e1273e
Binary files /dev/null and b/windows/keep-secure/images/event-4912.png differ
diff --git a/windows/keep-secure/images/event-4913.png b/windows/keep-secure/images/event-4913.png
new file mode 100644
index 0000000000..a2657ec645
Binary files /dev/null and b/windows/keep-secure/images/event-4913.png differ
diff --git a/windows/keep-secure/images/event-4928.png b/windows/keep-secure/images/event-4928.png
new file mode 100644
index 0000000000..8c0ad8368a
Binary files /dev/null and b/windows/keep-secure/images/event-4928.png differ
diff --git a/windows/keep-secure/images/event-4929.png b/windows/keep-secure/images/event-4929.png
new file mode 100644
index 0000000000..380b52aaee
Binary files /dev/null and b/windows/keep-secure/images/event-4929.png differ
diff --git a/windows/keep-secure/images/event-4930.png b/windows/keep-secure/images/event-4930.png
new file mode 100644
index 0000000000..9c28a8f677
Binary files /dev/null and b/windows/keep-secure/images/event-4930.png differ
diff --git a/windows/keep-secure/images/event-4931.png b/windows/keep-secure/images/event-4931.png
new file mode 100644
index 0000000000..fb7add47fc
Binary files /dev/null and b/windows/keep-secure/images/event-4931.png differ
diff --git a/windows/keep-secure/images/event-4932.png b/windows/keep-secure/images/event-4932.png
new file mode 100644
index 0000000000..5086bed8e7
Binary files /dev/null and b/windows/keep-secure/images/event-4932.png differ
diff --git a/windows/keep-secure/images/event-4933.png b/windows/keep-secure/images/event-4933.png
new file mode 100644
index 0000000000..49456d0e08
Binary files /dev/null and b/windows/keep-secure/images/event-4933.png differ
diff --git a/windows/keep-secure/images/event-4935.png b/windows/keep-secure/images/event-4935.png
new file mode 100644
index 0000000000..7a1c8a85ab
Binary files /dev/null and b/windows/keep-secure/images/event-4935.png differ
diff --git a/windows/keep-secure/images/event-4944.png b/windows/keep-secure/images/event-4944.png
new file mode 100644
index 0000000000..8c05133463
Binary files /dev/null and b/windows/keep-secure/images/event-4944.png differ
diff --git a/windows/keep-secure/images/event-4945.png b/windows/keep-secure/images/event-4945.png
new file mode 100644
index 0000000000..a3828ba271
Binary files /dev/null and b/windows/keep-secure/images/event-4945.png differ
diff --git a/windows/keep-secure/images/event-4946.png b/windows/keep-secure/images/event-4946.png
new file mode 100644
index 0000000000..d06ba42b67
Binary files /dev/null and b/windows/keep-secure/images/event-4946.png differ
diff --git a/windows/keep-secure/images/event-4947.png b/windows/keep-secure/images/event-4947.png
new file mode 100644
index 0000000000..ba67a44c7c
Binary files /dev/null and b/windows/keep-secure/images/event-4947.png differ
diff --git a/windows/keep-secure/images/event-4948.png b/windows/keep-secure/images/event-4948.png
new file mode 100644
index 0000000000..b956769c0a
Binary files /dev/null and b/windows/keep-secure/images/event-4948.png differ
diff --git a/windows/keep-secure/images/event-4949.png b/windows/keep-secure/images/event-4949.png
new file mode 100644
index 0000000000..c60530df7f
Binary files /dev/null and b/windows/keep-secure/images/event-4949.png differ
diff --git a/windows/keep-secure/images/event-4950.png b/windows/keep-secure/images/event-4950.png
new file mode 100644
index 0000000000..fcf6504a6b
Binary files /dev/null and b/windows/keep-secure/images/event-4950.png differ
diff --git a/windows/keep-secure/images/event-4951.png b/windows/keep-secure/images/event-4951.png
new file mode 100644
index 0000000000..164e6bc717
Binary files /dev/null and b/windows/keep-secure/images/event-4951.png differ
diff --git a/windows/keep-secure/images/event-4953.png b/windows/keep-secure/images/event-4953.png
new file mode 100644
index 0000000000..438e9bf324
Binary files /dev/null and b/windows/keep-secure/images/event-4953.png differ
diff --git a/windows/keep-secure/images/event-4954.png b/windows/keep-secure/images/event-4954.png
