About AcitveDirectory EventLog
参考微软文档整理的常用EVENTID:
Event ID |
Event message |
分類 |
類別 |
4670 |
Permissions on an object were changed. |
Audit Other Policy Change Events |
Policy Change |
4704 |
A user right was assigned. |
Audit Authorization Policy Change |
Policy Change |
4705 |
A user right was removed. |
Audit Authorization Policy Change |
Policy Change |
4706 |
A new trust was created to a domain. |
Audit Authorization Policy Change |
Policy Change |
4707 |
A trust to a domain was removed. |
Audit Authorization Policy Change |
Policy Change |
4709 |
IPsec Services was started. |
Audit Filtering Platform Policy Change |
Policy Change |
4710 |
IPsec Services was disabled. |
Audit Filtering Platform Policy Change |
Policy Change |
4711 |
May contain any one of the following:PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
4712 |
IPsec Services encountered a potentially serious failure. |
Audit Filtering Platform Policy Change |
Policy Change |
4713 |
Kerberos policy was changed. |
Audit Authentication Policy Change |
Policy Change |
4714 |
Encrypted data recovery policy was changed. |
Audit Authorization Policy Change |
Policy Change |
4715 |
The audit policy (SACL) on an object was changed. |
Audit Audit Policy Change |
Policy Change |
4716 |
Trusted domain information was modified. |
Audit Authentication Policy Change |
Policy Change |
4717 |
System security access was granted to an account. |
Audit Authentication Policy Change |
Policy Change |
4718 |
System security access was removed from an account. |
Audit Authentication Policy Change |
Policy Change |
4719 |
System audit policy was changed. |
Audit Audit Policy Change |
Policy Change |
4720 |
A user account was created. |
Audit User |
Account Management |
4722 |
A user account was enabled. |
Audit User |
Account Management |
4723 |
An attempt was made to change an account's password. |
Audit User |
Account Management |
4724 |
An attempt was made to reset an account's password. |
Audit User |
Account Management |
4725 |
A user account was disabled. |
Audit User |
Account Management |
4726 |
A user account was deleted. |
Audit User |
Account Management |
4727 |
A security-enabled global group was created. |
Audit Security Group |
Account Management |
4728 |
A member was added to a security-enabled global group. |
Audit Security Group |
Account Management |
4729 |
A member was removed from a security-enabled global group. |
Audit Security Group |
Account Management |
4730 |
A security-enabled global group was deleted. |
Audit Security Group |
Account Management |
4731 |
A security-enabled local group was created. |
Audit Security Group |
Account Management |
4732 |
A member was added to a security-enabled local group. |
Audit Security Group |
Account Management |
4733 |
A member was removed from a security-enabled local group. |
Audit Security Group |
Account Management |
4734 |
A security-enabled local group was deleted. |
Audit Security Group |
Account Management |
4735 |
A security-enabled local group was changed. |
Audit Security Group |
Account Management |
4737 |
A security-enabled global group was changed. |
Audit Security Group |
Account Management |
4738 |
A user account was changed. |
Audit User |
Account Management |
4739 |
Domain Policy was changed. |
Audit Authentication Policy Change |
Policy Change |
4740 |
A user account was locked out. |
Audit User |
Account Management |
4741 |
A computer account was created. |
Audit Computer |
Account Management |
4742 |
A computer account was changed. |
Audit Computer |
Account Management |
4743 |
A computer account was deleted. |
Audit Computer |
Account Management |
4744 |
A security-disabled local group was created. |
Audit Distribution Group |
Account Management |
4745 |
A security-disabled local group was changed. |
Audit Distribution Group |
Account Management |
4746 |
A member was added to a security-disabled local group. |
Audit Distribution Group |
Account Management |
4747 |
A member was removed from a security-disabled local group. |
Audit Distribution Group |
Account Management |
4748 |
A security-disabled local group was deleted. |
Audit Distribution Group |
Account Management |
4749 |
A security-disabled global group was created. |
Audit Distribution Group |
Account Management |
4750 |
A security-disabled global group was changed. |
Audit Distribution Group |
Account Management |
4751 |
A member was added to a security-disabled global group. |
Audit Distribution Group |
Account Management |
4752 |
A member was removed from a security-disabled global group. |
Audit Distribution Group |
Account Management |
4753 |
A security-disabled global group was deleted. |
Audit Distribution Group |
Account Management |
4754 |
A security-enabled universal group was created. |
Audit Security Group |
Account Management |
4755 |
A security-enabled universal group was changed. |
Audit Security Group |
Account Management |
4756 |
A member was added to a security-enabled universal group. |
Audit Security Group |
Account Management |
4757 |
A member was removed from a security-enabled universal group. |
Audit Security Group |
Account Management |
4758 |
A security-enabled universal group was deleted. |
Audit Security Group |
Account Management |
4759 |
A security-disabled universal group was created. |
Audit Distribution Group |
Account Management |
4760 |
A security-disabled universal group was changed. |
Audit Distribution Group |
Account Management |
4761 |
A member was added to a security-disabled universal group. |
Audit Distribution Group |
