LogoLogo
Back to binalyze.com
  • Welcome | Binalyze Knowledge Base
  • AIR
    • AIR
    • Introduction
      • What is AIR?
      • Terminology
      • Architecture
        • AIR Responder Architecture; overview and performance analysis
        • AIR Task Flow and Management
      • Network Communication
      • Cloud Forensics with Binalyze AIR
    • AIR Setup
      • Console Hardware Requirements
      • Console Pre-Installation
      • Console Installation
      • Microsoft Azure Cloud Platform Integration
      • AIR Relay Server
        • What is AIR Relay Server?
        • Requirements for installation
        • How to install a Relay Server on different Linux platforms
        • How to change IP address of Relay Server
        • How to install a Responder with Relay Server support
        • Proxy configurations
          • Adding proxy to Relay Server
          • Adding proxy to Responder
        • Service Management for Relay Server
        • Whitelisting for Relay Server
        • Retrieving metrics from Relay Server
        • Updating and Uninstalling Relay Server
        • Troubleshooting
      • AIR Responder - Supported Operating Systems
        • AIR Responder - MS Windows supported systems
        • AIR Responder - Apple macOS supported systems
        • AIR Responder - Linux (DEB/RPM) supported systems
        • AIR - ESXi Standalone Collector
        • AIR Responder - Chrome supported systems
          • AIR For Chrome
      • AIR Responder Hardware Requirements
      • AIR Responder Deployment
        • Golden Image
        • Responder & Active Directory OUs
        • AIR Responder Exception Rules
          • Binalyze AIR Watchdog Folder
        • FDA via Jamf and Apple’s PPPC utility
        • AIR Responder in Windows 'Safe Mode'
      • Uninstalling AIR Responders
      • Security
        • AIR Console Access Control
        • AIR SSL Enforcement
          • SSL Certificate Management in Binalyze AIR
        • Two-factor authentication (2FA)
      • Post-Deployment Configuration Guide
        • Using AIR CLI on Binalyze AIR Console
      • AIR's User Settings
    • Updating AIR
      • Single-Tier Systems
      • 2-Tier Systems
      • AIR Console Updating - SaaS
    • Backup
      • Restore AIR Backup using the CLI
    • Features
      • Acquisition
        • Task Creation
          • Regex in AIR/DRONE:
          • Asset Management with Persistent Saved Filters
          • Task Cancellation and Deletion
        • Acquisition Profiles
        • Supported Evidence
          • Windows Collections
          • macOS Collections
          • Linux Collections
          • IBM AIX Collections
        • Scheduling Tasks
        • Disk and Volume Imaging
          • Imaging with interACT
        • Chain Of Custody in AIR
      • Auto Tagging
      • Triage
        • Triage Rule Templates
          • YARA Templates
          • Sigma Templates
          • osquery Templates
        • Schedule Triage Tasks
      • interACT
        • interACT Commands
        • PowerShell commands in interACT
      • Compare
      • Timeline
      • Integrations
        • SSO Integrations
          • Microsoft Azure SSO Integration
          • Okta SAML 2.0 SSO Integration
        • Webhooks
          • Mattermost Integration
          • Splunk Integration
          • IBM QRadar Integration
          • Wazuh Integration
          • Cortex XSOAR Integration
          • Elasticsearch Logstash Kibana Integration
          • ServiceNow Integration
          • Sumo Logic Integration
          • Crowdstrike Integration
          • Microsoft Sentinel Integration
          • Slack Integration
          • Carbon Black Cloud Integration
          • Rapid7 InsightIDR Integration
