The objective of this project is to compile in a table the relationships between events in the various Microsoft cloud security solutions and events in Windows (Event ID and Sysmon).
Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated. Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
This project is open source and available under the MIT License.
Microsoft Event ID | Sysmon ID | Microsoft Cloud Product | Data Table | ActionType | Description |
---|---|---|---|---|---|
System 6, 219, 7026 | 6 | Microsoft Defender for Endpoint | DeviceEvents | DriverLoad | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
17 | " | " | NamedPipeEvent | ||
4698 | " | " | ScheduledTaskCreated | ||
4699 | " | " | ScheduledTaskDeleted | ||
4702 | " | " | ScheduledTaskUpdated | ||
4731 | " | " | SecurityGroupCreated | ||
4734 | " | " | SecurityGroupDeleted | ||
5031 | " | " | FirewallInboundConnectionToAppBlocked | ||
5157 | " | " | FirewallInboundConnectionBlocked | ||
5157 | " | " | FirewallOutboundConnectionBlocked | ||
6416 | " | " | PnpDeviceConnected | ||
4720 | " | " | UserAccountCreated | ||
4738 | " | " | UserAccountModified | ||
4726 | " | " | UserAccountDeleted | ||
4732 | " | " | UserAccountAddedToLocalGroup | ||
4733 | " | " | UserAccountRemovedFromLocalGroup | ||
4719, 4907 | " | " | AuditPolicyModification | ||
4697 | " | " | ServiceInstalled | ||
5861,5858,5859 | 20 | " | " | ProcessCreatedUsingWmiQuery | |
5861,5858,5860 | 21 | " | " | WmiBindEventFilterToConsumer | |
5861,5858,5861 | 22 | " | " | DnsQueryResponse | |
4663 | 11 | Microsoft Defender for Endpoint | DeviceFileEvents | FileCreated | File creation, modification, and other file system events |
4663 | 11 | " | FileModified | File creation, modification, and other file system events | |
4663 | 11 | " | FileRenamed | File creation, modification, and other file system events | |
4660 | 23,26 | " | FileDeleted | File creation, modification, and other file system events | |
7 | Microsoft Defender for Endpoint | DeviceImageLoadEvents | ImageLoaded | DLL loading events | |
4624 | Microsoft Defender for Endpoint | DeviceLogonEvents | LogonSuccess | Sign-ins and other authentication events on devices | |
4625 | " | LogonFailed | Sign-ins and other authentication events on devices | ||
4648 | " | LogonAttempted | Sign-ins and other authentication events on devices | ||
4688 | 1 | Microsoft Defender for Endpoint | DeviceProcessEvents | ProcessCreated | Process creation and related events |
4657 | 13,14 | Microsoft Defender for Endpoint | DeviceRegistryEvents | RegistryValueSet | Creation and modification of registry entries |
4657 | 12 | " | RegistryValueDeleted | ||
4656 | 12 | " | RegistryKeyCreated | ||
4660 | 12 | " | RegistryKeyDeleted | ||
5156 | 3 | DeviceNetworkEvents | ConnectionSuccess | Network connection and related events | |
5156 | 3 | " | NetworkSignatureInspected | ||
5156 | 3 | " | InboundConnectionAccepted | ||
5156 | 3 | " | ConnectionFailed | ||
5156 | 3 | " | ListeningConnectionCreated | ||
5156 | 3 | " | ConnectionFound | ||
5156 | 3 | " | ConnectionAttempt | ||
5156 | 3 | " | ConnectionAcknowledged | ||
5156 | 3 | " | ConnectionRequest |
Microsoft Event ID | Sysmon ID | Microsoft Cloud Product | Data Table | ActionType | Description |
---|---|---|---|---|---|
4624 | Microsoft Defender for Identity | IdentityLogonEvents | LogonSuccess | ||
4625 | " | LogonFailed |
Microsoft Event ID | Sysmon ID | Microsoft Cloud Product | Data Table | ActionType | Description |
---|---|---|---|---|---|
4728 | Azure Monitoring | AuditLogs | Add member to a group | ||
4724 | " | Changer user password | |||
4729 | " | Remove member from group | |||
4741 | " | Add device | |||
4727 | " | Add group | |||
4725 | " | Disable account | |||
4726 | " | Delete User | |||
4624 | " | SignInLogs |