Security Event Messages

34
1 Appendix E Security Event Messages This document was previously published in Appendix E of the Microsoft Windows XP Professional Resource Kit, Second Edition, by the Microsoft Windows Team (Microsoft Press, 2003). This appendix contains information that can help you interpret security event messages. When security event auditing is enabled, you can review security-related events by using Event Viewer, a Microsoft Management Console snap-in. For information about enabling secu- rity event auditing, see “Logon and Authentication” and “Authorization and Access Control” in this book. In this appendix: Viewing Security Event Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 System Event Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Object Access Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Privilege Use Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Detailed Tracking Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Policy Change Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 User Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Account Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Directory Service Access Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Related Information For more information about security events, see “Auditing Microsoft Windows Security Events” in the Microsoft® Windows® Security Resource Kit.

Transcript of Security Event Messages

Page 1: Security Event Messages

1

Appendix E

Security Event Messages

This document was previously published in Appendix E of the Microsoft Windows XP Professional Resource Kit, Second Edition, by the Microsoft Windows Team (Microsoft Press, 2003).

This appendix contains information that can help you interpret security event messages. When security event auditing is enabled, you can review security-related events by using Event Viewer, a Microsoft Management Console snap-in. For information about enabling secu-rity event auditing, see “Logon and Authentication” and “Authorization and Access Control” in this book.

In this appendix:

Viewing Security Event Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

System Event Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Object Access Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Privilege Use Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Detailed Tracking Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Policy Change Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

User Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Account Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Directory Service Access Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Related Information

■ For more information about security events, see “Auditing Microsoft Windows Security Events” in the Microsoft® Windows® Security Resource Kit.

Page 2: Security Event Messages

2 Appendix E: Security Event Messages

Viewing Security Event MessagesYou can review security-related events by using Event Viewer, a Microsoft Management Con-sole snap-in.

To view security event messages

1. Open Event Viewer.

2. In the console tree, click Security.

3. Sort events based on any column in the details pane, such as Event ID, User, or Type.

4. Filter events based on severity, source, or event ID.

Using the event ID number, you can locate the information you need in this appendix. The security event messages are organized by category and include the following categories of event messages:

■ System

■ Logon

■ Object access

■ Privilege use

■ Detailed tracking

■ Policy change

■ User management

■ Account logon

■ Directory service access

To simplify scanning and finding the information that you need, the event listings are sorted numerically from lowest event ID number to highest. This numerical ordering is also helpful because related security events are generally grouped together.

Note In several cases, numerical grouping of like events does not apply. These events are cross-referenced in both their numerical and logical locations.

The following information is provided for each event:

■ Event number and title.

■ Parameters that describe the types of detailed information that is provided each time this particular event occurs. Parameters are listed in the order in which they appear in the event.

Page 3: Security Event Messages

Appendix E: Security Event Messages 3

■ Configurable information that indicates whether the event can be configured to log successes (that is, something happened), failures (something failed to happen), or both failures and successes.

■ Formal name, which is the formal name for the security event. This information is use-ful for programmers.

Note Many of the error event messages in this appendix apply to Active Directory®–based environments and are not seen on Microsoft® Windows® XP Professional.

System Event MessagesThe following messages document local system processes such as system startup and shut-down and changes to the system time or audit log.

512 Windows is starting up.

Parameters: None.

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_RESTART

513 Windows is shutting down.

Parameters: None.

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_SHUTDOWN

514 An authentication package was loaded by the Local Security Authority.

Parameters: Authentication package name.

Configurable Information: Success

Formal name: SE_AUDITID_AUTH_PACKAGE_LOAD

515 A trusted logon process has registered with the Local Security Authority.

Parameters: Logon process name.

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_LOGON_PROC_REGISTER

Page 4: Security Event Messages

4 Appendix E: Security Event Messages

516 Internal resources allocated for the queuing of security event messages have been exhausted, leading to the loss of some security event messages.

Parameters: Number of audit messages discarded.

Configurable Information: Success

Formal name: SE_AUDITID_AUDITS_DISCARDED

517 The audit log was cleared.

Parameters: Primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID

Configurable Information: Success

Formal name: SE_AUDITID_AUDIT_LOG_CLEARED

518 A notification package was loaded by the Security Accounts Manager.

Parameter: Notification package name.

Configurable Information: Success

Formal name: SE_AUDITID_NOTIFY_PACKAGE_LOAD

519 A process is using an invalid local procedure call (LPC) port in an attempt to impersonate a client and reply or read from or write to a client address space.

Parameters: Process ID, type of invalid use (either impersonation or reply), server port name, primary user name, primary domain, primary logon ID, client user name, client domain, cli-ent logon ID.

Configurable Information: Success

Formal name: SE_AUDITID_LPC_INVALID_USE

520 The system time was changed.

Parameters: Process ID, process name, primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, previous time, new time.

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_TIME_CHANGE

This audit normally appears twice. This is necessary to deal with time zone changes.

Page 5: Security Event Messages

Appendix E: Security Event Messages 5

Logon EventsWindows XP Professional and Windows 2000 Server generate logon-related events when a user logs on interactively or remotely. These events are generated on the computer to which the logon attempt was made. For more information about the different types of logons and the logon process, see “Logon and Authentication” in this book.

528 A user successfully logged on to a computer.

Parameters: User name, domain, or workstation involved in the logon attempt, logon ID, logon type, source of the logon attempt, authentication package (NTLM, Kerberos V5, or negotiate) involved in the logon attempt, workstation name.

Configurable Information: Success

Formal names: SE_AUDITID_SUCCESSFUL_LOGON SE_AUDITID_ NETWORK_LOGON

This event is identical to event 528.