          • LogicHub SOAR (DEVO) Integration
          • Fortigate SIEM Integration
          • Dynatrace Integration
          • Stellar XDR Integration
          • SentinelOne Integration
          • Microsoft 365 Defender Integration
          • Cisco XDR Integration
      • Event Subscription
      • AIR API
        • API in AIR is likely to be more effective than Webhooks
      • DRONE
        • What is DRONE?
        • What is an Analysis Pipeline?
        • Analyzers
          • Cross Platform Analyzers
            • MITRE ATT&CK Analyzer
              • MITRE ATT&CK Analyzer changelog
            • Dynamo Analyzer
            • Browser History Analyzer
            • Generic WebShell Analyzer
          • Windows Analyzers
            • Windows Event Records and how AIR handles them
              • Windows Event Logs in AIR v4.21 and older versions
              • Event Records Summary vs. Event Records
            • Prefetch Analyzer
            • Shellbag Data Fields
          • Linux Analyzers
          • macOS Analyzers
            • Audit Event Analyzer
      • AIR Investigation Hub
        • Using the AIR Investigation Hub
        • Investigation Hub – Data Usage Statistics Dashboard
      • AIR File Explorer
        • File Explorer - FAQs
      • Tornado (Preview Version)
        • Tornado Installation Guide
          • Tornado Operating System Support
        • Updating Tornado
        • Tornado demo video
        • Getting Started with Tornado
          • Tornado Terminology
        • Tornado Collectors
          • Accessing Google Workspace
            • Service Account Creation
              • Enable Service Account Key Creation
          • Access Modes in O365
            • O365 license types
        • Tornado Troubleshooting & Feedback
        • Tornado FAQs
      • Frank.AI
      • Asset Isolation
      • Evidence Repositories
      • Policies
      • Tags
      • Off-Network Responder
        • Setting Up a Custom Case Directory
        • biunzip
          • biunzip password file
      • Binalyze AIR Responder Proxy Support
      • Proxy Configuration on Binalyze AIR Console
      • Binalyze AIR Audit Logs
    • Troubleshooting
      • Binalyze AIR Console CPU Profiling for Performance Issues
      • Understanding MSI Error Code 1618
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
    • FAQs
      • Binalyze AIR Console Migration Procedure For Single-Tier Setup
      • Binalyze AIR Console Migration Procedure For 2-Tier Installation
      • Binalyze AIR Console Backup Procedure
      • Resolving the “Invalid Host Header. Host must be the Console Address” Error
      • How to download the collected evidence and artifacts in Binalyze AIR?
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
      • AIR responder troubleshooting
      • Understanding Port Usage in Binalyze AIR
      • How many assets can connect to a single Console instance?
      • How do I enable SSL on AIR?
      • Can I use AIR with EDR/XDR Products?
      • Can I integrate AIR with my SOAR/SIEM?
      • What (sub)domains are used by AIR?
      • Docker & Host System IP Conflict
      • Monitoring Responder and UI API's
      • How do I update AIR Console?
      • How do I update AIR Responders on assets?
      • How to reset the password of a user via the AIR-CLI?
      • Is there a way to move an asset from one Organization or Case to another?
      • Creating exclusions/exception rules for Binalyze AIR Responder on EPP and EDR Solutions
      • Anything missing?
      • How can I install a version of AIR that isn't the latest?
  • General
    • Licenses - Open-source Software List
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. AIR
  2. Features
  3. DRONE
  4. Analyzers
  5. Windows Analyzers

