Skip to content

Built-in detection rules, EventIDs and EventProviders relations

SEKOIA.IO provides built-in detection rules to illuminate intrusions, adversarial behaviours and suspicious activity escalation chains so you can immediately take steps to remediate. Built-in rules can be customized to your context and according to your security posture. This page aims at helping partners & customers in having their detection coverage by knowing which Event IDs and Event Providers are used by rule. Please note this was retrieved automatically from our tests samples when generating attacks that triggered the rules. It might not be exhaustive and concerns mostly Windows-related rules. Last update on 2026-04-09

The colors of the EventIDs in this page should be interpreted as follow:

  • Red: This EventID is not logged by default on a Windows 10+ or Windows Server 2016+ machine.
  • Orange: This EventID is logged by default on a Windows 10+ or Windows Server 2016+ machine but upgrading its configuration would greatly help detection. For instance, the EventID 4688 is logged by default, but logging the command line is incredibly helpful for the rules since almost 50% of our rules use command line for detection (usually showed as EventID 1 in this page).
  • Purple: This EventID is logged by default if you have Windows Defender activated.
  • Blue: This EventID is only logged if you have Sysmon. Our rules will have a master Effort Level if the recommended Sysmon Configuration is not enough and needs to be modified. Please be aware that a modification of Sysmon Configuration can greatly increase events logging in your network, which SEKOIA.IO can't know about and therefore is not responsible for that.

Rules x Effort Level x EventIDs x Event Providers

Rule Name Effort Level EventIDs Event Providers
Suspicious Windows Installer Execution master 1 Microsoft-Windows-Sysmon
Correlation Multi Service Disable master 1, 5 Kernel-Process
Suspicious Microsoft Defender Antivirus Exclusion Command master 1 Microsoft-Windows-Sysmon
Dllhost Wrong Parent master 1 Microsoft-Windows-Sysmon
Taskhostw Wrong Parent master 1 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus History Deleted master 1013 Microsoft-Windows-Windows Defender
WMI DLL Loaded Via Office master 7 Microsoft-Windows-Sysmon
MMC Spawning Windows Shell master 1 Microsoft-Windows-Sysmon
NjRat Registry Changes master 1, 13 Kernel-Process, Microsoft-Windows-Sysmon
Privileged AD Builtin Group Modified master 4727, 4728, 4729, 4730, 4754, 4756, 4757, 4758, 4764 Microsoft-Windows-Security-Auditing
Microsoft Office Product Spawning Windows Shell master 1 Microsoft-Windows-Sysmon
Cobalt Strike Named Pipes master 17 Microsoft-Windows-Sysmon
SCM Database Privileged Operation master 4674 Microsoft-Windows-Security-Auditing
Svchost Wrong Parent master 4688 Microsoft-Windows-Security-Auditing
Failed Logon Followed By A Success From Public IP Addresses master 4625 Microsoft-Windows-Security-Auditing
Elevated Msiexec Via Repair Functionality master 1, 5 Kernel-Process
Stop Backup Services master 1, 13 Kernel-Process, Microsoft-Windows-Sysmon
Windows Suspicious Scheduled Task Creation master 4698 Microsoft-Windows-Security-Auditing
PowerView commandlets 2 master 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
DNS Server Error Failed Loading The ServerLevelPluginDLL master 150, 770, 771 Microsoft-Windows-DNS-Server-Service
Microsoft Office Creating Suspicious File master 11 Microsoft-Windows-Sysmon
Windows Registry Persistence COM Search Order Hijacking master 13 Microsoft-Windows-Sysmon
Powershell Winlogon Helper DLL master 13, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Registry Checked For Lanmanserver DisableCompression Parameter master 4663 Microsoft-Windows-Security-Auditing
Autorun Keys Modification master 12 Microsoft-Windows-Sysmon
User Account Created master 4720 Microsoft-Windows-Security-Auditing
Taskhost Wrong Parent master 1 Microsoft-Windows-Sysmon
AD User Enumeration master 4662 Microsoft-Windows-Security-Auditing
Execution From Suspicious Folder master 1 Microsoft-Windows-Sysmon
Admin Share Access master 5140, 5145 Microsoft-Windows-Security-Auditing
Process Hollowing Detection master 25 Microsoft-Windows-Sysmon
SCM Database Handle Failure master 4656 Microsoft-Windows-Security-Auditing
Potential RDP Connection To Non-Domain Host master 8001 Microsoft-Windows-NTLM
Outlook Registry Access master 1 Microsoft-Windows-Sysmon
Disable Windows Defender Credential Guard master 13 Microsoft-Windows-Sysmon
Credential Dumping-Tools Common Named Pipes master 17 Microsoft-Windows-Sysmon
Grabbing Sensitive Hives Via Reg Utility master 1, 5 Kernel-Process, Microsoft-Windows-Sysmon
Remote Monitoring and Management Software - AnyDesk master 1, 22 Kernel-Process, Microsoft-Windows-DNS-Client
Suspicious New Printer Ports In Registry master 13 Microsoft-Windows-Sysmon
User Added to Local Administrators master 4732 Microsoft-Windows-Security-Auditing
PowerShell Malicious PowerShell Commandlets master 4104 Microsoft-Windows-PowerShell
CVE-2021-34527 PrintNightmare Suspicious Actions From Spoolsv master 7, 11 Microsoft-Windows-Sysmon
Shadow Copies master 4104, 4688 Microsoft-Windows-PowerShell, Microsoft-Windows-Security-Auditing
Spoolsv Wrong Parent master 1 Microsoft-Windows-Sysmon
