Data Collection Tier in Azure Security Center

Within the Azure Security Center, Security Policy node, you can select a workspace and there define the data collection configuration for security events.

  • All Events
  • Common
  • Minimal
  • None

More details about the Azure Data Collection and the data collection tier can be found here. The page also has a list of all the Event IDs that are being collected within each tier.

To better understand the exact meaning of each Event ID, I’ve created the below lists containing the Event ID, Description, Event Provider and Event Level information.

Event IDs included in “Minimum” Tier

ID Description Provider Level
1102 The audit log was cleared. Microsoft-Windows-eventlog Information
1102 The computer will be rebooted because the user has exceeded the maximum number of failed logon attempts allowed on this computer. Microsoft-Windows-WinLogon Warning
4624 An account was successfully logged on. Microsoft-Windows-Security-Auditing Information
4625 An account failed to log on. Microsoft-Windows-Security-Auditing Information
4657 A registry value was modified. Microsoft-Windows-Security-Auditing Information
4663 An attempt was made to access an object. Microsoft-Windows-Security-Auditing Information
4688 A new process has been created. Microsoft-Windows-Security-Auditing Information
4688 A new process has been created. Microsoft-Windows-Security-Auditing Information
4700 A scheduled task was enabled. Microsoft-Windows-Security-Auditing Information
4702 A scheduled task was updated. Microsoft-Windows-Security-Auditing Information
4719 System audit policy was changed. Microsoft-Windows-Security-Auditing Information
4720 A user account was created. Microsoft-Windows-Security-Auditing Information
4722 A user account was enabled. Microsoft-Windows-Security-Auditing Information
4723 An attempt was made to change an account’s password. Microsoft-Windows-Security-Auditing Information
4724 An attempt was made to reset an account’s password. Microsoft-Windows-Security-Auditing Information
4727 A security-enabled global group was created. Microsoft-Windows-Security-Auditing Information
4728 A member was added to a security-enabled global group. Microsoft-Windows-Security-Auditing Information
4732 A member was added to a security-enabled local group. Microsoft-Windows-Security-Auditing Information
4732 A member was added to a security-enabled local group. Microsoft-Windows-Security-Auditing Information
4735 A security-enabled local group was changed. Microsoft-Windows-Security-Auditing Information
4737 A security-enabled global group was changed. Microsoft-Windows-Security-Auditing Information
4739 Domain Policy was changed. Microsoft-Windows-Security-Auditing Information
4740 A user account was locked out. Microsoft-Windows-Security-Auditing Information
4754 A security-enabled universal group was created. Microsoft-Windows-Security-Auditing Information
4755 A security-enabled universal group was changed. Microsoft-Windows-Security-Auditing Information
4756 A member was added to a security-enabled universal group. Microsoft-Windows-Security-Auditing Information
4756 A member was added to a security-enabled universal group. Microsoft-Windows-Security-Auditing Information
4767 A user account was unlocked. Microsoft-Windows-Security-Auditing Information
4799 A security-enabled local group membership was enumerated. Microsoft-Windows-Security-Auditing Information
4825 A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group. Microsoft-Windows-Security-Auditing Information
4946 A change was made to the Windows Firewall exception list. A rule was added. Microsoft-Windows-Security-Auditing Information
4948 A change was made to the Windows Firewall exception list. A rule was deleted. Microsoft-Windows-Security-Auditing Information
4956 Windows Firewall changed the active profile. Microsoft-Windows-Security-Auditing Information
5024 The Windows Firewall service started successfully. Microsoft-Windows-Security-Auditing Information
5033 The Windows Firewall Driver started successfully. Microsoft-Windows-Security-Auditing Information
8001 The AppLocker policy was applied successfully to this computer. Microsoft-Windows-AppLocker Information
8002 %11 was allowed to run. Microsoft-Windows-AppLocker Information
8003 %11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced. Microsoft-Windows-AppLocker Warning
8004 %11 was prevented from running. Microsoft-Windows-AppLocker Error
8005 %11 was allowed to run. Microsoft-Windows-AppLocker Information
8006 %11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced. Microsoft-Windows-AppLocker Warning
8007 %11 was prevented from running. Microsoft-Windows-AppLocker Error
8007 %11 was prevented from running. Microsoft-Windows-AppLocker Error
8222 ???