new file mode 100644
index 0000000000..33f6da3866
Binary files /dev/null and b/windows/keep-secure/images/event-4954.png differ
diff --git a/windows/keep-secure/images/event-4956.png b/windows/keep-secure/images/event-4956.png
new file mode 100644
index 0000000000..fad74aef48
Binary files /dev/null and b/windows/keep-secure/images/event-4956.png differ
diff --git a/windows/keep-secure/images/event-4957.png b/windows/keep-secure/images/event-4957.png
new file mode 100644
index 0000000000..8805c6964b
Binary files /dev/null and b/windows/keep-secure/images/event-4957.png differ
diff --git a/windows/keep-secure/images/event-4964.png b/windows/keep-secure/images/event-4964.png
new file mode 100644
index 0000000000..13dd095a3f
Binary files /dev/null and b/windows/keep-secure/images/event-4964.png differ
diff --git a/windows/keep-secure/images/event-4985.png b/windows/keep-secure/images/event-4985.png
new file mode 100644
index 0000000000..f182c22d48
Binary files /dev/null and b/windows/keep-secure/images/event-4985.png differ
diff --git a/windows/keep-secure/images/event-5024.png b/windows/keep-secure/images/event-5024.png
new file mode 100644
index 0000000000..900efa51c7
Binary files /dev/null and b/windows/keep-secure/images/event-5024.png differ
diff --git a/windows/keep-secure/images/event-5025.png b/windows/keep-secure/images/event-5025.png
new file mode 100644
index 0000000000..1af6e5594c
Binary files /dev/null and b/windows/keep-secure/images/event-5025.png differ
diff --git a/windows/keep-secure/images/event-5027.png b/windows/keep-secure/images/event-5027.png
new file mode 100644
index 0000000000..30f8e9887e
Binary files /dev/null and b/windows/keep-secure/images/event-5027.png differ
diff --git a/windows/keep-secure/images/event-5028.png b/windows/keep-secure/images/event-5028.png
new file mode 100644
index 0000000000..c4fffb4a49
Binary files /dev/null and b/windows/keep-secure/images/event-5028.png differ
diff --git a/windows/keep-secure/images/event-5031.png b/windows/keep-secure/images/event-5031.png
new file mode 100644
index 0000000000..854c827ce8
Binary files /dev/null and b/windows/keep-secure/images/event-5031.png differ
diff --git a/windows/keep-secure/images/event-5033.png b/windows/keep-secure/images/event-5033.png
new file mode 100644
index 0000000000..d8eaad7cef
Binary files /dev/null and b/windows/keep-secure/images/event-5033.png differ
diff --git a/windows/keep-secure/images/event-5034.png b/windows/keep-secure/images/event-5034.png
new file mode 100644
index 0000000000..2b3d8464da
Binary files /dev/null and b/windows/keep-secure/images/event-5034.png differ
diff --git a/windows/keep-secure/images/event-5058.png b/windows/keep-secure/images/event-5058.png
new file mode 100644
index 0000000000..9cc4569845
Binary files /dev/null and b/windows/keep-secure/images/event-5058.png differ
diff --git a/windows/keep-secure/images/event-5059.png b/windows/keep-secure/images/event-5059.png
new file mode 100644
index 0000000000..5896afdaa5
Binary files /dev/null and b/windows/keep-secure/images/event-5059.png differ
diff --git a/windows/keep-secure/images/event-5061.png b/windows/keep-secure/images/event-5061.png
new file mode 100644
index 0000000000..dd953b85be
Binary files /dev/null and b/windows/keep-secure/images/event-5061.png differ
diff --git a/windows/keep-secure/images/event-5136.png b/windows/keep-secure/images/event-5136.png
new file mode 100644
index 0000000000..e1b8a249fd
Binary files /dev/null and b/windows/keep-secure/images/event-5136.png differ
diff --git a/windows/keep-secure/images/event-5137.png b/windows/keep-secure/images/event-5137.png
new file mode 100644
index 0000000000..423a9e4e9c
Binary files /dev/null and b/windows/keep-secure/images/event-5137.png differ
diff --git a/windows/keep-secure/images/event-5138.png b/windows/keep-secure/images/event-5138.png
new file mode 100644
index 0000000000..fee3c30140
Binary files /dev/null and b/windows/keep-secure/images/event-5138.png differ
