Skip to main content

Event Log

Prohlížeč událostí je součást operačního systému Windows od doby NT, která umožňuje správcům a uživatelům prohlížet protokoly událostí, obvykle přípony souborů .evt a .evtx, na místním nebo vzdáleném počítači.

  • Grafická konzole : eventvwr.msc
  • Powershell commandline příkazy: Get-Command | Select-String EventLog
  • Powershell commandline příkazy pro uložené soubory .evt a .evtx: Get-Command | Select-String WinEvent

Přehled událostí

Logon eventsDescription
4624A user successfully logged on to a computer. For information about the type of logon, see the Logon Types table below.
4625Logon failure. A logon attempt was made with an unknown user name or a known user name with a bad password.
4634The logoff process was completed for a user.
4738Account was changed (somehow)
4647A user initiated the logoff process.
4648A user successfully logged on to a computer using explicit credentials while already logged on as a different user.
4779A user disconnected a terminal server session without logging off.
Logon typeLogon titleDescription
2InteractiveA user logged on to this computer.
3NetworkA user or computer logged on to this computer from the network.
4BatchBatch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention.
5ServiceA service was started by the Service Control Manager.
7UnlockThis workstation was unlocked.
8NetworkCleartextA user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
9NewCredentialsA caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections.
10RemoteInteractiveA user logged on to this computer remotely using Terminal Services or Remote Desktop.
11CachedInteractiveA user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials.