Wininit Wrong Parent master 1 Microsoft-Windows-Sysmon
Malware Persistence Registry Key master 1, 13 Microsoft-Windows-Sysmon
Svchost DLL Search Order Hijack master 7 Microsoft-Windows-Sysmon
Protected Storage Service Access master 5145 Microsoft-Windows-Security-Auditing
DNS Query For Iplookup master 22 Microsoft-Windows-DNS-Client
Account Added To A Security Enabled Group master 4728 Microsoft-Windows-Security-Auditing
FromBase64String Command Line master 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Remote Registry Management Using Reg Utility master 5145 Microsoft-Windows-Security-Auditing
xWizard Execution master 1 Kernel-Process
Usage Of Sysinternals Tools master 1, 13 Microsoft-Windows-Sysmon
FoggyWeb Backdoor DLL Loading master 7 Microsoft-Windows-Sysmon
Suspicious DLL Loaded Via Office Applications master 7 Microsoft-Windows-Sysmon
Net.exe User Account Creation master 1 Microsoft-Windows-Sysmon
AD Privileged Users Or Groups Reconnaissance master 4661 Microsoft-Windows-Security-Auditing
Microsoft Defender Antivirus Disable Using Registry master 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Antivirus Relevant File Paths Alerts master 1116 Microsoft-Windows-Windows Defender
User Account Deleted master 4726 Microsoft-Windows-Security-Auditing
CVE-2017-11882 Microsoft Office Equation Editor Vulnerability master 3 Microsoft-Windows-Sysmon
Winlogon wrong parent master 1 Microsoft-Windows-Sysmon
Powershell Suspicious Startup Shortcut Persistence master 11 Microsoft-Windows-Kernel-File
Computer Account Deleted master 4743 Microsoft-Windows-Security-Auditing
Windows Registry Persistence COM Key Linking master 1, 13 Microsoft-Windows-Sysmon
Suspicious Cmd.exe Command Line master 1 Microsoft-Windows-Sysmon
Web Application Launching Shell master 1, 4688 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon
Admin User RDP Remote Logon master 4624 Microsoft-Windows-Security-Auditing
Remote Monitoring and Management Software - Atera master 13 Microsoft-Windows-Sysmon
Disable Security Events Logging Adding Reg Key MiniNt master 13 Microsoft-Windows-Sysmon
Potential Persistence Via Outlook LoadMacroProviderOnBoot Setting master 13 Microsoft-Windows-Sysmon
Csrss Wrong Parent master 1 Microsoft-Windows-Sysmon
Netsh Port Opening master 1 Microsoft-Windows-Sysmon
Remote Service Activity Via SVCCTL Named Pipe master 5145 Microsoft-Windows-Security-Auditing
Wsmprovhost Wrong Parent master 1 Microsoft-Windows-Sysmon
Logonui Wrong Parent master 1 Microsoft-Windows-Sysmon
File Or Folder Permissions Modifications master 1 Microsoft-Windows-Sysmon
Taskhost or Taskhostw Suspicious Child Found master 1 Microsoft-Windows-Sysmon
Microsoft Office Macro Security Registry Modifications master 13 Microsoft-Windows-Sysmon
LSASS Memory Dump master 10 Microsoft-Windows-Sysmon
Suspicious Access To Sensitive File Extensions master 5145 Microsoft-Windows-Security-Auditing
Network Share Discovery master 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Webshell Creation master 11, 4656, 4663 Microsoft-Windows-Sysmon
LSASS Access From Non System Account master 4656, 4663 Microsoft-Windows-Security-Auditing
Windows Firewall Changes master 1 Microsoft-Windows-Sysmon
Putty Sessions Listing master 1, 4656, 4663 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon
Searchprotocolhost Wrong Parent master 1 Microsoft-Windows-Sysmon
MS Office Product Spawning Exe in User Dir master 1 Microsoft-Windows-Sysmon
Compress Data for Exfiltration via Archiver master 1 Kernel-Process
Rubeus Register New Logon Process master 4611 Microsoft-Windows-Security-Auditing
ISO LNK Infection Chain master 5, 11 Kernel-Process, Microsoft-Windows-Kernel-File
Microsoft Defender Antivirus Configuration Changed master 5007 Microsoft-Windows-Windows Defender
Correlation Internal Kerberos Password Spraying master 4768 Microsoft-Windows-Security-Auditing
Scheduled Task Creation By Non Privileged User master 4688 Microsoft-Windows-Security-Auditing
Elevated Shell Launched By Browser master 5 Kernel-Process
Lsass Wrong Parent master 1 Microsoft-Windows-Sysmon
DNS ServerLevelPluginDll Installation master 1, 13 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Exclusion Configuration master 13, 5007 Microsoft-Windows-Sysmon, Microsoft-Windows-Windows Defender
Powershell Web Request master 3 Microsoft-Windows-Kernel-Network
WMIC Loading Scripting Libraries master 7 Microsoft-Windows-Sysmon
Windows Defender Deactivation Using PowerShell Script master 4104 Microsoft-Windows-PowerShell
User Couldn't Call A Privileged Service LsaRegisterLogonProcess master 4673 Microsoft-Windows-Security-Auditing
Searchindexer Wrong Parent master 1 Microsoft-Windows-Sysmon
Advanced IP Scanner master 1 Microsoft-Windows-Sysmon
Correlation Internal Ntlm Password Spraying master 4625 Microsoft-Windows-Security-Auditing
Winrshost Wrong Parent master 1 Microsoft-Windows-Sysmon
Smss Wrong Parent master 1 Microsoft-Windows-Sysmon
Windows Sandbox Start master 1, 5 Kernel-Process
Account Removed From A Security Enabled Group master 4729 Microsoft-Windows-Security-Auditing
Searchprotocolhost Child Found master 1 Microsoft-Windows-Sysmon
Opening Of a Password File master 5 Kernel-Process
Abusing Azure Browser SSO master 7 Microsoft-Windows-Sysmon