diff --git a/windows/keep-secure/images/event-5139.png b/windows/keep-secure/images/event-5139.png
new file mode 100644
index 0000000000..f4966fa100
Binary files /dev/null and b/windows/keep-secure/images/event-5139.png differ
diff --git a/windows/keep-secure/images/event-5140.png b/windows/keep-secure/images/event-5140.png
new file mode 100644
index 0000000000..927285b3cb
Binary files /dev/null and b/windows/keep-secure/images/event-5140.png differ
diff --git a/windows/keep-secure/images/event-5141.png b/windows/keep-secure/images/event-5141.png
new file mode 100644
index 0000000000..350ca4e5bf
Binary files /dev/null and b/windows/keep-secure/images/event-5141.png differ
diff --git a/windows/keep-secure/images/event-5142.png b/windows/keep-secure/images/event-5142.png
new file mode 100644
index 0000000000..c2fffdf288
Binary files /dev/null and b/windows/keep-secure/images/event-5142.png differ
diff --git a/windows/keep-secure/images/event-5143.png b/windows/keep-secure/images/event-5143.png
new file mode 100644
index 0000000000..c301bde59d
Binary files /dev/null and b/windows/keep-secure/images/event-5143.png differ
diff --git a/windows/keep-secure/images/event-5144.png b/windows/keep-secure/images/event-5144.png
new file mode 100644
index 0000000000..96a6176367
Binary files /dev/null and b/windows/keep-secure/images/event-5144.png differ
diff --git a/windows/keep-secure/images/event-5145.png b/windows/keep-secure/images/event-5145.png
new file mode 100644
index 0000000000..73c1364328
Binary files /dev/null and b/windows/keep-secure/images/event-5145.png differ
diff --git a/windows/keep-secure/images/event-5152.png b/windows/keep-secure/images/event-5152.png
new file mode 100644
index 0000000000..2f06bab5b4
Binary files /dev/null and b/windows/keep-secure/images/event-5152.png differ
diff --git a/windows/keep-secure/images/event-5154.png b/windows/keep-secure/images/event-5154.png
new file mode 100644
index 0000000000..1ee4716063
Binary files /dev/null and b/windows/keep-secure/images/event-5154.png differ
diff --git a/windows/keep-secure/images/event-5156.png b/windows/keep-secure/images/event-5156.png
new file mode 100644
index 0000000000..93ac25973a
Binary files /dev/null and b/windows/keep-secure/images/event-5156.png differ
diff --git a/windows/keep-secure/images/event-5157.png b/windows/keep-secure/images/event-5157.png
new file mode 100644
index 0000000000..d44c2b5188
Binary files /dev/null and b/windows/keep-secure/images/event-5157.png differ
diff --git a/windows/keep-secure/images/event-5158.png b/windows/keep-secure/images/event-5158.png
new file mode 100644
index 0000000000..65b65085d3
Binary files /dev/null and b/windows/keep-secure/images/event-5158.png differ
diff --git a/windows/keep-secure/images/event-5168.png b/windows/keep-secure/images/event-5168.png
new file mode 100644
index 0000000000..509000797f
Binary files /dev/null and b/windows/keep-secure/images/event-5168.png differ
diff --git a/windows/keep-secure/images/event-5376.png b/windows/keep-secure/images/event-5376.png
new file mode 100644
index 0000000000..b439b4ee5b
Binary files /dev/null and b/windows/keep-secure/images/event-5376.png differ
diff --git a/windows/keep-secure/images/event-5377.png b/windows/keep-secure/images/event-5377.png
new file mode 100644
index 0000000000..061f81ce3c
Binary files /dev/null and b/windows/keep-secure/images/event-5377.png differ
diff --git a/windows/keep-secure/images/event-5378.png b/windows/keep-secure/images/event-5378.png
new file mode 100644
index 0000000000..d89a1a40dd
Binary files /dev/null and b/windows/keep-secure/images/event-5378.png differ
diff --git a/windows/keep-secure/images/event-5447.png b/windows/keep-secure/images/event-5447.png
new file mode 100644
index 0000000000..97b8fd61a6
Binary files /dev/null and b/windows/keep-secure/images/event-5447.png differ
diff --git a/windows/keep-secure/images/event-5632.png b/windows/keep-secure/images/event-5632.png
new file mode 100644
index 0000000000..2d732bd578
Binary files /dev/null and b/windows/keep-secure/images/event-5632.png differ