529 The logon attempt was made with an unknown user name or a known user name with a bad password.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_UNKNOWN_USER_OR_PWD

530 The user account tried to log on outside of the allowed time.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_ACCOUNT_TIME_RESTR

Logon time restrictions can only be configured for domain accounts. However, for non-domain accounts, it is still possible to configure logon time restrictions programmatically.

Page 6: Security Event Messages

6 Appendix E: Security Event Messages

531 A logon attempt was made by using a disabled account.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_ACCOUNT_DISABLED

532 A logon attempt was made by using an expired account.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_ACCOUNT_EXPIRED

533 The user is not allowed to log on at this computer.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_WORKSTATION_RESTR

534 The user attempted to log on with a type (such as network, interactive, batch, service, or remote interactive) that is not allowed.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_LOGON_TYPE_RESTR

535 The password for the specified account has expired.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_PASSWORD_EXPIRED

Page 7: Security Event Messages

Appendix E: Security Event Messages 7

536 The Net Logon service is not active.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_NETLOGON_NOT_STARTED

The Net Logon service is needed for domain-style logon attempts or logon attempts to an account that does not exist on the workstation at which the logon attempt is occurring.

537 The logon attempt failed for other reasons.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation from which the logon attempt was made, one or two status codes indicating why the logon failed.

Configurable Information: Failure

Formal name: SE_AUDITID_UNSUCCESSFUL_LOGON

In some cases, the reason for the logon failure might not be known. To find the individual sta-tus codes, search for the files Ntstatus.h or Winerror.h, and then open them by using a text editor such as Notepad.

538 A user logged off.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation at which the logon attempt was made.

Configurable Information: Success

Formal name: SE_AUDITID_LOGOFF

The logoff message can be caused by any type of logoff attempt.

539 The account was locked out at the time the logon attempt was made.

Parameters: User name, domain, or workstation that controls the user account, logon type, source of the logon attempt, authentication package used for the logon attempt, name of the workstation from which the logon attempt was made.

Configurable Information: Failure

Formal name: SE_AUDITID_ACCOUNT_LOCKED

Page 8: Security Event Messages

8 Appendix E: Security Event Messages

540 A user successfully logged on to a computer.

Parameters: User name, domain, or workstation involved in the logon attempt, logon ID, logon type, source of the logon attempt, authentication package (NTLM, Kerberos V5, or negotiate) involved in the logon attempt, workstation name.

Configurable Information: Success

Formal names: SE_AUDITID_SUCCESSFUL_LOGON SE_AUDITID_ NETWORK_LOGON

This event is identical to event 528.

541 Main mode Internet Key Exchange (IKE) authentication was completed between the local computer and the listed peer identity (establishing a security association), or quick mode has established a data channel.

Parameters: Mode (main or quick), the IP address and name of the other host involved in the authentication, a filter specifying source and destination addresses (address can be either spe-cific IP, IP subnet, or all computers), an encryption algorithm, hashing algorithm, and timeout for the security association.

Configurable Information: Success

Formal name: SE_AUDITID_IPSEC_LOGON_SUCCESS

542 A data channel was terminated.

Parameters: Mode (main or quick), a filter indicating a subnet, a particular host, or all com-puters, the inbound Service Parameters Index (SPI) or local host, the outbound SPI (the other peer in the connection).

Note Data transfer mode is the same as quick mode (QM).

Configurable Information: Success

Formal name: SE_AUDITID_IPSEC_LOGOFF_QM

543 Main mode was terminated.

Parameters: A filter indicating a subnet, a particular host, or all computers.

Configurable Information: Success

Formal name: SE_AUDITID_IPSEC_LOGOFF_MM

This might occur as a result of the time limit on the security association expiring (the default is eight hours), policy changes, peer termination, and so on.

Page 9: Security Event Messages

Appendix E: Security Event Messages 9

544 Main mode authentication failed because the peer did not provide a valid certificate or the signature was not validated.

Parameters: Peer identity (the other host involved in the authentication), a filter indicating a subnet, a particular host, or all computers.

Configurable Information: Failure

Formal name: SE_AUDITID_IPSEC_AUTH_FAIL_CERT_TRUST

545 Main mode authentication failed because of a Kerberos failure or a password that is not valid.

Parameters: Peer identity (the other host involved in the authentication), filter indicating a subnet, a particular host, or all computers.

Configurable Information: Failure

Formal name: SE_AUDITID_IPSEC_AUTH_FAIL

546 IKE security association establishment failed because the peer sent a proposal that is not valid. A packet was received that contained data that is not valid.

Parameters: Mode (main or quick, depending when the error occurred), a filter indicating a subnet, a particular host, or all computers), incorrect attribute, expected value, received value.

Configurable Information: Failure

Formal name: SE_AUDITID_IPSEC_ATTRIB_FAIL

547 A failure occurred during an IKE handshake.

Parameters: Mode (indicates when the failure occurred), a filter indicating a subnet, particu-lar host, or all computers, the point of failure, and the reason for the failure.

Configurable Information: Failure

Formal name: SE_AUDITID_IPSEC_NEGOTIATION_FAIL

Page 10: Security Event Messages

10 Appendix E: Security Event Messages

548 The security ID (SID) from a trusted domain does not match the home domain SID of the client.

Parameters: User name, domain name, logon type, logon process, authentication package, workstation name, impersonated domain.

Configurable Information: Failure

Formal name: SE_AUDITID_DOMAIN_TRUST_INCONSISTENT

549 All SIDs were filtered out during a cross-forest authentication.

Parameters: User name, domain name, logon type, logon process, authentication package, workstation name.