Event IDs included in “Common” Tier

ID Description Provider Level
1 Authentication started. Microsoft-Windows-WinLogon Information
299 AD-FS?
300 The Kerberos client discovered domain controller %1 for the domain %2. Microsoft-Windows-Security-Kerberos Information
300 Task Scheduler started Task Engine “%1” with process ID %2. Microsoft-Windows-TaskScheduler Information
324 Task Scheduler queued instance “%2” of task “%1” and will launch it as soon as instance “%3” completes. Microsoft-Windows-TaskScheduler Warning
324 Closing WSMan %1 operation completed successfully Microsoft-Windows-WinRM Information
340 ???
403 Task Scheduler service has encountered an error in “%1” . Additional Data: Error Value: %2. Microsoft-Windows-TaskScheduler Error
404 Task Scheduler service has encountered RPC initialization error in “%1”. Additional Data: Error Value: %2. Microsoft-Windows-TaskScheduler Warning
410 Task Scheduler service failed to set a wakeup timer. As a result, some scheduled tasks may not run while the system is suspended. Additional Data: Error Value: %1. Microsoft-Windows-TaskScheduler Error
411 Task Scheduler service received a time system change notification. Microsoft-Windows-TaskScheduler Information
412 Task Scheduler service failed to launch tasks triggered by computer startup. Additional Data: Error Value: %1. Microsoft-Windows-TaskScheduler Error
413 Task Scheduler service failed to load tasks at service startup. Additional Data: Error Value: %1. Microsoft-Windows-TaskScheduler Error
431 ???
500 Process ID %2 has registered idle task ID %1. Microsoft-Windows-TaskScheduler Information
501 Process ID %2 has completed idle task ID %1. Microsoft-Windows-TaskScheduler Information
501 Microsoft-Windows-WinLogon Information
1100 The event logging service has shut down. Microsoft-Windows-eventlog Information
1102 The audit log was cleared. Microsoft-Windows-eventlog Information
1102 The computer will be rebooted because the user has exceeded the maximum number of failed logon attempts allowed on this computer. Microsoft-Windows-WinLogon Warning
1107 The event logging service encountered an error while processing an incoming event from publisher %3 and trying to process the metadata for it. Microsoft-Windows-eventlog Error
1108 The event logging service encountered an error while processing an incoming event published from %3. Microsoft-Windows-eventlog Error
4608 Windows is starting up. Microsoft-Windows-Security-Auditing Information
4610 An authentication package has been loaded by the Local Security Authority. Microsoft-Windows-Security-Auditing Information
4611 A trusted logon process has been registered with the Local Security Authority. Microsoft-Windows-Security-Auditing Information
4614 A notification package has been loaded by the Security Account Manager. Microsoft-Windows-Security-Auditing Information
461
4622 A security package has been loaded by the Local Security Authority. Microsoft-Windows-Security-Auditing Information
4624 An account was successfully logged on. Microsoft-Windows-Security-Auditing Information
4624 An account was successfully logged on. Microsoft-Windows-Security-Auditing Information
4625 An account failed to log on. Microsoft-Windows-Security-Auditing Information
4634 An account was logged off. Microsoft-Windows-Security-Auditing Information
4647 User initiated logoff: Microsoft-Windows-Security-Auditing Information
4648 A logon was attempted using explicit credentials. Microsoft-Windows-Security-Auditing Information
4649 A replay attack was detected. Microsoft-Windows-Security-Auditing Information
4657 A registry value was modified. Microsoft-Windows-Security-Auditing Information
4661 A handle to an object was requested. Microsoft-Windows-Security-Auditing Information
4662 An operation was performed on an object. Microsoft-Windows-Security-Auditing Information
4663 An attempt was made to access an object. Microsoft-Windows-Security-Auditing Information
4663 An attempt was made to access an object. Microsoft-Windows-Security-Auditing Information
4665 An attempt was made to create an application client context. Microsoft-Windows-Security-Auditing Information
4666 An application attempted an operation: Microsoft-Windows-Security-Auditing Information