diff --git a/windows/keep-secure/images/event-5633.png b/windows/keep-secure/images/event-5633.png
new file mode 100644
index 0000000000..a6a378c5f7
Binary files /dev/null and b/windows/keep-secure/images/event-5633.png differ
diff --git a/windows/keep-secure/images/event-5888.png b/windows/keep-secure/images/event-5888.png
new file mode 100644
index 0000000000..028ee2be06
Binary files /dev/null and b/windows/keep-secure/images/event-5888.png differ
diff --git a/windows/keep-secure/images/event-5889.png b/windows/keep-secure/images/event-5889.png
new file mode 100644
index 0000000000..2e1164bb69
Binary files /dev/null and b/windows/keep-secure/images/event-5889.png differ
diff --git a/windows/keep-secure/images/event-5890.png b/windows/keep-secure/images/event-5890.png
new file mode 100644
index 0000000000..46b9cc8e30
Binary files /dev/null and b/windows/keep-secure/images/event-5890.png differ
diff --git a/windows/keep-secure/images/event-6144.png b/windows/keep-secure/images/event-6144.png
new file mode 100644
index 0000000000..b13fba0760
Binary files /dev/null and b/windows/keep-secure/images/event-6144.png differ
diff --git a/windows/keep-secure/images/event-6145.png b/windows/keep-secure/images/event-6145.png
new file mode 100644
index 0000000000..31cca8d59e
Binary files /dev/null and b/windows/keep-secure/images/event-6145.png differ
diff --git a/windows/keep-secure/images/event-6416.png b/windows/keep-secure/images/event-6416.png
new file mode 100644
index 0000000000..d4ba5077b2
Binary files /dev/null and b/windows/keep-secure/images/event-6416.png differ
diff --git a/windows/keep-secure/images/event-6419.png b/windows/keep-secure/images/event-6419.png
new file mode 100644
index 0000000000..c1a5604016
Binary files /dev/null and b/windows/keep-secure/images/event-6419.png differ
diff --git a/windows/keep-secure/images/event-6420.png b/windows/keep-secure/images/event-6420.png
new file mode 100644
index 0000000000..546589127c
Binary files /dev/null and b/windows/keep-secure/images/event-6420.png differ
diff --git a/windows/keep-secure/images/event-6421.png b/windows/keep-secure/images/event-6421.png
new file mode 100644
index 0000000000..a3cbe78e3c
Binary files /dev/null and b/windows/keep-secure/images/event-6421.png differ
diff --git a/windows/keep-secure/images/event-6422.png b/windows/keep-secure/images/event-6422.png
new file mode 100644
index 0000000000..74b1575dae
Binary files /dev/null and b/windows/keep-secure/images/event-6422.png differ
diff --git a/windows/keep-secure/images/event-6423.png b/windows/keep-secure/images/event-6423.png
new file mode 100644
index 0000000000..dc383d254e
Binary files /dev/null and b/windows/keep-secure/images/event-6423.png differ
diff --git a/windows/keep-secure/images/filters-xml-file.png b/windows/keep-secure/images/filters-xml-file.png
new file mode 100644
index 0000000000..9a35082fd7
Binary files /dev/null and b/windows/keep-secure/images/filters-xml-file.png differ
diff --git a/windows/keep-secure/images/firewall-settings-public-profile.png b/windows/keep-secure/images/firewall-settings-public-profile.png
new file mode 100644
index 0000000000..fc4ac0b4c6
Binary files /dev/null and b/windows/keep-secure/images/firewall-settings-public-profile.png differ
diff --git a/windows/keep-secure/images/group-policy-editor.png b/windows/keep-secure/images/group-policy-editor.png
new file mode 100644
index 0000000000..361e4c3943
Binary files /dev/null and b/windows/keep-secure/images/group-policy-editor.png differ
diff --git a/windows/keep-secure/images/group-policy.png b/windows/keep-secure/images/group-policy.png
new file mode 100644
index 0000000000..aa4dd8b838
Binary files /dev/null and b/windows/keep-secure/images/group-policy.png differ
diff --git a/windows/keep-secure/images/impact-property.png b/windows/keep-secure/images/impact-property.png
new file mode 100644
index 0000000000..b65b204b68
Binary files /dev/null and b/windows/keep-secure/images/impact-property.png differ