Configurable Information: Failure

Formal name: SE_AUDITID_ALL_SIDS_FILTERED

During cross-forest authentication, all SIDs corresponding to untrusted namespaces are fil-tered out. This event is triggered when this filtering action removes all SIDs.

550 Indicates a possible denial-of-service attack.

Parameters: No parameters, other than the above text describing the beginning or ending of a denial-of-service attack.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_IPSEC_IKE_NOTIFICATION

This event message is generated when IKE has a large number of pending requests to establish security associations and is beginning denial-of-service prevention mode. This might be nor-mal if caused by high computer loads or a large number of client connection attempts. It also might be the result of a denial-of-service attack against IKE. If this is a denial-of-service attack, there is usually many audits for failed IKE negotiations to spoofed IP addresses. Otherwise, the computer is only extremely heavily loaded.

682 A user has reconnected to a disconnected terminal server session.

Parameters: User name, domain name, logon ID, session name, client name, client address.

Configurable Information: Success

Formal name: SE_AUDITID_SESSION_RECONNECTED

This event message is generated on a terminal server.

Page 11: Security Event Messages

Appendix E: Security Event Messages 11

683 A user disconnected a terminal server session without logging off.

Parameters: User name, domain, logon ID, session name, client name, client address.

Configurable Information: Success or Failure.

Formal name: SE_AUDITID_SESSION_DISCONNECTED

This event message is generated when a user is connected to a terminal server session over the network. It appears on the terminal server.

Object Access EventsObject access events must be enabled on a per object basis by configuring the system access control list (SACL) for that object. For information about how to configure SACLs, see “Autho-rization and Access Control” in this book.

560 Access was granted to an already existing object.

Parameters: Object server, object type, object name, handle ID, operation ID, process ID, image file name, primary user name, primary domain, primary logon ID, client user name, cli-ent domain, client logon ID, access privileges, restricted SID count.

Configurable Information: Success

Formal name: SE_AUDITID_OPEN_HANDLE

Objects are accessed with handles. This event means that a handle was opened. It does not mean that the object was actually accessed.

562 A handle to an object was closed.

Parameters: Object server, handle ID, process ID, image file name.

Configurable Information: Failure

Formal name: SE_AUDITID_CLOSE_HANDLE

563 An attempt was made to open an object with the intent to delete it.

Parameters: Object server, object type, object name, handle ID, operation ID, process ID, pri-mary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, accesses, privileges.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_OPEN_OBJECT_FOR_DELETE

This is used by file systems when the FILE_DELETE_ON_CLOSE flag is specified.

Page 12: Security Event Messages

12 Appendix E: Security Event Messages

564 A protected object was deleted.

Parameters: Object server, handle ID, process ID.

Configurable Information: Success

Formal name: SE_AUDITID_DELETE_OBJECT,

565 Access was granted to an already existing object type.

Parameters: Object server, object type, object name, handle ID, operation ID, process ID, pro-cess name, primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, accesses, privileges, properties.

Configurable Information: Success

Formal name: SE_AUDITID_OPEN_HANDLE_OBJECT_TYPE

566 A generic object operation took place.

Parameters: Operation type, object type, object name, handle ID, primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, accesses, proper-ties.

Configurable Information: Success

Formal name: SE_AUDITID_OBJECT_OPERATION

This event message is also used to audit directory service access events.

567 A permission associated with a handle was used.

Parameters: Name of the object being accessed, object server, handle ID, object type, process ID, access mask.

Configurable Information: Success

Formal name: SE_AUDITID_OBJECT_ACCESS

A handle is created with certain granted permissions (read, write, and so on). When the han-dle is used, one audit is generated for each of the permissions that was used.

Page 13: Security Event Messages

Appendix E: Security Event Messages 13

568 An attempt was made to create a hard link to a file that is being audited.

Parameters: Primary user name, primary domain, primary logon ID, object name, link name.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_HARDLINK_CREATION

Privilege Use EventsChanges to a user’s privileges or attempts to use privileges in an unauthorized manner might require investigation. These events help support these queries.

576 Specified privileges were added to a user’s token.

Parameters: Special privileges assigned to the new user (SeChangeNotifyPrivilege, SeAudit-Privilege, SeCreateTokenPrivilege, SeAssignPrimaryTokenPrivilege, SeBackupPrivilege, SeRe-storePrivilege, SeDebugPrivilege), user name, domain, logon ID, privileges.

Configurable Information: Success

Formal name: SE_AUDITID_ ASSIGN_SPECIAL_PRIV

This event message is generated when the user logs on.

577 A user attempted to perform a privileged system service operation.

Parameters: Privileged service called, server, service, primary user name, primary domain, pri-mary logon ID, client user name, client domain, client logon ID, privileges.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_ PRIVILEGED_SERVICE

Callers of PrivilegedServiceAuditAlarm generate this event.

578 Privileges were used on an already open handle to a protected object.

Parameters: Privileged object operation, object server, object handle, process ID, primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, privileges.

Configurable Information: Success

Formal name: SE_AUDITID_PRIVILEGED_OBJECT

Page 14: Security Event Messages

14 Appendix E: Security Event Messages

Detailed Tracking EventsIn Windows XP Professional and Windows 2000 Server, all processes occur in a security con-text. At times you might need to investigate the security implications of the processes initiated on a computer. The following messages allow you to see security events that relate to system processes.

592 A new process was created.

Parameters: New process ID, image file name, creator process ID, user name, domain logon ID.