Registry Persistence Using 'Image File Execution' And 'SilentProcessExit' Keys master 13 Microsoft-Windows-Sysmon
Suspicious PsExec Execution master 5145 Microsoft-Windows-Security-Auditing
Narrator Feedback-Hub Persistence master 13 Microsoft-Windows-Sysmon
Pandemic Windows Implant master 1, 13 Microsoft-Windows-Sysmon
Commonly Used Commands To Stop Services And Remove Backups master 1 Microsoft-Windows-Sysmon
AMSI Deactivation Using Registry Key master
In-memory PowerShell master 7 Microsoft-Windows-Sysmon
Rebooting master 1 Kernel-Process
Process Herpaderping master 25 Microsoft-Windows-Sysmon
Possible Replay Attack master 4649 Microsoft-Windows-Security-Auditing
Usage Of Procdump With Common Arguments advanced 1, 13 Microsoft-Windows-Sysmon
XCopy Suspicious Usage advanced 1 Microsoft-Windows-Sysmon
Active Directory Replication from Non Machine Account advanced 4662 Microsoft-Windows-Security-Auditing
Openfiles Usage advanced 1 Kernel-Process
RDP Sensitive Settings Changed advanced 13 Microsoft-Windows-Sysmon
Suspicious Hostname advanced 4624 Microsoft-Windows-Security-Auditing
Suspicious PowerShell Keywords advanced 4104 Microsoft-Windows-PowerShell
Compression Followed By Suppression advanced 5 Kernel-Process
SAM Registry Hive Handle Request advanced 4656 Microsoft-Windows-Security-Auditing
External Disk Drive Or USB Storage Device advanced 6416 Microsoft-Windows-Security-Auditing
Credential Harvesting Via Vaultcmd.exe advanced 1 Kernel-Process
Credentials Extraction advanced 1 Kernel-Process
Correlation Admin Files Checked On Network Share advanced 5145 Microsoft-Windows-Security-Auditing
Python Opening Ports advanced 5154 Microsoft-Windows-Security-Auditing
RDP Configuration File From Mail Process advanced 1, 11 Kernel-Process, Microsoft-Windows-Kernel-File
Microsoft Defender Antivirus Tampering Detected advanced 1127, 2013, 5001, 5010, 5012, 5101 Microsoft-Windows-Windows Defender
WMI Persistence Script Event Consumer File Write advanced 11 Microsoft-Windows-Sysmon
Hiding Files With Attrib.exe advanced 1 Microsoft-Windows-Sysmon
Change Default File Association advanced 1 Microsoft-Windows-Sysmon
Suspicious PrinterPorts Creation (CVE-2020-1048) advanced 10 Microsoft-Windows-Sysmon
WMIC Command To Determine The Antivirus advanced 1, 5, 4104 Kernel-Process, Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Unsigned Image Loaded Into LSASS Process advanced 7 Microsoft-Windows-Sysmon
Microsoft Windows Active Directory Module Commandlets advanced 4104 Microsoft-Windows-PowerShell
PowerShell Credential Prompt advanced 4104 Microsoft-Windows-PowerShell
Wmic Suspicious Commands advanced 5 Kernel-Process
Ntfsinfo Usage advanced 4688 Microsoft-Windows-Security-Auditing
Netsh Allow Command advanced 1 Microsoft-Windows-Sysmon
Disabled IE Security Features advanced 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Suspicious Regsvr32 Execution advanced 1 Microsoft-Windows-Sysmon
Microsoft IIS Module Installation advanced 1, 5, 4104 Kernel-Process, Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Domain Group And Permission Enumeration advanced 1 Microsoft-Windows-Sysmon
Non-Legitimate Executable Using AcceptEula Parameter advanced 5, 8 Kernel-Process, Microsoft-Windows-Kernel-Process
WiFi Credentials Harvesting Using Netsh advanced 1 Microsoft-Windows-Sysmon
Mimikatz LSASS Memory Access advanced 10 Microsoft-Windows-Sysmon
PowerShell Data Compressed advanced 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Load Of dbghelp/dbgcore DLL From Suspicious Process advanced 7 Microsoft-Windows-Sysmon
PowerShell EncodedCommand advanced 1 Microsoft-Windows-Sysmon
Csrss Child Found advanced 1 Microsoft-Windows-Sysmon
AutoIt3 Execution From Suspicious Folder advanced 5 Kernel-Process
OneNote Suspicious Children Process advanced 1, 15 Microsoft-Windows-Sysmon
Adexplorer Usage advanced 1 Microsoft-Windows-Sysmon
VSCode Tunnel Shell Exec advanced 1 Kernel-Process
PowerView commandlets 1 advanced 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Alternate PowerShell Hosts Pipe advanced 17 Microsoft-Windows-Sysmon
NetSh Used To Disable Windows Firewall advanced 1 Microsoft-Windows-Sysmon
ACLight Discovering Privileged Accounts advanced 4103 Microsoft-Windows-PowerShell
BITSAdmin Download advanced
Netsh Program Allowed With Suspicious Location advanced 1 Microsoft-Windows-Sysmon
Suspicious ADSI-Cache Usage By Unknown Tool advanced 11 Microsoft-Windows-Sysmon
Suspicious Control Process advanced 1 Microsoft-Windows-Sysmon
Successful Overpass The Hash Attempt advanced 4624 Microsoft-Windows-Security-Auditing
AccCheckConsole Executing Dll advanced 5 Kernel-Process
Unsigned Driver Loaded From Suspicious Location advanced 6 Microsoft-Windows-Sysmon
Dynwrapx Module Loading advanced 7 Microsoft-Windows-Sysmon
Powershell UploadString Function advanced 1 Microsoft-Windows-Sysmon
Suspicious Outbound Kerberos Connection advanced 5156 Microsoft-Windows-Security-Auditing
WerFaultSecure Abuse advanced 1 Kernel-Process
Exploit For CVE-2017-0261 Or CVE-2017-0262 advanced 1 Microsoft-Windows-Sysmon
PowerShell Commands Invocation advanced 1 Kernel-Process
RDP Login From Localhost advanced 4624 Microsoft-Windows-Security-Auditing
PowerShell Invoke-Obfuscation Obfuscated IEX Invocation advanced 4104 Microsoft-Windows-PowerShell