💡 Čerpáno odtud

Přehled SID identifikátorů

SIDNameDescription
S-1-0Null AuthorityAn identifier authority.
S-1-0-0NobodyNo security principal.
S-1-1World AuthorityAn identifier authority.
S-1-1-0EveryoneA group that includes all users, even anonymous users and guests. Membership is controlled by the operating system.
S-1-2Local AuthorityAn identifier authority.
S-1-2-0LocalA group that includes all users who have logged on locally.
S-1-3Creator AuthorityAn identifier authority.
S-1-3-0Creator OwnerA placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object's creator.
S-1-3-1Creator GroupA placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object's creator. The primary group is used only by the POSIX subsystem.
S-1-3-4Owner RightsA group that represents the current owner of the object. When an ACE that carries this SID is applied to an object, the system ignores the implicit READ_CONTROL and WRITE_DAC permissions for the object owner.
S-1-4Non-unique AuthorityAn identifier authority.
S-1-5NT AuthorityAn identifier authority.
S-1-5-1DialupA group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.
S-1-5-2NetworkA group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.
S-1-5-3BatchA group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.
S-1-5-4InteractiveA group that includes all users that have logged on interactively. Membership is controlled by the operating system.
S-1-5-5-X-YLogon SessionA logon session. The X and Y values for these SIDs are different for each session.
S-1-5-6ServiceA group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.
S-1-5-7AnonymousA group that includes all users that have logged on anonymously. Membership is controlled by the operating system.
S-1-5-9Enterprise Domain ControllersA group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.
S-1-5-10Principal SelfA placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.
S-1-5-11Authenticated UsersA group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.
S-1-5-12Restricted CodeThis SID is reserved for future use.
S-1-5-13Terminal Server UsersA group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.
S-1-5-14Remote Interactive LogonA group that includes all users who have logged on through a terminal services logon.
S-1-5-17This OrganizationAn account that is used by the default Internet Information Services (IIS) user.
S-1-5-18Local SystemA service account that is used by the operating system.
S-1-5-19NT AuthorityLocal Service
S-1-5-20NT AuthorityNetwork Service
S-1-5-21domain-500AdministratorA user account for the system administrator. By default, it is the only user account that is given full control over the system.
S-1-5-21domain-501GuestA user account for people who do not have individual accounts. This user account does not require a password. By default, the Guest account is disabled.
S-1-5-21domain-502KRBTGTA service account that is used by the Key Distribution Center (KDC) service.
S-1-5-21domain-512Domain AdminsA global group whose members are authorized to administer the domain. By default, the Domain Admins group is a member of the Administrators group on all computers that have joined a domain, including the domain controllers. Domain Admins is the default owner of any object that is created by any member of the group.
S-1-5-21domain-513Domain UsersA global group that, by default, includes all user accounts in a domain. When you create a user account in a domain, it is added to this group by default.
S-1-5-21domain-514Domain GuestsA global group that, by default, has only one member, the domain's built-in Guest account.
S-1-5-21domain-515Domain ComputersA global group that includes all clients and servers that have joined the domain.
S-1-5-21domain-516Domain ControllersA global group that includes all domain controllers in the domain. New domain controllers are added to this group by default.
S-1-5-21domain-517Cert PublishersA global group that includes all computers that are running an enterprise certification authority. Cert Publishers are authorized to publish certificates for User objects in Active Directory.
S-1-5-21root domain-518Schema AdminsA universal group in a native-mode domain; a global group in a mixed-mode domain. The group is authorized to make schema changes in Active Directory. By default, the only member of the group is the Administrator account for the forest root domain.
S-1-5-21root domain-519Enterprise AdminsA universal group in a native-mode domain; a global group in a mixed-mode domain. The group is authorized to make forest-wide changes in Active Directory, such as adding child domains. By default, the only member of the group is the Administrator account for the forest root domain.
S-1-5-21domain-520Group Policy Creator OwnersA global group that is authorized to create new Group Policy objects in Active Directory. By default, the only member of the group is Administrator.
S-1-5-21domain-526Key AdminsA security group. The intention for this group is to have delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted administrators should be made a member of this group.
S-1-5-21domain-527Enterprise Key AdminsA security group. The intention for this group is to have delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted administrators should be made a member of this group.
S-1-5-21domain-553RAS and IAS ServersA domain local group. By default, this group has no members. Servers in this group have Read Account Restrictions and Read Logon Information access to User objects in the Active Directory domain local group.
S-1-5-32-544AdministratorsA built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.
S-1-5-32-545UsersA built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.
S-1-5-32-546GuestsA built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer's built-in Guest account.
S-1-5-32-547Power UsersA built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.
S-1-5-32-548Account OperatorsA built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.
S-1-5-32-549Server OperatorsA built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.
S-1-5-32-550Print OperatorsA built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues.
S-1-5-32-551Backup OperatorsA built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.