Configurable Information: Success

Formal name: SE_AUDITID_PROCESS_CREATED

593 A process exited.

Parameters: Process ID, image file name, user name, domain name, logon ID.

Configurable Information: Success

Formal name: SE_AUDITID_PROCESS_EXIT

594 A handle to an object was duplicated.

Parameters: Source handle ID, source process ID, target handle ID, target process ID.

Configurable Information: Success

Formal name: SE_AUDITID_DUPLICATE_HANDLE

595 Indirect access to an object was obtained.

Parameters: Object type, object name, process ID, primary user name, primary domain, pri-mary logon ID, client user name, client domain, client logon ID, accesses.

Configurable Information: Success

Formal name: SE_AUDITID_INDIRECT_REFERENCE

Page 15: Security Event Messages

Appendix E: Security Event Messages 15

596 A data protection master key was backed up.

Parameters: Key ID, recovery server (the computer to which the key was backed up), recovery key ID (identifies the key on the domain controller that was used to encrypt the master key), failure reason.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_DPAPI_BACKUP

The master key is used by the CryptProtectData and CryptUnprotectData routines, and Encrypting File System (EFS). The master key is backed up each time a new one is created (the default is 90 days). The key is usually backed up to a domain controller.

597 A data protection master key was recovered from a recovery server.

Parameters: Key ID, recovery server (the computer to which the key was backed up), recovery key ID (identifying the key on the domain controller used to encrypt the master key), failure reason.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_DPAPI_RECOVERY

598 Auditable data was protected.

Parameters: Data description, key ID (the master key GUID), protected data flags (CRYPTPROTECT_AUDIT, which indicates that the audit should be generated or CRYPTPROTECT_SYSTEM, which indicates that this is system information and should not be viewed in the user space), name of the protection algorithm, failure reason.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_DPAPI_PROTECT

599 Auditable data was unprotected.

Parameters: Data description, key ID, protected data flags (including CRYPTPROTECT_AUDIT, which indicates that the audit should be generated, and CRYPTPROTECT_SYSTEM, which indicates that this is system information and should not be viewed in the user space), name of the protection algorithm, failure reason.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_DPAPI_UNPROTECT

Page 16: Security Event Messages

16 Appendix E: Security Event Messages

600 A process was assigned a primary token.

This often happens when a service starts. The following parameters are tracked for both the assigning process and the new process.

Parameters: Process ID, image file name (the name of the process), user name, domain name, logon ID.

Configurable Information: Success

Formal name: SE_AUDITID_ASSIGN_TOKEN

Policy Change EventsPolicy change events include security event messages involving trust relationships, IPSec pol-icy, and user rights assignments.

IPSec policy involves settings that need to be applied to the computer. The IPSec audits include filters (what traffic should be processed by IPSec) and filter actions (such as encryp-tion or authentication).

For more information about the user rights that are being audited, see the appendix “User Rights” in this book.

608 A user right was assigned.

Parameters: User, right, assigned to, assigned by (includes user name, domain name, and logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_USER_RIGHT_ASSIGNED

609 A user right was removed.

Parameters: User, right, assigned to, assigned by (includes user name, domain, and logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_USER_RIGHT_REMOVED

Page 17: Security Event Messages

Appendix E: Security Event Messages 17

610 A trust relationship with another domain was created.

Parameters: New trusted domain (domain name, domain ID), established by (user name, domain name, logon ID), trust type, trust direction, trust attributes.

Configurable Information: Success

Formal name: SE_AUDITID_TRUSTED_DOMAIN_ADD

This event is recorded on the domain controller on which the trusted domain object (TDO) is created and not on any other domain controller to which the TDO is replicated.

611 A trust relationship with another domain was removed.

Parameters: Trusted domain removed (domain name, domain ID), removed by (user name, domain name, logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_TRUSTED_DOMAIN_REM

This event is only recorded on the domain controller on which the trusted domain object (TDO) is deleted.

612 An audit policy was changed.

Parameters: New policy (includes success, failure, or both for logon/logoff, object access, privilege use, account management, policy change, system, detailed tracking, directory ser-vice, access, account logon), changed by (user name, domain name, logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_AUDIT_POLICY_CHANGE

The new policy is described in the audit body.

613 An IPSec policy agent started.

Parameters: Policy source.

Configurable Information: Success

Formal name: SE_AUDITID_IPSEC_POLICY_START

614 An IPSec policy agent was disabled.

Parameters: Policy source.

Configurable Information: Success

Formal name: SE_AUDITID_IPSEC_POLICY_DISABLED

Page 18: Security Event Messages

18 Appendix E: Security Event Messages

615 An IPSec policy agent changed.

Parameters: Policy source.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_IPSEC_POLICY_CHANGED

616 An IPSec policy agent encountered a potentially serious failure.

Parameters: Policy source.

Configurable Information: Failure

Formal name: SE_AUDITID_IPSEC_POLICY_FAILURE

617 A Kerberos policy changed.

Parameters: Changed by (user name, domain name, logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_KERBEROS_POLICY_CHANGE

618 Encrypted Data Recovery policy changed.

Parameters: Changed by (user name, domain name, logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_EFS_POLICY_CHANGE

620 A trust relationship with another domain was modified.

Parameters: Trusted domain information modified (domain name, domain ID), modified by (user name, domain name, logon ID), trust type, trust direction, trust attributes.

Configurable Information: Success

Formal name: SE_AUDITID_TRUSTED_DOMAIN_MOD

This event is only recorded on the domain controller on which the trusted domain object (TDO) is modified.