System Network Connections Discovery advanced 1 Microsoft-Windows-Sysmon
AD Object WriteDAC Access advanced 4662 Microsoft-Windows-Security-Auditing
Cmd.exe Used To Run Reconnaissance Commands advanced 1 Microsoft-Windows-Sysmon
PowerShell AMSI Deactivation Bypass Using .NET Reflection advanced 4104 Microsoft-Windows-PowerShell
PowerShell Malicious Nishang PowerShell Commandlets advanced 4104 Microsoft-Windows-PowerShell
Language Discovery advanced 4104 Microsoft-Windows-PowerShell
Account Tampering - Suspicious Failed Logon Reasons advanced 4625, 4776 Microsoft-Windows-Security-Auditing
CreateRemoteThread Common Process Injection advanced 8 Microsoft-Windows-Sysmon
Suspicious XOR Encoded PowerShell Command Line advanced 4104 Microsoft-Windows-PowerShell
PowerShell Suspicious Context Changes advanced 4104 Microsoft-Windows-PowerShell
PsExec Process advanced 13, 7045 Microsoft-Windows-Sysmon, Service Control Manager
Rubeus Tool Command-line advanced 1 Microsoft-Windows-Sysmon
Domain Trust Created Or Removed advanced 4706, 4707 Microsoft-Windows-Security-Auditing
NlTest Usage advanced 1, 5 Kernel-Process, Microsoft-Windows-Sysmon
NTDS.dit File In Suspicious Directory advanced 11 Microsoft-Windows-Sysmon
Metasploit PSExec Service Creation advanced 7045 Service Control Manager
RDP Session Discovery advanced 1 Microsoft-Windows-Sysmon
Component Object Model Hijacking advanced 23 Microsoft-Windows-Kernel-File
New Service Creation advanced 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
WMI Event Subscription advanced 19, 20, 21 Microsoft-Windows-Sysmon
Suspicious Windows DNS Queries advanced 5, 22 Kernel-Process, Microsoft-Windows-Sysmon
Remote System Discovery Via Telnet advanced 5 Kernel-Process
Adidnsdump Enumeration advanced 11, 4688 Microsoft-Windows-Kernel-File, Microsoft-Windows-Security-Auditing
Certify Or Certipy advanced 3, 5 Kernel-Process
HTML Smuggling Suspicious Usage advanced 1, 11, 15 Microsoft-Windows-Sysmon
Lateral Movement Remote Named Pipe advanced 5145 Microsoft-Windows-Security-Auditing
Permission Discovery Via Wmic advanced 1 Microsoft-Windows-Sysmon
Suspicious PROCEXP152.sys File Created In Tmp advanced 11 Microsoft-Windows-Sysmon
Suspicious Regasm Regsvcs Usage advanced 1 Kernel-Process
Dism Disabling Windows Defender advanced 1 Kernel-Process
Capture a network trace with netsh.exe advanced 1 Microsoft-Windows-Sysmon
Logon Scripts (UserInitMprLogonScript) advanced 1, 13 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Threat Detected advanced 1006, 1007, 1008, 1015, 1116, 1117, 1118, 1119, 1125, 1126 Microsoft-Windows-Windows Defender
Svchost Modification advanced 13 Microsoft-Windows-Sysmon
Suspicious Double Extension advanced 5 Microsoft-Windows-Sysmon
PowerShell NTFS Alternate Data Stream advanced 4104 Microsoft-Windows-PowerShell
Control Panel Items advanced 1 Microsoft-Windows-Sysmon
Default Encoding To UTF-8 PowerShell advanced 1 Microsoft-Windows-Sysmon
HackTools Suspicious Names advanced 5, 11 Microsoft-Windows-Kernel-File, Microsoft-Windows-Sysmon
Rclone Process advanced 1 Microsoft-Windows-Sysmon
Rare Logonui Child Found advanced 1 Microsoft-Windows-Sysmon
AzureEdge in Command Line advanced 5 Kernel-Process
Legitimate Process Execution From Unusual Folder advanced 1, 5, 4688 Microsoft-Windows-Sysmon
Suspicious PowerShell Invocations - Generic advanced 1 Microsoft-Windows-Sysmon
FLTMC command usage advanced 5 Kernel-Process
Malicious PowerShell Keywords advanced 4104 Microsoft-Windows-PowerShell
Exfiltration And Tunneling Tools Execution advanced 1 Microsoft-Windows-Sysmon
Powershell AMSI Bypass advanced 4104 Microsoft-Windows-PowerShell
WMImplant Hack Tool advanced 4104 Microsoft-Windows-PowerShell
PowerShell Download From URL advanced 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Credential Dump Tools Related Files advanced 11, 15 Microsoft-Windows-Kernel-File, Microsoft-Windows-Sysmon
Suspicious desktop.ini Action advanced 15 Microsoft-Windows-Sysmon
Exfiltration Via Pscp advanced 1 Microsoft-Windows-Sysmon
Remote Privileged Group Enumeration advanced 4799
ETW Tampering intermediate 1 Microsoft-Windows-Sysmon
Python HTTP Server intermediate 1 Microsoft-Windows-Sysmon
Netsh Allowed Python Program intermediate 1 Microsoft-Windows-Sysmon
Formbook Hijacked Process Command intermediate 1 Microsoft-Windows-Sysmon
Windows Suspicious Service Creation intermediate 13, 4697 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon
STRRAT Scheduled Task intermediate 1 Microsoft-Windows-Sysmon
NetNTLM Downgrade Attack intermediate 13, 4657 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon
Exfiltration Domain In Command Line intermediate 1 Microsoft-Windows-Sysmon
OceanLotus Registry Activity intermediate 13 Microsoft-Windows-Sysmon
Explorer Process Executing HTA File intermediate 1 Microsoft-Windows-Sysmon
Secure Deletion With SDelete intermediate 4656, 4658, 4663 Microsoft-Windows-Security-Auditing
Remote Enumeration Of Lateral Movement Groups intermediate 4799 Microsoft-Windows-Security-Auditing
Exchange Server Spawning Suspicious Processes intermediate 1 Microsoft-Windows-Sysmon
Werfault DLL Injection intermediate 7 Microsoft-Windows-Sysmon
Rare Lsass Child Found intermediate 1 Microsoft-Windows-Sysmon
Suspicious Taskkill Command intermediate 1 Microsoft-Windows-Sysmon
