Event Logs
Overview
Evidence: Event Logs Description: Collect Event Logs Category: System Platform: Windows Short Name: eventlog Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
Windows Event Logs provide comprehensive records of system events, security events, and application activities. These logs are essential for understanding system behavior, detecting security incidents, and reconstructing timelines of events on Windows systems.
Data Collected
This collector gathers structured data about event records.
Event Records Data
ID
Primary key (auto-increment)
1
Channel
Event log channel
Security
ProviderName
Event provider name
Microsoft-Windows-Security-Auditing
EventID
Event ID
4624
Description
Event description
An account was successfully logged on
TotalCount
Total event count
150
Collection Method
This collector parses the necessary data from the event_logs
table.
This collector collects files from the following locations:
C:\Windows\System32\winevt\Logs\
Usage
This evidence is crucial for forensic investigations as it provides comprehensive Windows system activity records. It helps investigators detect system-level attacks, analyze security events, and reconstruct system incidents. The data can reveal authentication failures, privilege escalations, and unauthorized system modifications. Analysts can use this information to identify system compromises, trace malicious activities, and assess Windows security posture.
Notes
This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.
Last updated
Was this helpful?