4667 An application client context was deleted. Microsoft-Windows-Security-Auditing Information
4688 A new process has been created. Microsoft-Windows-Security-Auditing Information
4670 Permissions on an object were changed. Microsoft-Windows-Security-Auditing Information
4672 Special privileges assigned to new logon. Microsoft-Windows-Security-Auditing Information
4673 A privileged service was called. Microsoft-Windows-Security-Auditing Information
4674 An operation was attempted on a privileged object. Microsoft-Windows-Security-Auditing Information
4675 SIDs were filtered. Microsoft-Windows-Security-Auditing Information
4689 A process has exited. Microsoft-Windows-Security-Auditing Information
4697 A service was installed in the system. Microsoft-Windows-Security-Auditing Information
4700 A scheduled task was enabled. Microsoft-Windows-Security-Auditing Information
4702 A scheduled task was updated. Microsoft-Windows-Security-Auditing Information
4704 A user right was assigned. Microsoft-Windows-Security-Auditing Information
4705 A user right was removed. Microsoft-Windows-Security-Auditing Information
4716 Trusted domain information was modified. Microsoft-Windows-Security-Auditing Information
4717 System security access was granted to an account. Microsoft-Windows-Security-Auditing Information
4718 System security access was removed from an account. Microsoft-Windows-Security-Auditing Information
4719 System audit policy was changed. Microsoft-Windows-Security-Auditing Information
4720 A user account was created. Microsoft-Windows-Security-Auditing Information
4722 A user account was enabled. Microsoft-Windows-Security-Auditing Information
4723 An attempt was made to change an account’s password. Microsoft-Windows-Security-Auditing Information
4724 An attempt was made to reset an account’s password. Microsoft-Windows-Security-Auditing Information
4725 A user account was disabled. Microsoft-Windows-Security-Auditing Information
4726 A user account was deleted. Microsoft-Windows-Security-Auditing Information
4727 A security-enabled global group was created. Microsoft-Windows-Security-Auditing Information
4728 A member was added to a security-enabled global group. Microsoft-Windows-Security-Auditing Information
4729 A member was removed from a security-enabled global group. Microsoft-Windows-Security-Auditing Information
4733 A member was removed from a security-enabled local group. Microsoft-Windows-Security-Auditing Information
4732 A member was added to a security-enabled local group. Microsoft-Windows-Security-Auditing Information
4735 A security-enabled local group was changed. Microsoft-Windows-Security-Auditing Information
4737 A security-enabled global group was changed. Microsoft-Windows-Security-Auditing Information
4738 A user account was changed. Microsoft-Windows-Security-Auditing Information
4739 Domain Policy was changed. Microsoft-Windows-Security-Auditing Information
4740 A user account was locked out. Microsoft-Windows-Security-Auditing Information
4742 A computer account was changed. Microsoft-Windows-Security-Auditing Information
4744 A security-disabled local group was created. Microsoft-Windows-Security-Auditing Information
4745 A security-disabled local group was changed. Microsoft-Windows-Security-Auditing Information
4746 A member was added to a security-disabled local group. Microsoft-Windows-Security-Auditing Information
4750 A security-disabled global group was changed. Microsoft-Windows-Security-Auditing Information
4751 A member was added to a security-disabled global group. Microsoft-Windows-Security-Auditing Information
4752 A member was removed from a security-disabled global group. Microsoft-Windows-Security-Auditing Information
4754 A security-enabled universal group was created. Microsoft-Windows-Security-Auditing Information
4755 A security-enabled universal group was changed. Microsoft-Windows-Security-Auditing Information
4756 A member was added to a security-enabled universal group. Microsoft-Windows-Security-Auditing Information
4756 A member was added to a security-enabled universal group. Microsoft-Windows-Security-Auditing Information
4757 A member was removed from a security-enabled universal group. Microsoft-Windows-Security-Auditing Information