Page 19: Security Event Messages

Appendix E: Security Event Messages 19

621 System access was granted to an account.

Parameters: Access granted, account modified, assigned by (user name, domain name, and logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_ACCESS_GRANTED

System access permissions can be interactive, network, batch, service, proxy, deny interactive, deny network, deny batch, deny service, remote interactive, or deny remote interactive.

622 System access was removed from an account.

Parameters: Access removed, account modified, assigned by (user name, domain name, and logon ID).

Configurable Information: Success

Formal name: SE_AUDITID_SYSTEM_ACCESS_REMOVED

System access permissions can be interactive, network, batch, service, proxy, deny interactive, deny network, deny batch, deny service, remote interactive, or deny remote interactive.

768 A collision was detected between a namespace element in one forest and a namespace element in another forest.

Parameters: Target type, target name, forest root, top level name, DNS name, NetBIOS name, SID, new flags.

Configurable Information: Failure

Formal name: SE_AUDITID_NAMESPACE_COLLISION

When a namespace element in one forest overlaps a namespace element in another forest, it can lead to ambiguity in resolving a name belonging to one of the namespace elements. This overlap is also called a collision. Not all parameters are valid for each namespace element. For example, parameters such as DNS name, NetBIOS name, and SID are not valid for a “TopLev-elName” namespace element.

Page 20: Security Event Messages

20 Appendix E: Security Event Messages

769 Trusted forest information was added.

Parameters: Forest root, forest root SID, operation ID, entry type, flags, top level name, DNS name, NetBIOS name, domain SID, added by, client user name, client domain, client logon ID.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_TRUSTED_FOREST_INFO_ENTRY_ADD

This event message is generated when forest trust information is updated and one or more entries are added. One event message is generated per added entry. If multiple entries are added, deleted, or modified in a single update of the forest trust information, all the generated event messages have a single unique identifier called an operation ID. This allows you to deter-mine that the multiple generated event messages are the result of a single operation. Not all parameters are valid for each entry type. For example, parameters such as DNS name, Net-BIOS name and SID are not valid for an entry of type “TopLevelName”.

770 Trusted forest information was deleted.

Parameters: Forest root, forest root SID, operation ID, entry type, flags, top level name, DNS name, NetBIOS name, domain SID, deleted by, client user name, client domain, client logon ID.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_TRUSTED_FOREST_INFO_ENTRY_REM

This event message is generated when forest trust information is updated and one or more entries are deleted. One event message is generated per deleted entry. If multiple entries are added, deleted, or modified in a single update of the forest trust information, all the generated event messages have a single unique identifier called an operation ID. This allows you to deter-mine that the multiple generated event messages are the result of a single operation. Not all parameters are valid for each entry type. For example, parameters such as DNS name, Net-BIOS name, and SID are not valid for an entry of type “TopLevelName”.

771 Trusted forest information was modified.

Parameters: Forest root, forest root SID, operation ID, entry type, flags, top level name, DNS name, NetBIOS name, domain SID, added by, client user name, client domain, client logon ID.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_TRUSTED_FOREST_INFO_ENTRY_MOD

This event message is generated when forest trust information is updated and one or more entries are modified. One event message is generated per modified entry. If multiple entries are added, deleted, or modified in a single update of the forest trust information, all the gen-erated event messages have a single unique identifier called an operation ID. This allows you

Page 21: Security Event Messages

Appendix E: Security Event Messages 21

to determine that the multiple generated event messages are the result of a single operation. Not all parameters are valid for each entry type. For example, parameters such as DNS name, NetBIOS name and SID are not valid for an entry of type “TopLevelName”.

User Management EventsThe bulk of the user management events are identical, with variation only in the activity (for example, enabled versus disabled) and the security groups (local, global, or universal) to which the audit applies.

In addition, from event 648 to event 685, some events include the phrase SECURITY_DISABLED in their formal names. This means that these groups cannot be used to grant permissions in access checks. If the SID representing a security-disabled group appears in a user’s token, it is only used to verify deny access control entries (ACEs) during an access check. A SECURITY_ENABLED group is used to verify all ACEs during an access check.

For more information about access tokens and the roles and use of local, global, or universal groups, see “Authorization and Access Control” in this book.

624 A user account was created.

Parameters: Name of new user account, domain of new user account, SID string of new user account, user name of subject creating the user account, domain name of subject creating the user account, logon ID string of subject creating the user account, privileges used to create the user account.

Configurable Information: Success

Formal name: SE_AUDITID_USER_CREATED

627 A user password was changed.

Parameters: Name of target user account, domain of target user account, SID string of target user account, user name of subject changing the user account, domain name of subject chang-ing the user account, logon ID string of subject changing the user account.

Configurable Information: Success

Formal name: SE_AUDITID_USER_PWD_CHANGED

Page 22: Security Event Messages

22 Appendix E: Security Event Messages

628 A user password was set.

Parameters: Name of target user account, domain of target user account, SID string of target user account, user name of subject changing the user account, domain name of subject chang-ing the user account, logon ID string of subject changing the user account.

Configurable Information: Success

Formal name: SE_AUDITID_USER_PWD_SET

630 A user account was deleted.

Parameters: Name of target user account, domain of target user account, SID string of target user account, user name of subject deleting the user account, domain name of subject deleting the user account, logon ID string of subject deleting the user account.

Configurable Information: Success

Formal name: SE_AUDITID_USER_DELETED

631 A global group was created.

Parameters: Name of new group account, domain of new group account, SID string of new group account, user name of subject creating the account, domain name of subject creating the account, logon ID string of subject creating the account.