Account Management |
4762 |
A member was removed from a security-disabled universal group. |
Audit Distribution Group |
Account Management |
4764 |
A group's type was changed. |
Audit Security Group |
Account Management |
4765 |
SID History was added to an account. |
Audit User |
Account Management |
4766 |
An attempt to add SID History to an account failed. |
Audit User |
Account Management |
4767 |
A user account was unlocked. |
Audit User |
Account Management |
4780 |
The ACL was set on accounts which are members of administrators groups. |
Audit User |
Account Management |
4781 |
The name of an account was changed: |
Audit User |
Account Management |
4782 |
The password hash for an account was accessed. |
Audit Other Account |
Account Management |
4783 |
A basic application group was created. |
Audit Application Group |
Account Management |
4784 |
A basic application group was changed. |
Audit Application Group |
Account Management |
4785 |
A member was added to a basic application group. |
Audit Application Group |
Account Management |
4786 |
A member was removed from a basic application group. |
Audit Application Group |
Account Management |
4787 |
A non-member was added to a basic application group. |
Audit Application Group |
Account Management |
4788 |
A non-member was removed from a basic application group. |
Audit Application Group |
Account Management |
4789 |
A basic application group was deleted. |
Audit Application Group |
Account Management |
4790 |
An LDAP query group was created. |
Audit Application Group |
Account Management |
4793 |
The Password Policy Checking API was called. |
Audit Other Account |
Account Management |
4794 |
An attempt was made to set the Directory Services Restore Mode. |
Audit User |
Account Management |
4817 |
Auditing settings on an object were changed. |
Audit Audit Policy Change |
Policy Change |
4864 |
A namespace collision was detected. |
Audit Authentication Policy Change |
Policy Change |
4865 |
A trusted forest information entry was added. |
Audit Authentication Policy Change |
Policy Change |
4866 |
A trusted forest information entry was removed. |
Audit Authentication Policy Change |
Policy Change |
4867 |
A trusted forest information entry was modified. |
Audit Authentication Policy Change |
Policy Change |
4902 |
The Per-user audit policy table was created. |
Audit Audit Policy Change |
Policy Change |
4904 |
An attempt was made to register a security event source. |
Audit Audit Policy Change |
Policy Change |
4905 |
An attempt was made to unregister a security event source. |
Audit Audit Policy Change |
Policy Change |
4906 |
The CrashOnAuditFail value has changed. |
Audit Audit Policy Change |
Policy Change |
4907 |
Auditing settings on object were changed. |
Audit Audit Policy Change |
Policy Change |
4908 |
Special Groups Logon table modified. |
Audit Audit Policy Change |
Policy Change |
4909 |
The local policy settings for the TBS were changed. |
Audit Other Policy Change Events |
Policy Change |
4910 |
The group policy settings for the TBS were changed. |
Audit Other Policy Change Events |
Policy Change |
4912 |
Per User Audit Policy was changed. |
Audit Audit Policy Change |
Policy Change |
4944 |
The following policy was active when the Windows Firewall started. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4945 |
A rule was listed when the Windows Firewall started. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4946 |
A change has been made to Windows Firewall exception list. A rule was added. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4947 |
A change has been made to Windows Firewall exception list. A rule was modified. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4948 |
A change has been made to Windows Firewall exception list. A rule was deleted. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4949 |
Windows Firewall settings were restored to the default values. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4950 |
A Windows Firewall setting has changed. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4951 |
A rule has been ignored because its major version number was not recognized by Windows Firewall. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4952 |
Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4953 |
A rule has been ignored by Windows Firewall because it could not parse the rule. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4954 |
Windows Firewall Group Policy settings have changed. The new settings have been applied. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4956 |
Windows Firewall has changed the active profile. |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4957 |
Windows Firewall did not apply the following rule: |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
4958 |
Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer: |
Audit MPSSVC Rule-Level Policy Change |
Policy Change |
5040 |
A change has been made to IPsec settings. An Authentication Set was added. |
Audit Filtering Platform Policy Change |
Policy Change |
5041 |
A change has been made to IPsec settings. An Authentication Set was modified. |
Audit Filtering Platform Policy Change |
Policy Change |
5042 |
A change has been made to IPsec settings. An Authentication Set was deleted. |
Audit Filtering Platform Policy Change |
Policy Change |
5043 |
A change has been made to IPsec settings. A Connection Security Rule was added. |
Audit Filtering Platform Policy Change |
Policy Change |
5044 |
A change has been made to IPsec settings. A Connection Security Rule was modified. |