Screenconnect Remote Execution intermediate 1, 5 Kernel-Process
Microsoft Exchange PowerShell Snap-Ins To Export Exchange Mailbox Data intermediate 4104 Microsoft-Windows-PowerShell
RDP Port Change Using Powershell intermediate 13, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Spyware Persistence Using Schtasks intermediate 1 Microsoft-Windows-Sysmon
Suspicious Network Args In Command Line intermediate 1 Kernel-Process, Microsoft-Windows-Sysmon
CertOC Loading Dll intermediate 1 Kernel-Process
Trickbot Malware Activity intermediate 1 Microsoft-Windows-Sysmon
Lsass Access Through WinRM intermediate 10 Microsoft-Windows-Sysmon
Reconnaissance Commands Activities intermediate 1 Kernel-Process
UAC Bypass Using Fodhelper intermediate 13 Microsoft-Windows-Sysmon
MalwareBytes Uninstallation intermediate 1 Microsoft-Windows-Sysmon
Audio Capture via PowerShell intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
TrustedInstaller Impersonation intermediate 4104 Microsoft-Windows-PowerShell
Correlation Suspicious Authentication Coercer Behavior intermediate 4624, 5145 Microsoft-Windows-Security-Auditing
Netsh RDP Port Opening intermediate 1 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Set-MpPreference Base64 Encoded intermediate 1 Microsoft-Windows-Sysmon
Data Compressed With Rar With Password intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
XSL Script Processing And SquiblyTwo Attack intermediate 1 Microsoft-Windows-Sysmon
SquirrelWaffle Malspam Execution Loading DLL intermediate 1 Microsoft-Windows-Sysmon
Exploiting SetupComplete.cmd CVE-2019-1378 intermediate 1 Microsoft-Windows-Sysmon
Suspicious DLL Loading By Ordinal intermediate 1 Microsoft-Windows-Sysmon
New Or Renamed User Account With '$' In Attribute 'SamAccountName' intermediate 4720, 4781 Microsoft-Windows-Security-Auditing
Evil Winrm Modules Execution intermediate 4104 Microsoft-Windows-PowerShell
Registry Key Used By Some Old Agent Tesla Samples intermediate 13 Microsoft-Windows-Sysmon
Mshta Command From A Scheduled Task intermediate 1 Kernel-Process
MavInject Process Injection intermediate 1 Microsoft-Windows-Sysmon
Active Directory User Backdoors intermediate 4662, 5136 Microsoft-Windows-Security-Auditing
DHCP Callout DLL Installation intermediate 13 Microsoft-Windows-Sysmon
JS PowerShell Infection Chains intermediate 1 Kernel-Process
Active Directory Delegate To KRBTGT Service intermediate 4738 Microsoft-Windows-Security-Auditing
Transferring Files With Credential Data Via Network Shares intermediate 5145 Microsoft-Windows-Security-Auditing
Microsoft Malware Protection Engine Crash intermediate 1000 Application Error
HackTools Suspicious Process Names In Command Line intermediate 1 Microsoft-Windows-Sysmon
SolarWinds Suspicious File Creation intermediate 11 Microsoft-Windows-Sysmon
Cmdkey Cached Credentials Recon intermediate 1 Microsoft-Windows-Sysmon
Netscan Share Access Artefact intermediate 5145 Microsoft-Windows-Security-Auditing
Cobalt Strike Default Beacons Names intermediate 1, 15 Microsoft-Windows-Sysmon
Suspicious Outlook Child Process intermediate 4688 Microsoft-Windows-Security-Auditing
WMIC Uninstall Product intermediate 1 Microsoft-Windows-Sysmon
DCSync Attack intermediate 4662 Microsoft-Windows-Security-Auditing
CMSTP Execution intermediate 1 Microsoft-Windows-Sysmon
Impacket Secretsdump.py Tool intermediate 5145 Microsoft-Windows-Security-Auditing
Suspicious PowerShell Invocations - Specific intermediate 1 Microsoft-Windows-Sysmon
Suspicious CommandLine Lsassy Pattern intermediate 5 Kernel-Process
Clear EventLogs Through CommandLine intermediate 1 Microsoft-Windows-Sysmon
Correlation PowerShell Suspicious DLL Loading intermediate 5 Kernel-Process, Microsoft-Windows-PowerShell
Gpscript Suspicious Parent intermediate 1 Microsoft-Windows-Sysmon
Network Sniffing Windows intermediate 1, 5 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Disable SecurityHealth intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
DC Shadow via Service Principal Name (SPN) creation intermediate 4742, 5136 Microsoft-Windows-Security-Auditing
CMSTP UAC Bypass via COM Object Access intermediate 1 Microsoft-Windows-Sysmon
Suspicious DNS Child Process intermediate 1 Microsoft-Windows-Sysmon
Active Directory Replication User Backdoor intermediate 5136 Microsoft-Windows-Security-Auditing
Network Connection Via Certutil intermediate 1 Kernel-Process
Suspicious LDAP-Attributes Used intermediate 5136 Microsoft-Windows-Security-Auditing
Mshta Suspicious Child Process intermediate 1, 5 Kernel-Process
Remote Task Creation Via ATSVC Named Pipe intermediate 5145 Microsoft-Windows-Security-Auditing
Suspicious Mshta Execution intermediate 1 Microsoft-Windows-Sysmon
BazarLoader Persistence Using Schtasks intermediate 1 Microsoft-Windows-Sysmon
Password Dumper Activity On LSASS intermediate 4656 Microsoft-Windows-Security-Auditing
Eventlog Cleared intermediate 517, 1102 Microsoft-Windows-Eventlog
Denied Access To Remote Desktop intermediate 4825 Microsoft-Windows-Security-Auditing
Correlation Post Exploitation Patterns Via Winrm intermediate 1, 5 Kernel-Process
Microsoft Exchange Server Creating Unusual Files intermediate 11 Microsoft-Windows-Sysmon
UAC Bypass via Event Viewer intermediate 13 Microsoft-Windows-Sysmon
Suspicious CodePage Switch with CHCP intermediate 1 Microsoft-Windows-Sysmon