Configurable Information: Success

Formal name: SE_AUDITID_GLOBAL_GROUP_CREATED

632 A member was added to a global group.

Parameters: SID string of member being added, name of target account, domain of target account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_GLOBAL_GROUP_ADD

633 A member was removed from a global group.

Parameters: SID string of member being removed, name of target account, domain of target account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_GLOBAL_GROUP_REM

Page 23: Security Event Messages

Appendix E: Security Event Messages 23

634 A global group was deleted.

Parameters: Name of the global group account, domain of the global group account, SID string of the global group account, user name of subject deleting the global group, domain name of subject deleting the global group, logon ID string of subject deleting the global group.

Configurable Information: Success

Formal name: SE_AUDITID_GLOBAL_GROUP_DELETED

635 A new local group was created.

Parameters: Name of new group account, domain of new group account, SID string of new group account, user name of subject creating the account, domain name of subject creating the account, logon ID string of subject creating the account.

Configurable Information: Success

Formal name: SE_AUDITID_LOCAL_GROUP_CREATED

636 A member was added to a local group.

Parameters: SID string of member being added, name of target account, domain of target account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_LOCAL_GROUP_ADD

637 A member was removed from a local group.

Parameters: SID string of member being removed, name of target account, domain of target account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_LOCAL_GROUP_REM

Page 24: Security Event Messages

24 Appendix E: Security Event Messages

638 A local group was deleted.

Parameters: Name of group account being deleted, domain of the group account, SID string of group account, user name of subject deleting the account, domain name of subject deleting the account, logon ID string of subject deleting the account.

Configurable Information: Success

Formal name: SE_AUDITID_LOCAL_GROUP_DELETED

639 A local group account was changed.

Parameters: Name of group account being changed, domain of group account, SID string of group account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_LOCAL_GROUP_CHANGE

641 A global group account was changed.

Parameters: Name of group account being changed, domain of group account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_GLOBAL_GROUP_CHANGE

642 A user account was changed.

Parameters: Name of user account, domain of user account, SID string of user account, user name of subject changing the user account, domain name of subject changing the user account, logon ID string of subject changing the user account.

Configurable Information: Success

Formal name: SE_AUDITID_USER_CHANGE

643 A domain policy was modified.

Parameters: Domain policy that was modified, domain name, domain ID, caller user name, caller domain, caller logon ID, privileges used.

Configurable Information: Success

Formal name: SE_AUDITID_DOMAIN_POLICY_CHANGE

Page 25: Security Event Messages

Appendix E: Security Event Messages 25

644 A user account was auto locked.

Parameters: Name of target user account, domain of target user account, SID string of target user account, user name of subject changing the user account, domain name of subject chang-ing the user account, logon ID string of subject changing the user account.

Configurable Information: Success

Formal name: SE_AUDITID_ACCOUNT_AUTO_LOCKED

This happens when a user attempts to log on unsuccessfully multiple times (the number of attempts is configured by the administrator).

645 A computer account was created.

Parameters: Name of new computer account, domain of new computer account, SID string of new computer account, user name of subject creating the computer account, domain name of subject creating the computer account, logon ID string of subject creating the computer account, privileges used to create the computer account.

Configurable Information: Success

Formal name: SE_AUDITID_COMPUTER_CREATED

646 A computer account was changed.

Parameters: Name of target computer account, domain of target computer account, SID string of target computer account, user name of subject changing the computer account, domain name of subject changing the computer account, logon ID string of subject changing the computer account, privileges used to change the computer account.

Configurable Information: Success

Formal name: SE_AUDITID_COMPUTER_CHANGE

647 A computer account was deleted.

Parameters: Name of target computer account, domain of target computer account, SID string of target computer account, user name of subject deleting the computer account, domain name of subject deleting the computer account, logon ID string of subject deleting the computer account, privileges used to delete the computer account.

Configurable Information: Success

Formal name: SE_AUDITID_COMPUTER_DELETED

Page 26: Security Event Messages

26 Appendix E: Security Event Messages

648 A local security group with security disabled was created.

Parameters: Name of new group account, domain of new group account, SID string of new group account, user name of subject creating the account, domain name of subject creating the account, logon ID string of subject creating the account, privileges used to create the account.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_LOCAL_GROUP_CREATED

SECURITY_DISABLED in the formal name means that this group cannot be used to grant permissions in access checks. If the SID representing a security-disabled group appears in a user’s token, it is only used to verify deny access control entries (ACEs) during an access check. A SECURITY_ENABLED group is used to verify all ACEs during an access check.

For more information about access tokens and the roles and usage of local, global, or univer-sal groups, see “Authorization and Access Control” in this book.

649 A local security group with security disabled was changed.

Parameters: Name of group account, domain of group account, SID string of group account, user name of subject modifying the account, domain name of subject modifying the account, logon ID string of subject modifying the account, privileges used to modify the account.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_LOCAL_GROUP_CHANGE

650 A member was added to a security-disabled local security group.

Parameters: SID string of member being added, name of security-disabled local security group account, domain of security group account, SID string of security-disabled local secu-rity group account, user name of subject changing the membership of the security-disabled local security group, domain name of subject changing the membership of the security-dis-abled local security group, logon ID string of subject changing the membership of the secu-rity-disabled local security group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_LOCAL_GROUP_ADD

Page 27: Security Event Messages

Appendix E: Security Event Messages 27

651 A member was removed from a security-disabled local security group.

Parameters: SID string of member being removed, name of security-disabled local security group account, domain of security-disabled security group account, SID string of local secu-rity group account, user name of subject changing the membership of the security-disabled local security group, domain name of subject changing the membership of the security-dis-abled local security group, logon ID string of subject changing the membership of the secu-rity-disabled local security group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_LOCAL_GROUP_REM