Windows Event Records and how AIR handles them

AIR enables users to fully customize event log collections based on specific channels, event IDs, and collection parameters, making investigations more efficient and precise.

When discussing Windows Event Logs, it’s important to understand two key concepts: channels and event IDs.

  1. Channel: A channel in Windows Event Logs refers to a specific "log" or source of events. Windows organizes event logs into several channels, each dedicated to logging specific types of events. Examples of commonly investigated channels include:

    • Application: Logs events from applications running on the system.

    • Security: Logs security-related events, such as logon attempts or resource access.

    • System: Logs system-level events, including hardware failures and system services.

    • Setup: Log setup-related events, typically related to Windows installation and updates.

  2. Channels can be essential in the context of Binalyze AIR when filtering or triaging specific logs during forensic analysis. By using channels, investigators can isolate relevant events and gain more efficient insights.

  3. Event ID: An event ID is a unique identifier for a specific type of event within a channel. Windows assigns an event ID to categorize the nature of the event. For example:

    • Event ID 4624 in the Security channel represents a successful user login.

    • Event ID 6006 in the System channel indicates a system shutdown.

  4. Event IDs are critical for identifying and understanding specific system actions or issues. In forensic investigations, solutions like Binalyze AIR use event IDs to pinpoint the exact events relevant to a security incident, helping investigators build timelines and correlate suspicious activity.

In Binalyze AIR's Investigation Hub, filtering by channels and event IDs allows analysts to quickly narrow down logs and focus on the most relevant ones to an investigation​​​.

Key Features introduced in AIR v4.23:

  • AIR will now allow users to collect and present all event logs OR

  • Define specific channels for event log collection.

  • Users can select event IDs from the AIR list of over 200 of the most commonly used in DFIR or manually add custom channels and event IDs.

  • With event ID selections made, an additional parameter is required:

    • Select the number of records to collect OR

    • Select date ranges for log collection, allowing for targeted log retrieval.

How It Works:

A new Event Log Records configuration tab has been added to the “New Acquisition Profile” wizard:

If you are already building an acquisition profile, you will eventually come to the Event Logs section, and you will not notice a configuration button which will take you to the Event Log Records tab as discussed above:

To enable this feature, switch on the EVT Log Records by toggling on the switch shown below and then either:

  • Choose from a predefined list of 201 event IDs or

  • Input custom channel and event IDs using the Add New Event Type option.

The example below demonstrates how to manually add an event ID that is not included in the 201 provided by AIR. This is typically only necessary for rare, specialized cases, as the 201 event IDs cover the most common scenarios comprehensively:

Once configured, the new Acquisition Profile will be saved and can be reused in future investigations by selecting it from the Acquisition Profiles Library.

When running an Acquisition Profile that includes event log records, users must select between two additional Event Log Records Configurations options:

  1. Collect last ‘N’ records – This gathers the most recent ‘N’ records for each event ID, in the example below, this is set to the default 4000:

  1. Collect records between start and end dates – In the example below, we have used the date/time picker to choose the last 24 hours option, and you can see those dates/times are automatically populated in the start and end boxes:

The dates and times selected in the 'picker' align with the target asset's system date and time settings, as displayed in the browser.

These features enable highly focused and relevant data collection, drastically reducing the manual effort needed to filter out unnecessary data and ensuring that critical events are captured during investigations.

Here’s a list of what some may consider the top ten event IDs often used to support DFIR Investigations:

  1. Event ID 4624 - Successful Account Logon Tracks successful user logins, essential for identifying legitimate access.

  2. Event ID 4625 - Failed Account Logon Logs failed login attempts, which are useful for detecting brute-force attacks.

  3. Event ID 4776 - Credential Validation Indicates whether a user's credentials were successfully validated by a domain controller.

  4. Event ID 4688 - Process Creation Records every process started on the system, useful for spotting suspicious activity.

  5. Event ID 4648 - Logon Using Explicit Credentials Detects when credentials are used for network logon, helping track lateral movement.

  6. Event ID 4663 - Object Access Logs, when an object (such as a file or folder) is accessed, are crucial for monitoring sensitive data access.

  7. Event ID 4698 - Scheduled Task Creation Captures when a scheduled task is created, often used by attackers for persistence.

  8. Event ID 4719 - Audit Policy Change Tracks changes to audit policies, which may indicate an attempt to cover tracks.

  9. Event ID 1102 - Audit Log Cleared Logs when the security log is cleared, a common indicator of malicious activity.

  10. Event ID 4672 - Special Privilege Assigned Monitors when special privileges (like admin rights) are assigned, helping detect privilege escalation.

PreviousWindows AnalyzersNextWindows Event Logs in AIR v4.21 and older versions

Last updated 2 months ago

Was this helpful?