diff --git a/windows/keep-secure/images/ipconfig-command.png b/windows/keep-secure/images/ipconfig-command.png
new file mode 100644
index 0000000000..abebb23207
Binary files /dev/null and b/windows/keep-secure/images/ipconfig-command.png differ
diff --git a/windows/keep-secure/images/logging-settings-public-profile.png b/windows/keep-secure/images/logging-settings-public-profile.png
new file mode 100644
index 0000000000..32aceb9fee
Binary files /dev/null and b/windows/keep-secure/images/logging-settings-public-profile.png differ
diff --git a/windows/keep-secure/images/msb.png b/windows/keep-secure/images/msb.png
new file mode 100644
index 0000000000..fb546a41c4
Binary files /dev/null and b/windows/keep-secure/images/msb.png differ
diff --git a/windows/keep-secure/images/net-helpmsg-58.png b/windows/keep-secure/images/net-helpmsg-58.png
new file mode 100644
index 0000000000..53f96107ea
Binary files /dev/null and b/windows/keep-secure/images/net-helpmsg-58.png differ
diff --git a/windows/keep-secure/images/netsh-advfirewall-command.png b/windows/keep-secure/images/netsh-advfirewall-command.png
new file mode 100644
index 0000000000..56d7caa0c4
Binary files /dev/null and b/windows/keep-secure/images/netsh-advfirewall-command.png differ
diff --git a/windows/keep-secure/images/netsh-command.png b/windows/keep-secure/images/netsh-command.png
new file mode 100644
index 0000000000..56d7caa0c4
Binary files /dev/null and b/windows/keep-secure/images/netsh-command.png differ
diff --git a/windows/keep-secure/images/netsh-lan-command.png b/windows/keep-secure/images/netsh-lan-command.png
new file mode 100644
index 0000000000..776bbd1bd3
Binary files /dev/null and b/windows/keep-secure/images/netsh-lan-command.png differ
diff --git a/windows/keep-secure/images/offline-settings.png b/windows/keep-secure/images/offline-settings.png
new file mode 100644
index 0000000000..f9596725c1
Binary files /dev/null and b/windows/keep-secure/images/offline-settings.png differ
diff --git a/windows/keep-secure/images/query-session.png b/windows/keep-secure/images/query-session.png
new file mode 100644
index 0000000000..7e7a29e4fc
Binary files /dev/null and b/windows/keep-secure/images/query-session.png differ
diff --git a/windows/keep-secure/images/registry-editor-audit.png b/windows/keep-secure/images/registry-editor-audit.png
new file mode 100644
index 0000000000..055863b04b
Binary files /dev/null and b/windows/keep-secure/images/registry-editor-audit.png differ
diff --git a/windows/keep-secure/images/registry-editor-firewallrules.png b/windows/keep-secure/images/registry-editor-firewallrules.png
new file mode 100644
index 0000000000..5b3c291a9a
Binary files /dev/null and b/windows/keep-secure/images/registry-editor-firewallrules.png differ
diff --git a/windows/keep-secure/images/registry-editor.png b/windows/keep-secure/images/registry-editor.png
new file mode 100644
index 0000000000..5b3c291a9a
Binary files /dev/null and b/windows/keep-secure/images/registry-editor.png differ
diff --git a/windows/keep-secure/images/schema-search.png b/windows/keep-secure/images/schema-search.png
new file mode 100644
index 0000000000..6028e60fa1
Binary files /dev/null and b/windows/keep-secure/images/schema-search.png differ
diff --git a/windows/keep-secure/images/subkeys-under-security-key.png b/windows/keep-secure/images/subkeys-under-security-key.png
new file mode 100644
index 0000000000..fdef5ec55d
Binary files /dev/null and b/windows/keep-secure/images/subkeys-under-security-key.png differ
diff --git a/windows/keep-secure/images/subtree-deletion.png b/windows/keep-secure/images/subtree-deletion.png
new file mode 100644
index 0000000000..588960f260
Binary files /dev/null and b/windows/keep-secure/images/subtree-deletion.png differ
diff --git a/windows/keep-secure/images/synaptics.png b/windows/keep-secure/images/synaptics.png
new file mode 100644
index 0000000000..2ffc025437
Binary files /dev/null and b/windows/keep-secure/images/synaptics.png differ
diff --git a/windows/keep-secure/images/synaptics1.png b/windows/keep-secure/images/synaptics1.png