4760 A security-disabled universal group was changed. Microsoft-Windows-Security-Auditing Information
4761 A member was added to a security-disabled universal group. Microsoft-Windows-Security-Auditing Information
4762 A member was removed from a security-disabled universal group. Microsoft-Windows-Security-Auditing Information
4764 A group’s type was changed. Microsoft-Windows-Security-Auditing Information
4767 A user account was unlocked. Microsoft-Windows-Security-Auditing Information
4768 A Kerberos authentication ticket (TGT) was requested. Microsoft-Windows-Security-Auditing Information
4771 Kerberos pre-authentication failed. Microsoft-Windows-Security-Auditing Information
4774 An account was mapped for logon. Microsoft-Windows-Security-Auditing Information
4778 A session was reconnected to a Window Station. Microsoft-Windows-Security-Auditing Information
4779 A session was disconnected from a Window Station. Microsoft-Windows-Security-Auditing Information
4781 The name of an account was changed: Microsoft-Windows-Security-Auditing Information
4793 The Password Policy Checking API was called. Microsoft-Windows-Security-Auditing Information
4797 An attempt was made to query the existence of a blank password for an account. Microsoft-Windows-Security-Auditing Information
4798 A user’s local group membership was enumerated. Microsoft-Windows-Security-Auditing Information
4799 A security-enabled local group membership was enumerated. Microsoft-Windows-Security-Auditing Information
4800 The workstation was locked. Microsoft-Windows-Security-Auditing Information
4801 The workstation was unlocked. Microsoft-Windows-Security-Auditing Information
4802 The screen saver was invoked. Microsoft-Windows-Security-Auditing Information
4803 The screen saver was dismissed. Microsoft-Windows-Security-Auditing Information
4825 A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group. Microsoft-Windows-Security-Auditing Information
4826 Boot Configuration Data loaded. Microsoft-Windows-Security-Auditing Information
4870 Certificate Services revoked a certificate. Microsoft-Windows-Security-Auditing Information
4886 Certificate Services received a certificate request. Microsoft-Windows-Security-Auditing Information
4887 Certificate Services approved a certificate request and issued a certificate. Microsoft-Windows-Security-Auditing Information
4888 Certificate Services denied a certificate request. Microsoft-Windows-Security-Auditing Information
4893 Certificate Services archived a key. Microsoft-Windows-Security-Auditing Information
4898 Certificate Services loaded a template. Microsoft-Windows-Security-Auditing Information
4902 The Per-user audit policy table was created. Microsoft-Windows-Security-Auditing Information
4904 An attempt was made to register a security event source. Microsoft-Windows-Security-Auditing Information
4905 An attempt was made to unregister a security event source. Microsoft-Windows-Security-Auditing Information
4907 Auditing settings on object were changed. Microsoft-Windows-Security-Auditing Information
4931 An Active Directory replica destination naming context was modified. Microsoft-Windows-Security-Auditing Information
4932 Synchronization of a replica of an Active Directory naming context has begun. Microsoft-Windows-Security-Auditing Information
4933 Synchronization of a replica of an Active Directory naming context has ended. Microsoft-Windows-Security-Auditing Information
4946 A change was made to the Windows Firewall exception list. A rule was added. Microsoft-Windows-Security-Auditing Information
4948 A change was made to the Windows Firewall exception list. A rule was deleted. Microsoft-Windows-Security-Auditing Information
4956 Windows Firewall changed the active profile. Microsoft-Windows-Security-Auditing Information
4985 The state of a transaction has changed. Microsoft-Windows-Security-Auditing Information
5024 The Windows Firewall service started successfully. Microsoft-Windows-Security-Auditing Information
5033 The Windows Firewall Driver started successfully. Microsoft-Windows-Security-Auditing Information
5059 Key migration operation. Microsoft-Windows-Security-Auditing Information