Suspicious SAM Dump intermediate 16 Microsoft-Windows-Kernel-General
Chafer (APT 39) Activity intermediate 4697, 7045 Microsoft-Windows-Security-Auditing, Service Control Manager
DHCP Server Error Failed Loading the CallOut DLL intermediate 1031, 1032, 1033, 1034 Microsoft-Windows-DHCP-Server
Malicious Named Pipe intermediate 17 Microsoft-Windows-Sysmon
COM Hijack Via Sdclt intermediate 1 Microsoft-Windows-Sysmon
Correlation Supicious Powershell Drop and Exec intermediate 1, 3, 11 Kernel-Process, Microsoft-Windows-Kernel-File, Microsoft-Windows-Kernel-Network
KeePass Config XML In Command-Line intermediate 1 Microsoft-Windows-Sysmon
MOFComp Execution intermediate 1 Microsoft-Windows-Sysmon
Credential Dumping Tools Service Execution intermediate 7045 Service Control Manager
Suspicious Commands From MS SQL Server Shell intermediate 1 Kernel-Process
Creation or Modification of a GPO Scheduled Task intermediate 5145 Microsoft-Windows-Security-Auditing
High Privileges Network Share Removal intermediate 1 Kernel-Process, Microsoft-Windows-Sysmon
Process Memory Dump Using Comsvcs intermediate 1 Kernel-Process, Microsoft-Windows-Sysmon
Inhibit System Recovery Deleting Backups intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Exchange Mailbox Export intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Venom Multi-hop Proxy agent detection intermediate 1 Kernel-Process
MMC20 Lateral Movement intermediate 1 Microsoft-Windows-Sysmon
QakBot Process Creation intermediate 1 Microsoft-Windows-Sysmon
Wmic Service Call intermediate 1 Microsoft-Windows-Sysmon
Copy Of Legitimate System32 Executable intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Suspicious Driver Loaded intermediate 13 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Disable Services intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Possible RottenPotato Attack intermediate 4624 Microsoft-Windows-Security-Auditing
SolarWinds Wrong Child Process intermediate 1 Microsoft-Windows-Sysmon
Detection of default Mimikatz banner intermediate 4103 Microsoft-Windows-PowerShell
Suspicious Finger Usage intermediate 1 Microsoft-Windows-Sysmon
Formbook File Creation DB1 intermediate 11 Microsoft-Windows-Sysmon
OneNote Embedded File intermediate 11, 15 Microsoft-Windows-Sysmon
Suspicious Desktopimgdownldr Execution intermediate 1 Microsoft-Windows-Sysmon
Disable .NET ETW Through COMPlus_ETWEnabled intermediate 1, 13 Microsoft-Windows-Sysmon
Microsoft Office Spawning Script intermediate 1 Microsoft-Windows-Sysmon
PowerShell Execution Via Rundll32 intermediate 1 Microsoft-Windows-Sysmon
DNS Exfiltration and Tunneling Tools Execution intermediate 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Backup Catalog Deleted intermediate 524 Microsoft-Windows-Backup
PowerCat Function Loading intermediate 4104 Microsoft-Windows-PowerShell
Suspect Svchost Memory Access intermediate 10 Microsoft-Windows-Sysmon
WCE wceaux.dll Creation intermediate 11 Microsoft-Windows-Kernel-File
Suspicious Process Requiring DLL Starts Without DLL intermediate 1 Microsoft-Windows-Sysmon
NTDS.dit File Interaction Through Command Line intermediate 1 Microsoft-Windows-Sysmon
Sysprep On AppData Folder intermediate 1 Microsoft-Windows-Sysmon
Suspicious Cmd File Copy Command To Network Share intermediate 11 Microsoft-Windows-Kernel-File
MSBuild Abuse intermediate 1 Kernel-Process
Suspicious Mshta Execution From Wmi intermediate 1 Microsoft-Windows-Sysmon
Suspicious certutil command intermediate 1 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Disable Scheduled Tasks intermediate 1, 4104 Kernel-Process, Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Suspicious DLL side loading from ProgramData intermediate 7 Microsoft-Windows-Sysmon
Njrat Registry Values intermediate 1, 13 Microsoft-Windows-Sysmon
SOCKS Tunneling Tool intermediate 1 Microsoft-Windows-Sysmon
Schtasks Suspicious Parent intermediate 1 Kernel-Process
Ngrok Process Execution intermediate 1 Microsoft-Windows-Sysmon
DPAPI Domain Backup Key Extraction intermediate 4662 Microsoft-Windows-Security-Auditing
Hijack Legit RDP Session To Move Laterally intermediate 11 Microsoft-Windows-Sysmon
Correlation Priv Esc Via Remote Thread intermediate 1, 8, 4703 Kernel-Process, Microsoft-Windows-Kernel-Process, Microsoft-Windows-Security-Auditing
Microsoft Defender Antivirus Restoration Abuse intermediate 1 Microsoft-Windows-Sysmon
Qakbot Persistence Using Schtasks intermediate 1 Microsoft-Windows-Sysmon
Suspicious Rundll32.exe Executions intermediate 1, 5 Kernel-Process, Microsoft-Windows-Sysmon
Suspicious Scripting In A WMI Consumer intermediate 20 Microsoft-Windows-Sysmon
TUN/TAP Driver Installation intermediate 4697, 7045 Service Control Manager
Netsh Port Forwarding intermediate 1 Microsoft-Windows-Sysmon
Password Change On Directory Service Restore Mode (DSRM) Account intermediate 4794 Microsoft-Windows-Security-Auditing
Phosphorus Domain Controller Discovery intermediate 4104 Microsoft-Windows-PowerShell
Powershell Web Request And Windows Script intermediate 5 Kernel-Process
Wmic Process Call Creation intermediate 1 Microsoft-Windows-Sysmon
GPO Executable Delivery intermediate 5136 Microsoft-Windows-Security-Auditing
DLL Load via LSASS Registry Key intermediate 12, 13 Microsoft-Windows-Sysmon