652 A security-disabled local group was deleted.

Parameters: Name of the security-disabled local group, domain of security-disabled local group, SID string of security-disabled local group, user name of subject deleting the security-disabled local group, domain name of subject deleting the security-disabled local group, logon ID string of subject deleting the security-disabled local group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_LOCAL_GROUP_DELETED

653 A security-disabled global group was created.

Parameters: Name of new security-disabled global group, domain of new security-disabled global group, SID string of new security-disabled global group, user name of subject creating the security-disabled global group, domain name of subject creating the security-disabled glo-bal group, logon ID string of subject creating the security-disabled global group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_GLOBAL_GROUP_CREATED

654 A security-disabled global group was changed.

Parameters: Name of security-disabled global group, domain of security-disabled global group, SID string of security-disabled global group, user name of subject changing the secu-rity-disabled global group, domain name of subject changing the security-disabled global group, logon ID string of subject changing the security-disabled global group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_GLOBAL_GROUP_ CHANGE

Page 28: Security Event Messages

28 Appendix E: Security Event Messages

655 A member was added to a security-disabled global group.

Parameters: SID string of member being added, name of security-disabled global group, domain of security-disabled global group, SID string of security-disabled global group, user name of subject changing the security-disabled global group, domain name of subject chang-ing the security-disabled global group, logon ID string of subject changing the security-dis-abled global group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_GLOBAL_GROUP_ADD

656 A member was removed from a security-disabled global group.

Parameters: SID string of member being removed, name of security-disabled global group, domain of security-disabled global group, SID string of security-disabled global group, user name of subject changing the security-disabled global group, domain name of subject chang-ing the security-disabled global group, logon ID string of subject changing the security-dis-abled global group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_GLOBAL_GROUP_REM

657 A security-disabled global group was deleted.

Parameters: Name of security-disabled global group, domain of security-disabled global group, SID string of security-disabled global group, user name of subject deleting the security-disabled global group, domain name of subject deleting the security-disabled global group, logon ID string of subject deleting the security-disabled global group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_GLOBAL_GROUP_ DELETED

658 A security-enabled universal group was created.

Parameters: Name of new group account, domain of new security-enabled universal group, SID string of new security-enabled universal group, user name of subject creating the security-enabled universal group, domain name of subject creating the security-enabled universal group, logon ID string of subject creating the security-enabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_ENABLED_UNIVERSAL_GROUP_ CREATED

Page 29: Security Event Messages

Appendix E: Security Event Messages 29

659 A security-enabled universal group was changed.

Parameters: Name of target security-enabled universal group, domain of security-enabled universal group, SID string of security-enabled universal group, user name of subject chang-ing the security-enabled universal group, domain name of subject changing the security-enabled universal group, logon ID string of subject changing the security-enabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_ENABLED_UNIVERSAL_GROUP_ CHANGE

660 A member was added to a security-enabled universal group.

Parameters: SID string of member being added, name of security-enabled universal group, domain of security-enabled universal group, SID string of security-enabled universal group, user name of subject changing the security-enabled universal group, domain name of subject changing the security-enabled universal group, logon ID string of subject changing the secu-rity-enabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_ENABLED_UNIVERSAL_GROUP_ADD

661 A member was removed from a security-enabled universal group.

Parameters: SID string of member being removed, name of security-enabled universal group, domain of security-enabled universal group, SID string of security-enabled universal group, user name of subject changing the security-enabled universal group, domain name of subject changing the security-enabled universal group, logon ID string of subject changing the secu-rity-enabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_ENABLED_UNIVERSAL_GROUP_REM

662 A security-enabled universal group was deleted.

Parameters: Name of target account, domain of security-enabled universal group, SID string of security-enabled universal group, user name of subject deleting the security-enabled univer-sal group, domain name of subject deleting the security-enabled universal group, logon ID string of subject deleting the security-enabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_ENABLED_UNIVERSAL_GROUP_ DELETED

Page 30: Security Event Messages

30 Appendix E: Security Event Messages

663 A security-disabled universal group was created.

Parameters: Name of new security-disabled universal group, domain of new security-disabled universal group, SID string of new security-disabled universal group, user name of subject cre-ating the security-disabled universal group, domain name of subject creating the security-dis-abled universal group, logon ID string of subject creating the security-disabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_UNIVERSAL_GROUP_ CREATED

664 A security-disabled universal group was changed.

Parameters: Name of security-disabled universal group, domain of security-disabled univer-sal group, SID string of security-disabled universal group, user name of subject changing the security-disabled universal group, domain name of subject changing the security-disabled universal group, logon ID string of subject changing the security-disabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_UNIVERSAL_GROUP_ CHANGE

665 A member was added to a security-disabled universal group.

Parameters: SID string of member being added, name of security-disabled universal group, domain of security-disabled universal group, SID string of security-disabled universal group, user name of subject changing the security-disabled universal group, domain name of subject changing the security-disabled universal group, logon ID string of subject changing the secu-rity-disabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_UNIVERSAL_GROUP_ADD

666 A member was removed from a security-disabled universal group.

Parameters: SID string of member being removed, name of security-disabled universal group, domain of security-disabled universal group, SID string of security-disabled universal group, user name of subject changing the security-disabled universal group, domain name of subject changing the security-disabled universal group, logon ID string of subject changing the secu-rity-disabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_UNIVERSAL_GROUP_REM

Page 31: Security Event Messages

Appendix E: Security Event Messages 31

667 A security-disabled universal group was deleted.

Parameters: Name of target account, domain of security-disabled universal group, SID string of security-disabled universal group, user name of subject deleting the security-disabled uni-versal group, domain name of subject deleting the security-disabled universal group, logon ID string of subject deleting the security-disabled universal group.