new file mode 100644
index 0000000000..81716c5ad1
Binary files /dev/null and b/windows/keep-secure/images/synaptics1.png differ
diff --git a/windows/keep-secure/images/synaptics2.png b/windows/keep-secure/images/synaptics2.png
new file mode 100644
index 0000000000..2fc2d10737
Binary files /dev/null and b/windows/keep-secure/images/synaptics2.png differ
diff --git a/windows/keep-secure/images/synaptics3.png b/windows/keep-secure/images/synaptics3.png
new file mode 100644
index 0000000000..cbcb7c466a
Binary files /dev/null and b/windows/keep-secure/images/synaptics3.png differ
diff --git a/windows/keep-secure/images/synaptics4.png b/windows/keep-secure/images/synaptics4.png
new file mode 100644
index 0000000000..67bfc1f857
Binary files /dev/null and b/windows/keep-secure/images/synaptics4.png differ
diff --git a/windows/keep-secure/images/synaptics5.png b/windows/keep-secure/images/synaptics5.png
new file mode 100644
index 0000000000..4e8285a462
Binary files /dev/null and b/windows/keep-secure/images/synaptics5.png differ
diff --git a/windows/keep-secure/images/synaptics6.png b/windows/keep-secure/images/synaptics6.png
new file mode 100644
index 0000000000..79c9b3a1a2
Binary files /dev/null and b/windows/keep-secure/images/synaptics6.png differ
diff --git a/windows/keep-secure/images/synaptics7.png b/windows/keep-secure/images/synaptics7.png
new file mode 100644
index 0000000000..2ffc025437
Binary files /dev/null and b/windows/keep-secure/images/synaptics7.png differ
diff --git a/windows/keep-secure/images/task-manager.png b/windows/keep-secure/images/task-manager.png
new file mode 100644
index 0000000000..47aa593f98
Binary files /dev/null and b/windows/keep-secure/images/task-manager.png differ
diff --git a/windows/keep-secure/images/wfpstate-xml.png b/windows/keep-secure/images/wfpstate-xml.png
new file mode 100644
index 0000000000..88695f63ed
Binary files /dev/null and b/windows/keep-secure/images/wfpstate-xml.png differ
diff --git a/windows/keep-secure/images/whoami-privilege-list.png b/windows/keep-secure/images/whoami-privilege-list.png
new file mode 100644
index 0000000000..4c335aa7b5
Binary files /dev/null and b/windows/keep-secure/images/whoami-privilege-list.png differ
diff --git a/windows/keep-secure/images/windows-firewall-state-off.png b/windows/keep-secure/images/windows-firewall-state-off.png
new file mode 100644
index 0000000000..3be52d38ac
Binary files /dev/null and b/windows/keep-secure/images/windows-firewall-state-off.png differ
diff --git a/windows/keep-secure/images/windows-firewall-with-advanced-security.png b/windows/keep-secure/images/windows-firewall-with-advanced-security.png
new file mode 100644
index 0000000000..c6b59d896e
Binary files /dev/null and b/windows/keep-secure/images/windows-firewall-with-advanced-security.png differ
diff --git a/windows/keep-secure/images/windows-powershell-get-gpo.png b/windows/keep-secure/images/windows-powershell-get-gpo.png
new file mode 100644
index 0000000000..b6a818703c
Binary files /dev/null and b/windows/keep-secure/images/windows-powershell-get-gpo.png differ
diff --git a/windows/keep-secure/other-events.md b/windows/keep-secure/other-events.md
new file mode 100644
index 0000000000..020addb187
--- /dev/null
+++ b/windows/keep-secure/other-events.md
@@ -0,0 +1,31 @@
+---
+title: Other Events (Windows 10)
+description: Describes the Other Events auditing subcategory.
+ms.pagetype: security
+ms.prod: W10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# Other Events
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Events in this section generate automatically and are enabled by default.
+
+**Events List:**
+
+- [1100](event-1100.md)(S): The event logging service has shut down.
+
+- [1102](event-1102.md)(S): The audit log was cleared.
+
+- [1104](event-1104.md)(S): The security log is now full.
+
+- [1105](event-1105.md)(S): Event log automatic backup.
+
+- [1108](event-1108.md)(S): The event logging service encountered an error while processing an incoming event published from %1
+