Suspicious Kerberos Ticket intermediate 4768 Microsoft-Windows-Security-Auditing
Impacket Addcomputer intermediate 4741 Microsoft-Windows-Security-Auditing
Bloodhound and Sharphound Tools Usage intermediate 1 Microsoft-Windows-Sysmon
StoneDrill Service Install intermediate 7045 Service Control Manager
Suspicious Windows Script Execution intermediate 5 Kernel-Process
New DLL Added To AppCertDlls Registry Key intermediate 1, 13 Microsoft-Windows-Sysmon
LSASS Memory Dump File Creation intermediate 11 Microsoft-Windows-Sysmon
DHCP Server Loaded the CallOut DLL intermediate 1033
PowerShell Downgrade Attack elementary 1 Microsoft-Windows-Sysmon
Winword Document Droppers elementary 1 Microsoft-Windows-Sysmon
Process Memory Dump Using Createdump elementary 1 Kernel-Process
Empire Monkey Activity elementary 1 Microsoft-Windows-Sysmon
Domain Trust Discovery Through LDAP elementary 1, 4688 Microsoft-REDACTED-Security-Auditing, Microsoft-Windows-Sysmon
Security Support Provider (SSP) Added to LSA Configuration elementary 13 Microsoft-Windows-Sysmon
Suspicious Hangul Word Processor Child Process elementary 1 Microsoft-Windows-Sysmon
Suspicious Certificate Request-adcs Abuse elementary 4886, 4887 Microsoft-Windows-Security-Auditing
DNS Tunnel Technique From MuddyWater elementary 1 Microsoft-Windows-Sysmon
RedMimicry Winnti Playbook Dropped File elementary 11 Microsoft-Windows-Sysmon
RedMimicry Winnti Playbook Registry Manipulation elementary 1, 13 Microsoft-Windows-Sysmon
UAC Bypass Via Sdclt elementary 1, 13 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus History Directory Deleted elementary 1 Microsoft-Windows-Sysmon
Ursnif Registry Key elementary 13 Microsoft-Windows-Sysmon
Microsoft Defender Antivirus Signatures Removed With MpCmdRun elementary 1 Microsoft-Windows-Sysmon
Phorpiex DriveMgr Command elementary 1 Microsoft-Windows-Sysmon
PasswordDump SecurityXploded Tool elementary 1 Microsoft-Windows-Sysmon
WMI Install Of Binary elementary 1 Microsoft-Windows-Sysmon
Invoke-TheHash Commandlets elementary 4104 Microsoft-Windows-PowerShell
Copying Browser Files With Credentials elementary 1 Microsoft-Windows-Sysmon
Mimikatz Basic Commands elementary 4103 Microsoft-Windows-PowerShell
Antivirus Exploitation Framework Detection elementary 1011, 1116 Microsoft-Windows-Windows Defender
Schtasks Persistence With High Privileges elementary 1 Microsoft-Windows-Sysmon
Active Directory Shadow Credentials elementary 5136 Microsoft-Windows-Security-Auditing
Antivirus Password Dumper Detection elementary 1116 Microsoft-Windows-Windows Defender
CVE-2019-0708 Scan elementary 4625 Microsoft-Windows-Security-Auditing
Audit CVE Event elementary 1 Microsoft-Windows-Audit-CVE
Lazarus Loaders elementary 1 Microsoft-Windows-Sysmon
Cobalt Strike Default Service Creation Usage elementary 4697, 7045 Microsoft-Windows-Security-Auditing, Service Control Manager
Debugging Software Deactivation elementary 1 Microsoft-Windows-Sysmon
Sticky Key Like Backdoor Usage elementary 13 Microsoft-Windows-Sysmon
Tactical RMM Installation elementary 5 Kernel-Process
Active Directory Database Dump Via Ntdsutil elementary 325 ESENT
Windows Update LolBins elementary 1 Microsoft-Windows-Sysmon
Meterpreter or Cobalt Strike Getsystem Service Installation elementary 1, 13, 17, 4697, 7045 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon, Service Control Manager
FlowCloud Malware elementary 13 Microsoft-Windows-Sysmon
Process Memory Dump Using Rdrleakdiag elementary 5 Kernel-Process
Correlation Impacket Smbexec elementary 5145 Microsoft-Windows-Security-Auditing
Netsh RDP Port Forwarding elementary 1 Microsoft-Windows-Sysmon
Phosphorus (APT35) Exchange Discovery elementary 4104 Microsoft-Windows-PowerShell
Disable Workstation Lock elementary 13 Microsoft-Windows-Sysmon
Suncrypt Parameters elementary 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Credential Dumping By LaZagne elementary 10 Microsoft-Windows-Sysmon
Smbexec.py Service Installation elementary 6, 4697, 7045 Service Control Manager
Enabling Restricted Admin Mode elementary 1 Kernel-Process
Leviathan Registry Key Activity elementary 1, 13 Microsoft-Windows-Sysmon
ICacls Granting Access To All elementary 1 Microsoft-Windows-Sysmon
Suspicious VBS Execution Parameter elementary 1 Microsoft-Windows-Sysmon
Mshta JavaScript Execution elementary 1 Microsoft-Windows-Sysmon
Malspam Execution Registering Malicious DLL elementary 1, 11 Microsoft-Windows-Sysmon
Disable Task Manager Through Registry Key elementary 1, 13 Microsoft-Windows-Sysmon
Mustang Panda Dropper elementary 1 Microsoft-Windows-Sysmon
Wdigest Enable UseLogonCredential elementary 1, 13 Microsoft-Windows-Sysmon
RTLO Character elementary 15 Microsoft-Windows-Sysmon
Raccine Uninstall elementary 1 Microsoft-Windows-Sysmon
Msdt (Follina) File Browse Process Execution elementary 1, 4104 Microsoft-Windows-PowerShell, Microsoft-Windows-Sysmon
Office Application Startup Office Test elementary 1, 13 Microsoft-Windows-Sysmon
Dumpert LSASS Process Dumper elementary 7, 11 Microsoft-Windows-Sysmon
Windows Credential Editor Registry Key elementary 13 Microsoft-Windows-Sysmon
Blue Mockingbird Malware elementary 1 Microsoft-Windows-Sysmon
APT29 Fake Google Update Service Install elementary 7045 Service Control Manager
Suspicious Netsh DLL Persistence elementary 1 Microsoft-Windows-Sysmon
