1+ {
2+ "expected" : [
3+ {
4+ "@timestamp" : " 2015-10-09T00:22:36.237Z" ,
5+ "agent" : {
6+ "ephemeral_id" : " 8c285603-b2ba-4891-8f1a-862ca3388614" ,
7+ "hostname" : " hostname" ,
8+ "id" : " 7d1ef343-9372-428d-bd10-0a78e6894797" ,
9+ "name" : " AgentName" ,
10+ "type" : " filebeat" ,
11+ "version" : " 7.15.2"
12+ },
13+ "ecs" : {
14+ "version" : " 8.0.0"
15+ },
16+ "event" : {
17+ "action" : " privileged-operation" ,
18+ "category" : [
19+ " iam"
20+ ],
21+ "code" : " 4674" ,
22+ "kind" : " event" ,
23+ "outcome" : " failure" ,
24+ "provider" : " Microsoft-Windows-Security-Auditing" ,
25+ "type" : [
26+ " admin"
27+ ]
28+ },
29+ "host" : {
30+ "name" : " DC01.contoso.local"
31+ },
32+ "input" : {
33+ "type" : " log"
34+ },
35+ "log" : {
36+ "file" : {
37+ "path" : " /file/path/4674.xml"
38+ },
39+ "level" : " information"
40+ },
41+ "message": "\u003cEvent xmlns=\"http://schemas.microsoft.com/win/2004/08/events/event\"\u003e\u003cSystem\u003e\u003cProvider Name=\"Microsoft-Windows-Security-Auditing\" Guid=\"{54849625-5478-4994-A5BA-3E3B0328C30D}\" /\u003e\u003cEventID\u003e4674\u003c/EventID\u003e\u003cVersion\u003e0\u003c/Version\u003e\u003cLevel\u003e0\u003c/Level\u003e\u003cTask\u003e13056\u003c/Task\u003e\u003cOpcode\u003e0\u003c/Opcode\u003e\u003cKeywords\u003e0x8010000000000000\u003c/Keywords\u003e\u003cTimeCreated SystemTime=\"2015-10-09T00:22:36.237816000Z\" /\u003e\u003cEventRecordID\u003e1099680\u003c/EventRecordID\u003e\u003cCorrelation /\u003e\u003cExecution ProcessID=\"496\" ThreadID=\"504\" /\u003e\u003cChannel\u003eSecurity\u003c/Channel\u003e\u003cComputer\u003eDC01.contoso.local\u003c/Computer\u003e\u003cSecurity /\u003e\u003c/System\u003e\u003cEventData\u003e\u003cData Name=\"SubjectUserSid\"\u003eS-1-5-19\u003c/Data\u003e\u003cData Name=\"SubjectUserName\"\u003eLOCAL SERVICE\u003c/Data\u003e\u003cData Name=\"SubjectDomainName\"\u003eNT AUTHORITY\u003c/Data\u003e\u003cData Name=\"SubjectLogonId\"\u003e0x3e5\u003c/Data\u003e\u003cData Name=\"ObjectServer\"\u003eLSA\u003c/Data\u003e\u003cData Name=\"ObjectType\"\u003e-\u003c/Data\u003e\u003cData Name=\"ObjectName\"\u003e-\u003c/Data\u003e\u003cData Name=\"HandleId\"\u003e0x0\u003c/Data\u003e\u003cData Name=\"AccessMask\"\u003e16777216\u003c/Data\u003e\u003cData Name=\"PrivilegeList\"\u003eSeSecurityPrivilege\u003c/Data\u003e\u003cData Name=\"ProcessId\"\u003e0x1f0\u003c/Data\u003e\u003cData Name=\"ProcessName\"\u003eC:\\\\Windows\\\\System32\\\\lsass.exe\u003c/Data\u003e\u003c/EventData\u003e\u003c/Event\u003e",
42+ "process" : {
43+ "executable" : " C:\\\\ Windows\\\\ System32\\\\ lsass.exe" ,
44+ "name" : " lsass.exe" ,
45+ "pid" : 496
46+ },
47+ "related" : {
48+ "user" : [
49+ " LOCAL SERVICE"
50+ ]
51+ },
52+ "user" : {
53+ "domain" : " NT AUTHORITY" ,
54+ "id" : " S-1-5-19" ,
55+ "name" : " LOCAL SERVICE"
56+ },
57+ "winlog" : {
58+ "channel" : " Security" ,
59+ "computer_name" : " DC01.contoso.local" ,
60+ "event_data" : {
61+ "AccessMask" : " 16777216" ,
62+ "AccessMaskDescription" : [
63+ " ADS_RIGHT_ACCESS_SYSTEM_SECURITY"
64+ ],
65+ "HandleId" : " 0x0" ,
66+ "ObjectName" : " -" ,
67+ "ObjectServer" : " LSA" ,
68+ "ObjectType" : " -" ,
69+ "PrivilegeList" : [
70+ " SeSecurityPrivilege"
71+ ],
72+ "SubjectDomainName" : " NT AUTHORITY" ,
73+ "SubjectLogonId" : " 0x3e5" ,
74+ "SubjectUserName" : " LOCAL SERVICE" ,
75+ "SubjectUserSid" : " S-1-5-19"