5059 Key migration operation. Microsoft-Windows-Security-Auditing Information
5136 A directory service object was modified. Microsoft-Windows-Security-Auditing Information
5137 A directory service object was created. Microsoft-Windows-Security-Auditing Information
5140 A network share object was accessed. Microsoft-Windows-Security-Auditing Information
5140 A network share object was accessed. Microsoft-Windows-Security-Auditing Information
5145 A network share object was checked to see whether client can be granted desired access. Microsoft-Windows-Security-Auditing Information
5632 A request was made to authenticate to a wireless network. Microsoft-Windows-Security-Auditing Information
5632 A request was made to authenticate to a wireless network. Microsoft-Windows-Security-Auditing Information
6144 Security policy in the group policy objects has been applied successfully. Microsoft-Windows-Security-Auditing Information
6145 One or more errors occured while processing security policy in the group policy objects. Microsoft-Windows-Security-Auditing Information
6272 Network Policy Server granted access to a user. Microsoft-Windows-Security-Auditing Information
6272 Network Policy Server granted access to a user. Microsoft-Windows-Security-Auditing Information
6272 Network Policy Server granted access to a user. Microsoft-Windows-Security-Auditing Information
6273 Network Policy Server denied access to a user. Microsoft-Windows-Security-Auditing Information
6273 Network Policy Server denied access to a user. Microsoft-Windows-Security-Auditing Information
6273 Network Policy Server denied access to a user. Microsoft-Windows-Security-Auditing Information
6278 Network Policy Server granted full access to a user because the host met the defined health policy. Microsoft-Windows-Security-Auditing Information
6416 A new external device was recognized by the system. Microsoft-Windows-Security-Auditing Information
6416 A new external device was recognized by the system. Microsoft-Windows-Security-Auditing Information
6423 The installation of this device is forbidden by system policy. Microsoft-Windows-Security-Auditing Information
6424 The installation of this device was allowed, after having previously been forbidden by policy. Microsoft-Windows-Security-Auditing Information
8001 The AppLocker policy was applied successfully to this computer. Microsoft-Windows-AppLocker Information
8002 %11 was allowed to run. Microsoft-Windows-AppLocker Information
8003 %11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced. Microsoft-Windows-AppLocker Warning
8004 %11 was prevented from running. Microsoft-Windows-AppLocker Error
8005 %11 was allowed to run. Microsoft-Windows-AppLocker Information
8006 %11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced. Microsoft-Windows-AppLocker Warning
8007 %11 was prevented from running. Microsoft-Windows-AppLocker Error
8222 ???
26401 ???
30004 ???

Unfortunately, I was not able to find information for all the Event IDs but hope to find out soon.

I used the following PowerShell Code to prepare the data for the above lists.

<br>

 

 

One Reply to “Data Collection Tier in Azure Security Center”

  1. In my environment, we have applied the “baseline” audit policy recommendations for Server 2016 from the documentation provided by Microsoft. I was curious what the difference in events collected would be between the “Common” and “All Events” settings. Thought I’d share my findings (of course, this may differ in your environment):

    1101
    1105
    4616 – The system time was changed.
    4627 – Group membership information.
    4659 – A handle to an object was requested with intent to delete.
    4660 – An object was deleted.
    4664 – An attempt was made to create a hard link.
    4731 – A security-enabled local group was created.
    4741
    4776 – The domain controller attempted to validate the credentials for an account.
    4965 – IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).
    5058 – Key file operation.
    5061 – Cryptographic operation.
    5142 – A network share object was added.
    5478 – IPsec Services has started successfully.
    5889 – An object was deleted from the COM+ Catalog.
    5890- An object was added to the COM+ Catalog.

Leave a Reply