Audit Filtering Platform Policy Change |
Policy Change |
5045 |
A change has been made to IPsec settings. A Connection Security Rule was deleted. |
Audit Filtering Platform Policy Change |
Policy Change |
5046 |
A change has been made to IPsec settings. A Crypto Set was added. |
Audit Filtering Platform Policy Change |
Policy Change |
5047 |
A change has been made to IPsec settings. A Crypto Set was modified. |
Audit Filtering Platform Policy Change |
Policy Change |
5048 |
A change has been made to IPsec settings. A Crypto Set was deleted. |
Audit Filtering Platform Policy Change |
Policy Change |
5063 |
A cryptographic provider operation was attempted. |
Audit Other Policy Change Events |
Policy Change |
5064 |
A cryptographic context operation was attempted. |
Audit Other Policy Change Events |
Policy Change |
5065 |
A cryptographic context modification was attempted. |
Audit Other Policy Change Events |
Policy Change |
5066 |
A cryptographic function operation was attempted. |
Audit Other Policy Change Events |
Policy Change |
5067 |
A cryptographic function modification was attempted. |
Audit Other Policy Change Events |
Policy Change |
5068 |
A cryptographic function provider operation was attempted. |
Audit Other Policy Change Events |
Policy Change |
5069 |
A cryptographic function property operation was attempted. |
Audit Other Policy Change Events |
Policy Change |
5070 |
A cryptographic function property modification was attempted. |
Audit Other Policy Change Events |
Policy Change |
5376 |
Credential Manager credentials were backed up. |
Audit User |
Account Management |
5377 |
Credential Manager credentials were restored from a backup. |
Audit User |
Account Management |
5440 |
The following callout was present when the Windows Filtering Platform Base Filtering Engine started. |
Audit Filtering Platform Policy Change |
Policy Change |
5441 |
The following filter was present when the Windows Filtering Platform Base Filtering Engine started. |
Audit Filtering Platform Policy Change |
Policy Change |
5442 |
The following provider was present when the Windows Filtering Platform Base Filtering Engine started. |
Audit Filtering Platform Policy Change |
Policy Change |
5443 |
The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. |
Audit Filtering Platform Policy Change |
Policy Change |
5444 |
The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started. |
Audit Filtering Platform Policy Change |
Policy Change |
5446 |
A Windows Filtering Platform callout has been changed. |
Audit Filtering Platform Policy Change |
Policy Change |
5447 |
A Windows Filtering Platform filter has been changed. |
Audit Other Policy Change Events |
Policy Change |
5448 |
A Windows Filtering Platform provider has been changed. |
Audit Filtering Platform Policy Change |
Policy Change |
5449 |
A Windows Filtering Platform provider context has been changed. |
Audit Filtering Platform Policy Change |
Policy Change |
5450 |
A Windows Filtering Platform sub-layer has been changed. |
Audit Filtering Platform Policy Change |
Policy Change |
5456 |
PAStore Engine applied Active Directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5457 |
PAStore Engine failed to apply Active Directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5458 |
PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5459 |
PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5460 |
PAStore Engine applied local registry storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5461 |
PAStore Engine failed to apply local registry storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5462 |
PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem. |
Audit Filtering Platform Policy Change |
Policy Change |
5463 |
PAStore Engine polled for changes to the active IPsec policy and detected no changes. |
Audit Filtering Platform Policy Change |
Policy Change |
5464 |
PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services. |
Audit Filtering Platform Policy Change |
Policy Change |
5465 |
PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully. |
Audit Filtering Platform Policy Change |
Policy Change |
5466 |
PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied. |
Audit Filtering Platform Policy Change |
Policy Change |
5467 |
PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used. |
Audit Filtering Platform Policy Change |
Policy Change |
5468 |
PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used. |
Audit Filtering Platform Policy Change |
Policy Change |
5471 |
PAStore Engine loaded local storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5472 |
PAStore Engine failed to load local storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5473 |
PAStore Engine loaded directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5474 |
PAStore Engine failed to load directory storage IPsec policy on the computer. |
Audit Filtering Platform Policy Change |
Policy Change |
5477 |
PAStore Engine failed to add quick mode filter. |
Audit Filtering Platform Policy Change |
Policy Change |
6144 |
Security policy in the group policy objects has been applied successfully. |
Audit Other Policy Change Events |
Policy Change |
6145 |
One or more errors occurred while processing security policy in the group policy objects. |
Audit Other Policy Change Events |
Policy Change |
About AcitveDirectory EventLog的更多相关文章
- .NET Core的日志[4]:将日志写入EventLog
面向Windows的编程人员应该不会对Event Log感到陌生,以至于很多人提到日志,首先想到的就是EventLog.EventLog不仅仅记录了Windows系统自身针对各种事件的日志,我们的应用 ...