Impacket Wmiexec Module elementary 1, 4688 Microsoft-Windows-Security-Auditing, Microsoft-Windows-Sysmon
Kerberos Pre-Auth Disabled in UAC elementary 4738 Microsoft-Windows-Security-Auditing
Exploited CVE-2020-10189 Zoho ManageEngine elementary 1 Microsoft-Windows-Sysmon
Equation Group DLL_U Load elementary 1 Microsoft-Windows-Sysmon
AdFind Usage elementary 1 Microsoft-Windows-Sysmon
SeEnableDelegationPrivilege Granted To User Or Machine In Active Directory elementary 4704 Microsoft-Windows-Security-Auditing
WMI Persistence Command Line Event Consumer elementary 7 Microsoft-Windows-Sysmon
Antivirus Web Shell Detection elementary 1116 Microsoft-Windows-Windows Defender
LanManServer Registry Modify elementary 13 Microsoft-Windows-Sysmon
Elise Backdoor elementary 1 Microsoft-Windows-Sysmon
Malicious Service Installations elementary 4697, 7045 Service Control Manager
Disabling SmartScreen Via Registry elementary 13 Microsoft-Windows-Sysmon
Microsoft Office Startup Add-In elementary 11 Microsoft-Windows-Sysmon
IcedID Execution Using Excel elementary 1 Microsoft-Windows-Sysmon
Suspicious Windows ANONYMOUS LOGON Local Account Created elementary 4720 Microsoft-Windows-Security-Auditing
SysKey Registry Keys Access elementary 4656, 4663 Microsoft-Windows-Security-Auditing
Active Directory Data Export Using Csvde elementary 1 Kernel-Process
Turla Named Pipes elementary 17 Microsoft-Windows-Sysmon
Windows Defender Logging Modification Via Registry elementary 1, 13 Kernel-Process, Microsoft-Windows-Sysmon
Exploit For CVE-2015-1641 elementary 1 Microsoft-Windows-Sysmon
Phorpiex Process Masquerading elementary 1 Microsoft-Windows-Sysmon
Suspicious Headless Web Browser Execution To Download File elementary 5 Kernel-Process
Copying Sensitive Files With Credential Data elementary 1 Microsoft-Windows-Sysmon

EventIDs occurrences in rules

EventID Number of rules concerned Percentage of rules concerned (Total rules: 478)
1 236 49.37 %
13 52 10.88 %
4104 47 9.83 %
5 35 7.32 %
11 27 5.65 %
7 15 3.14 %
5145 15 3.14 %
7045 11 2.3 %
4688 10 2.09 %
4656 8 1.67 %
4697 7 1.46 %
15 7 1.46 %
4662 6 1.26 %
4624 6 1.26 %
4663 6 1.26 %
10 6 1.26 %
17 6 1.26 %
5136 6 1.26 %
1116 5 1.05 %
4625 4 0.84 %
3 4 0.84 %
4720 3 0.63 %
4103 3 0.63 %
8 3 0.63 %
22 3 0.63 %
4799 2 0.42 %
4728 2 0.42 %
4729 2 0.42 %
4738 2 0.42 %
12 2 0.42 %
25 2 0.42 %
6 2 0.42 %
1033 2 0.42 %
20 2 0.42 %
5007 2 0.42 %
4768 2 0.42 %
4657 1 0.21 %
6416 1 0.21 %
4658 1 0.21 %
1013 1 0.21 %
5154 1 0.21 %
4886 1 0.21 %
4887 1 0.21 %
4754 1 0.21 %
4756 1 0.21 %
4757 1 0.21 %
4758 1 0.21 %
4727 1 0.21 %
4730 1 0.21 %
4764 1 0.21 %
1127 1 0.21 %
5001 1 0.21 %
5101 1 0.21 %
5010 1 0.21 %
5012 1 0.21 %
2013 1 0.21 %
4674 1 0.21 %
4698 1 0.21 %
4781 1 0.21 %
770 1 0.21 %
771 1 0.21 %
150 1 0.21 %
1000 1 0.21 %
1011 1 0.21 %
5140 1 0.21 %
8001 1 0.21 %
4732 1 0.21 %
325 1 0.21 %
4742 1 0.21 %
517 1 0.21 %
1102 1 0.21 %
4825 1 0.21 %
16 1 0.21 %
5156 1 0.21 %
4661 1 0.21 %
1032 1 0.21 %
1034 1 0.21 %
1031 1 0.21 %
4726 1 0.21 %
4743 1 0.21 %
4776 1 0.21 %
4706 1 0.21 %
4707 1 0.21 %
4704 1 0.21 %
23 1 0.21 %
524 1 0.21 %
19 1 0.21 %
21 1 0.21 %
4611 1 0.21 %
4673 1 0.21 %
1125 1 0.21 %
1126 1 0.21 %
1006 1 0.21 %
1007 1 0.21 %
1008 1 0.21 %
1015 1 0.21 %
1117 1 0.21 %
1118 1 0.21 %
1119 1 0.21 %
4703 1 0.21 %
4794 1 0.21 %
4741 1 0.21 %
4649 1 0.21 %

EventProviders occurrences in rules

EventProvider Number of rules concerned Percentage of rules concerned (Total rules: 478)
Microsoft-Windows-Sysmon 288 60.25 %
Microsoft-Windows-Security-Auditing 86 17.99 %
Kernel-Process 65 13.6 %
Microsoft-Windows-PowerShell 51 10.67 %
Service Control Manager 11 2.3 %
Microsoft-Windows-Kernel-File 10 2.09 %
Microsoft-Windows-Windows Defender 9 1.88 %
Microsoft-Windows-Kernel-Process 2 0.42 %
Microsoft-Windows-DNS-Client 2 0.42 %
Microsoft-Windows-Kernel-Network 2 0.42 %
Microsoft-REDACTED-Security-Auditing 1 0.21 %
Microsoft-Windows-DNS-Server-Service 1 0.21 %
Application Error 1 0.21 %
Microsoft-Windows-NTLM 1 0.21 %
Microsoft-Windows-Audit-CVE 1 0.21 %
ESENT 1 0.21 %
Microsoft-Windows-Eventlog 1 0.21 %
Microsoft-Windows-Kernel-General 1 0.21 %
Microsoft-Windows-DHCP-Server 1 0.21 %
Microsoft-Windows-Backup 1 0.21 %

EffortLevel x EventIDs

Effort Level EventIDs Number of related rules Percentage of related rules (Total rules: 478
master , 1, 10, 1013, 11, 1116, 12, 13, 150, 17, 22, 25, 3, 4104, 4611, 4624, 4625, 4649, 4656, 4661, 4662, 4663, 4673, 4674, 4688, 4698, 4720, 4726, 4727, 4728, 4729, 4730, 4732, 4743, 4754, 4756, 4757, 4758, 4764, 4768, 5, 5007, 5140, 5145, 7, 770, 771, 8001 123 25.73 %
advanced , 1, 10, 1006, 1007, 1008, 1015, 11, 1116, 1117, 1118, 1119, 1125, 1126, 1127, 13, 15, 17, 19, 20, 2013, 21, 22, 23, 3, 4103, 4104, 4624, 4625, 4656, 4662, 4688, 4706, 4707, 4776, 4799, 5, 5001, 5010, 5012, 5101, 5145, 5154, 5156, 6, 6416, 7, 7045, 8 115 24.06 %
intermediate 1, 10, 1000, 1031, 1032, 1033, 1034, 11, 1102, 12, 13, 15, 16, 17, 20, 3, 4103, 4104, 4624, 4656, 4657, 4658, 4662, 4663, 4688, 4697, 4703, 4720, 4738, 4741, 4742, 4768, 4781, 4794, 4799, 4825, 5, 5136, 5145, 517, 524, 7, 7045, 8 155 32.43 %
elementary 1, 10, 1011, 11, 1116, 13, 15, 17, 325, 4103, 4104, 4625, 4656, 4663, 4688, 4697, 4704, 4720, 4738, 4886, 4887, 5, 5136, 5145, 6, 7, 7045 85 17.78 %