Configurable Information: Success

Formal name: SE_AUDITID_SECURITY_DISABLED_UNIVERSAL_GROUP_ DELETED

668 A group type was changed.

Parameters: Nature of group type change, name of group being changed, domain of group being changed, SID string of group being changed, user name of subject changing the group type, domain name of subject changing the group type, logon ID string of subject changing the group type.

Configurable Information: Success

Formal name: SE_AUDITID_GROUP_TYPE_CHANGE

684 Set the security descriptor of members of administrative groups.

Parameters: Domain of target user account, SID string of target user account, user name of subject changing the user account, domain name of subject changing the user account, logon ID string of subject changing the user account.

Configurable Information: Success

Formal name: SE_AUDITID_SECURE_ADMIN_GROUP

Every 60 minutes on a domain controller a background thread searches all members of administrative groups (such as domain, enterprise, and schema administrators) and applies a fixed security descriptor on them. This event is logged.

685 Name of an account was changed.

Parameters: Name of target account, domain of target account, SID string of target account, user name of subject changing the account, domain name of subject changing the account, logon ID string of subject changing the account.

Configurable Information: Success

Formal name: SE_AUDITID_ACCOUNT_NAME_CHANGE

Page 32: Security Event Messages

32 Appendix E: Security Event Messages

Account Logon EventsUnlike the logon events described earlier in this appendix, the following security event mes-sages track activity specifically in relation to Kerberos logon attempts, which require Active Directory.

672 An authentication service (AS) ticket was successfully issued and validated.

Parameters: User name of client, domain name of client, SID of client, SID of service, ticket options, failure code, ticket encryption type, preauthentication type (such as PK_INIT), client IP address.

Configurable Information: Success

Formal name: SE_AUDITID_AS_TICKET_SUCCESS

This event occurs on the Key Distribution Center (KDC) when a Kerberos logon attempt takes place. One AS ticket is granted per logon session.

673 A ticket granting service (TGS) ticket was granted.

Parameters: User name of client, domain name of client, user name of service, SID of service, ticket options, ticket encryption type, client IP address.

Configurable Information: Success

Formal name: SE_AUDITID_TGS_TICKET_SUCCESS

This event occurs on the KDC and means that a user presented an AS ticket and was given a TGS ticket for some service.

674 A principal renewed an AS ticket or TGS ticket.

Parameters: User name of client, domain name of client, user name of service, SID of service, ticket options, ticket encryption type, client IP address.

Configurable Information: Success

Formal name: SE_AUDITID_TICKET_RENEW_SUCCESS

This event occurs on the KDC and is currently only caused by non-Windows-based clients because Windows-based clients do not renew tickets, but reacquire them instead. This event occurs on the KDC user name of the client.

Page 33: Security Event Messages

Appendix E: Security Event Messages 33

675 Preauthentication failed.

Parameters: User name of client, SID of client, user name of service, preauthentication type, failure code, client IP address.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_PREAUTH_FAILURE

This event message is generated on the KDC for reasons such as the user typing in a wrong password, a large difference between the clock time on the client and the KDC, or a smart card logon error.

677 A TGS ticket was not granted.

Parameters: User name of client, SID of client, user name of service, SID of service, preauthen-tication type, failure code, client IP address.

Configurable Information: Failure

Formal name: SE_AUDITID_TGS_TICKET_FAILURE

This audit occurs on the KDC.

678 An account was successfully mapped to a domain account.

Parameters: Source, client name, mapped name.

Configurable Information: Success

Formal name: SE_AUDITID_ACCOUNT_MAPPED

An account mapping is a map of a user authenticated in an MIT Kerberos realm to a domain account.

681 A domain account logon attempt was made.

Parameters: Logon attempt by, logon account, source workstation, error code, if relevant.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_ACCOUNT_LOGON

This audit appears on the domain controller or wherever the account exists. The following error codes are possible:

■ Unknown user name or bad password (1326)

■ Account logon time restriction violation (1328)

■ Account currently disabled (1331)

Page 34: Security Event Messages

34 Appendix E: Security Event Messages

■ The specified user account has expired (1793)

■ User not allowed to log on at this computer (1329)

■ The user has not been granted the requested logon type at this computer (1327)

■ The specified account’s password has expired (1330)

■ The Net Logon service is not active (1792)

In each of these events, descriptive text gives detailed information about each specific logon attempt. Also, on Windows XP Professional you can enable success and failure auditing of the Account Logon category of events, which enables the following events:

■ Authentication ticket granted

■ Service ticket granted

■ Ticket renewed

■ Preauthentication failed

■ Authentication ticket request failed

■ Service ticket request failed

■ Account mapped for logon

■ Account could not be mapped for logging on

■ Account used for logging on

The following account logon events are included in “Logon Events” earlier in this appendix:

682 A user has reconnected to a disconnected terminal server session.

683 A user disconnected a terminal server session without logging off.

Directory Service Access EventsThe only directory service access event is also included in “Object Access Events” earlier in this appendix.

566 A generic object operation took place.

Parameters: Object operation, operation type, object type, object name, handle ID, primary user name, primary domain, primary logon ID, client user name, client domain, client logon ID, accesses, properties.

Configurable Information: Success or Failure

Formal name: SE_AUDITID_OBJECT_OPERATION