- 服务器重启后SQL Server Agent由于"The EventLog service has not been started" 启动失败
案例环境: 操作系统 : Microsoft Windows Server 2003 Standard Edtion SP2 数据库版本 : SQL Server 2005 Standard Ed ...
- 添加无线服务wzcsvc服务,Eventlog服务
<添加eventlog服务.reg> Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentCont ...
- 写window应用程序日志System.Diagnostics.EventLog.WriteEntry
System.Diagnostics.EventLog.WriteEntry( MySource , Writing to event log. ); 可以写window应用程序日志 查看的地方:右击 ...
- 使用EventLog类写Windows事件日志
在程序中经常需要将指定的信息(包括异常信息和正常处理信息)写到日志中.在C#3.0中可以使用EventLog类将各种信息直接写入Windows日志.EventLog类在System.Diagnosti ...
- EventLog组件
1.使用EventLog组件读写事件日志 SourceExists方法 确定事件源是否已在本地计算机上注册 DeleteEventSource方法 用于从事件日志中移除应用程序的事件源注册 pri ...
- EventLog实现事件日志操作
选中”我的电脑”,在其右键菜单中选择“管理”,在打开的对话框中包括了如下图所示的“日志”信息: 选中其中的某一条日志,可以看到如下的详细信息: 我们应该如何通过写代码的方式向其中添加“日志”呢? 在操 ...
- 将日志写入EventLog
将日志写入EventLog 面向Windows的编程人员应该不会对Event Log感到陌生,以至于很多人提到日志,首先想到的就是EventLog.EventLog不仅仅记录了Windows系统自身针 ...
- Eventlog控件的使用
CreateEventSource 已重载. 建立一个能够将事件信息写入到系统的特定日志中的应用程序. Delete 已重载. 移除日志资源. DeleteEventSource 已重载. 从事件日志 ...
随机推荐
- Linux软件包安装和卸载
安装软件包的三种方法 1.rpm.yum.源码包 2.yum会把依赖的包都安装上 rpm包介绍 3.rmp报名组成结构:yum-3.4.3-132.el7.centos.0.1.noarch.rpm ...
- 如何修改Linux系统的 /etc/ssh/sshd_config 文件 "/etc/ssh/sshd_config" E212: Can't open file for writin
第一步:我们使用命令行vim /etc/ssh/sshd_config 执行修改,强制保持 :wq! 系统不让我们修改这个文件 "/etc/ssh/sshd_config" ...
- Myeclipse10安装git 完美解决-费元星
1. 拥有自己的github版本库 这年头,不在GitHub上弄几个项目都不好意思跟人家打招呼. 首先,进入GitHub注册账号,话说人家这页面做的那叫一个舒服啊. 然后,登陆并创建自己的版本库(Re ...
- Atitit.sql where条件表达式的原理 attilax概括
Atitit.sql where条件表达式的原理 attilax概括 1. 数据查询接口sql api标准化1 2. Sql接口的问题2 2.1. 虽然sql是结构化的dsl,但是任然是编程语言类型 ...
- Atitit.随时间变色特效 ---包厢管理系统的规划
Atitit.随时间变色特效 ---包厢管理系统的规划 1 流程滴定仪 定义的参数 颜色.位置(开始值,结束值,当前比值) >>返回数值 可以后期处理转成双位16进制码 分别定义复合颜色的 ...
- Sublime Text 2 和 Verilog HDL
Sublime Text 2 和 Verilog HDL Date Fri 04 July 2014 Tags Sublime Text / Vivado Sublime Text 代码编辑器之于程 ...
- iOS多线程与网络开发之NSURLCache
郝萌主倾心贡献,尊重作者的劳动成果.请勿转载. // 2 // ViewController.m 3 // NSURLCacheDemo 4 // 5 // Created by haomengzhu ...
- erlang supervisor simple_one_for_one实例
simple_one_for_one vs one_for_one: 相同点: 这种Restart Strategy和one_for_one基本相同(即当一个child process挂掉后,仅仅重启 ...
- HDU 1978 How many ways DP问题
How many ways Time Limit: 3000/1000 MS (Java/Others) Memory Limit: 32768/32768 K (Java/Others)Tot ...
- tensolrflow之基础变量
#优化一个乘法算子 #coding:utf- __author__ = 'similarface' import tensorflow as tf sess=tf.Session() #创建一个常量张 ...