Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/qbrusa/Windows-Security-Event-ID-Helper

This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recommandations).
https://github.com/qbrusa/Windows-Security-Event-ID-Helper

audit eventid events logging security windows

Last synced: about 2 months ago
JSON representation

This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recommandations).

Awesome Lists containing this project

README

        

# Windows Security Event ID Helper

The goal of this project is to gather all Security Event IDs in a JSON file and add connections to GPO settings. The end result allows you to filter on a each GPO setting and display all Event IDs produced by it. Additionally, tags were applied to each event ID per the advice of Microsoft or other security firms (See tags section for more informations).

# Files
You can find in the root folder :
- [Categories](Categories) folder which contains each Advanced Audit policy settings categories and Event IDs
- [AdvancedSecurityEventIDs.json](AdvancedSecurityEventIDs.json) (Categories combined in one Json file)
- [AdvancedSecurityEventIDs.csv](AdvancedSecurityEventIDs.csv) (Json to Csv)

# Scripts
You can divide or combine Json files using the scripts in the [Scripts](Scripts) folder.

# Tags
Below the descriptions of each tag and the source of the recommendation :
- JSCU-NL = All events from https://github.com/JSCU-NL/logging-essentials/blob/main/WindowsEventLogging.adoc based on multiple sources (https://github.com/JSCU-NL/logging-essentials#sources--additional-links)
- SRV-ETM = From [Events to Monitor recommandation by Microsoft](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor)
- YAMATO = Each event with rules or Not Yet from [Yamato repositories](https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/main/ConfiguringSecurityLogAuditPolicies.md)
- MDE = All events from Olaf Hartung [defender analysis post](https://medium.com/falconforce/microsoft-defender-for-endpoint-internals-0x02-audit-settings-and-telemetry-1d0af3ebfb27)
- ANSSI = From [ANSSI-FR selection](https://github.com/ANSSI-FR/guide-journalisation-microsoft/blob/main/Standard_WEC_query.xml)
- MDI = From [MDI](https://learn.microsoft.com/en-us/defender-for-identity/configure-windows-event-collection)
- SENTINEL = From [sentinel/windows-security-event-id-reference](https://learn.microsoft.com/en-us/azure/sentinel/windows-security-event-id-reference)
- ADSECURITY = From [AD Security blog](https://adsecurity.org/?p=3299)

# Sources to build this project
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings
- https://ela.st/tjs-winevt-auditing
- https://github.com/JSCU-NL/logging-essentials
- https://github.com/mdecrevoisier/Splunk-input-windows-baseline/blob/main/splunk-windows-input/win_input.conf

# 🍰 Contributing
Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are **greatly appreciated**.

# License
This project is open source and available under the [MIT License](LICENSE).