76+ },
77+ "event_id" : " 4674" ,
78+ "keywords" : [
79+ " Audit Failure"
80+ ],
81+ "level" : " information" ,
82+ "logon" : {
83+ "id" : " 0x3e5"
84+ },
85+ "opcode" : " Info" ,
86+ "outcome" : " failure" ,
87+ "process" : {
88+ "pid" : 496 ,
89+ "thread" : {
90+ "id" : 504
91+ }
92+ },
93+ "provider_guid" : " {54849625-5478-4994-A5BA-3E3B0328C30D}" ,
94+ "provider_name" : " Microsoft-Windows-Security-Auditing" ,
95+ "record_id" : " 1099680" ,
96+ "time_created" : " 2015-10-09T00:22:36.237Z"
97+ }
98+ },
99+ {
100+ "@timestamp" : " 2022-08-01T08:53:50.333Z" ,
101+ "ecs" : {
102+ "version" : " 8.0.0"
103+ },
104+ "event" : {
105+ "action" : " privileged-operation" ,
106+ "category" : [
107+ " iam"
108+ ],
109+ "code" : " 4674" ,
110+ "kind" : " event" ,
111+ "outcome" : " success" ,
112+ "provider" : " Microsoft-Windows-Security-Auditing" ,
113+ "type" : [
114+ " admin"
115+ ]
116+ },
117+ "host" : {
118+ "name" : " DC_TEST2k12.TEST.SAAS"
119+ },
120+ "log" : {
121+ "level" : " information"
122+ },
123+ "message" : " An operation was attempted on a privileged object.\n\n Subject:\n\t Security ID:\t\t S-1-5-21-1717121054-434620538-60925301-2794\n\t Account Name:\t\t at_adm\n\t Account Domain:\t\t TEST\n\t Logon ID:\t\t 0x5E2887\n\n Object:\n\t Object Server:\t Security\n\t Object Type:\t File\n\t Object Name:\t C:\\ Windows\\ System32\\ Tasks\\ Microsoft\\ Windows\\ PLA\\ Server Manager Performance Monitor\n\t Object Handle:\t 0x1684\n\n Process Information:\n\t Process ID:\t 0x3e4\n\t Process Name:\t C:\\ Windows\\ System32\\ svchost.exe\n\n Requested Operation:\n\t Desired Access:\t READ_CONTROL\n\t\t\t\t ACCESS_SYS_SEC\n\n\t Privileges:\t\t SeSecurityPrivilege" ,
124+ "process" : {
125+ "executable" : " C:\\ Windows\\ System32\\ svchost.exe" ,
126+ "name" : " svchost.exe" ,
127+ "pid" : 996
128+ },
129+ "related" : {
130+ "user" : [
131+ " at_adm"
132+ ]
133+ },
134+ "user" : {
135+ "domain" : " TEST" ,
136+ "id" : " S-1-5-21-1717121054-434620538-60925301-2794" ,
137+ "name" : " at_adm"
138+ },
139+ "winlog" : {
140+ "channel" : " Security" ,
141+ "computer_name" : " DC_TEST2k12.TEST.SAAS" ,
142+ "event_data" : {
143+ "AccessMask" : " %%1538\n\t\t\t\t %%1542\n\t\t\t\t " ,
144+ "AccessMaskDescription" : [
145+ " Delete Child" ,
146+ " List Contents"
147+ ],
148+ "HandleId" : " 0x1684" ,
149+ "ObjectName" : " C:\\ Windows\\ System32\\ Tasks\\ Microsoft\\ Windows\\ PLA\\ Server Manager Performance Monitor" ,
150+ "ObjectServer" : " Security" ,
151+ "ObjectType" : " File" ,
152+ "PrivilegeList" : [
153+ " SeSecurityPrivilege"
154+ ],
155+ "SubjectDomainName" : " TEST" ,
156+ "SubjectLogonId" : " 0x5e2887" ,
157+ "SubjectUserName" : " at_adm" ,
158+ "SubjectUserSid" : " S-1-5-21-1717121054-434620538-60925301-2794"
159+ },
160+ "event_id" : " 4674" ,
161+ "keywords" : [
162+ " Audit Success"
163+ ],
164+ "level" : " information" ,
165+ "logon" : {
166+ "id" : " 0x5e2887"
167+ },
168+ "opcode" : " Info" ,
169+ "outcome" : " success" ,
170+ "process" : {
171+ "pid" : 604 ,
172+ "thread" : {
173+ "id" : 612
174+ }
175+ },
176+ "provider_guid" : " {54849625-5478-4994-A5BA-3E3B0328C30D}" ,
177+ "provider_name" : " Microsoft-Windows-Security-Auditing" ,
178+ "record_id" : " 18232147" ,
179+ "task" : " Sensitive Privilege Use" ,
180+ "time_created" : " 2022-08-01T08:53:50.3336583Z"
181+ }
182+ }
183+ ]
184+ }
0 commit comments