S-1-5-32-552ReplicatorsA built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.
S-1-5-32-582Storage Replica AdministratorsA built-in group that grants complete and unrestricted access to all features of Storage Replica.
S-1-5-64-10NTLM AuthenticationAn SID that is used when the NTLM authentication package authenticated the client.
S-1-5-64-14SChannel AuthenticationAn SID that is used when the SChannel authentication package authenticated the client.
S-1-5-64-21Digest AuthenticationAn SID that is used when the Digest authentication package authenticated the client.
S-1-5-80NT ServiceAn NT Service account prefix.
S-1-3-2Creator Owner ServerThis SID is not used in Windows 2000.
S-1-3-3Creator Group ServerThis SID is not used in Windows 2000.
S-1-5-8ProxyThis SID is not used in Windows 2000.
S-1-5-15This OrganizationA group that includes all users from the same organization. Only included with AD accounts and only added by a Windows Server 2003 or later domain controller.
S-1-5-32-554Builtin\Pre-Windows 2000 Compatible AccessAn alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.
S-1-5-32-555Builtin\Remote Desktop UsersAn alias. Members in this group are granted the right to log on remotely.
S-1-5-32-556Builtin\Network Configuration OperatorsAn alias. Members in this group can have some administrative privileges to manage configuration of networking features.
S-1-5-32-557Builtin\Incoming Forest Trust BuildersAn alias. Members of this group can create incoming, one-way trusts to this forest.
S-1-5-32-558Builtin\Performance Monitor UsersAn alias. Members of this group have remote access to monitor this computer.
S-1-5-32-559Builtin\Performance Log UsersAn alias. Members of this group have remote access to schedule logging of performance counters on this computer.
S-1-5-32-560Builtin\Windows Authorization Access GroupAn alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.
S-1-5-32-561Builtin\Terminal Server License ServersAn alias. A group for Terminal Server License Servers. When Windows Server 2003 Service Pack 1 is installed, a new local group is created.
S-1-5-32-562Builtin\Distributed COM UsersAn alias. A group for COM to provide computerwide access controls that govern access to all call, activation, or launch requests on the computer.
S-1-2-1Console LogonA group that includes users who are logged on to the physical console.
S-1-5-21domain-498Enterprise Read-only Domain ControllersA universal group. Members of this group are read-only domain controllers in the enterprise.
S-1-5-21domain-521Read-only Domain ControllersA global group. Members of this group are read-only domain controllers in the domain.
S-1-5-21domain-571Allowed RODC Password Replication GroupA domain local group. Members in this group can have their passwords replicated to all read-only domain controllers in the domain.
S-1-5-21domain-572Denied RODC Password Replication GroupA domain local group. Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain.
S-1-5-32-569Builtin\Cryptographic OperatorsA built-in local group. Members are authorized to perform cryptographic operations.
S-1-5-32-573Builtin\Event Log ReadersA built-in local group. Members of this group can read event logs from local computer.
S-1-5-32-574Builtin\Certificate Service DCOM AccessA built-in local group. Members of this group are allowed to connect to Certification Authorities in the enterprise.
S-1-5-80-0NT Services\All ServicesA group that includes all service processes that are configured on the system. Membership is controlled by the operating system.
S-1-5-80-0All ServicesA group that includes all service processes configured on the system. Membership is controlled by the operating system.
S-1-5-83-0NT Virtual Machine\Virtual MachinesA built-in group. The group is created when the Hyper-V role is installed. Membership in the group is maintained by the Hyper-V Management Service (VMMS). This group requires the Create Symbolic Links right (SeCreateSymbolicLinkPrivilege), and also the Log on as a Service right (SeServiceLogonRight).
S-1-5-90-0Windows Manager\Windows Manager GroupA built-in group that is used by the Desktop Window Manager (DWM). DWM is a Windows service that manages information display for Windows applications.
S-1-16-0Untrusted Mandatory LevelAn untrusted integrity level.
S-1-16-4096Low Mandatory LevelA low integrity level.
S-1-16-8192Medium Mandatory LevelA medium integrity level.
S-1-16-8448Medium Plus Mandatory LevelA medium plus integrity level.
S-1-16-12288High Mandatory LevelA high integrity level.
S-1-16-16384System Mandatory LevelA system integrity level.
S-1-16-20480Protected Process Mandatory LevelA protected-process integrity level.
S-1-16-28672Secure Process Mandatory LevelA secure process integrity level.
S-1-5-21-domain-522Cloneable Domain ControllersA global group. Members of this group that are domain controllers may be cloned.
S-1-5-32-575Builtin\RDS Remote Access ServersA built-in local group. Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.
S-1-5-32-576Builtin\RDS Endpoint ServersA built-in local group. Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.
S-1-5-32-577Builtin\RDS Management ServersA builtin local group. Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.
S-1-5-32-578Builtin\Hyper-V AdministratorsA built-in local group. Members of this group have complete and unrestricted access to all features of Hyper-V.
S-1-5-32-579Builtin\Access Control Assistance OperatorsA built-in local group. Members of this group can remotely query authorization attributes and permissions for resources on this computer.
S-1-5-32-580Builtin\Remote Management UsersA built-in local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.

Získání informací o přihlášeních

Úspěšná přihlášení

Get-EventLog -LogName Security | Where { $_.InstanceId -eq 4624 -or 4648 } | Select TimeGenerated,EventID,EntryType,ReplacementStrings

Přihlášení určitého konta

Get-EventLog -LogName Security | Where { $_.ReplacementStrings -like 'LOCALSERVICE' } | Select TimeGenerated,EventID,EntryType,ReplacementStrings

Neúspěšná přihlášení

Get-EventLog -LogName Security | Where { $_.InstanceId -eq 4625 } | Select TimeGenerated,EventID,EntryType,ReplacementStrings

💡 Když přidám za Select ještě Message, dozvím se mnohem detailnější informace.