参考微软文档整理的常用EVENTID:

Event ID

Event message

分類

類別

4670

Permissions on an object were changed.

Audit Other Policy Change Events

Policy Change

4704

A user right was assigned.

Audit Authorization Policy Change

Policy Change

4705

A user right was removed.

Audit Authorization Policy Change

Policy Change

4706

A new trust was created to a domain.

Audit Authorization Policy Change

Policy Change

4707

A trust to a domain was removed.

Audit Authorization Policy Change

Policy Change

4709

IPsec Services was started.

Audit Filtering Platform Policy Change

Policy Change

4710

IPsec Services was disabled.

Audit Filtering Platform Policy Change

Policy Change

4711

May contain any one of the following:PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

4712

IPsec Services encountered a potentially serious failure.

Audit Filtering Platform Policy Change

Policy Change

4713

Kerberos policy was changed.

Audit Authentication Policy Change

Policy Change

4714

Encrypted data recovery policy was changed.

Audit Authorization Policy Change

Policy Change

4715

The audit policy (SACL) on an object was changed.

Audit Audit Policy Change

Policy Change

4716

Trusted domain information was modified.

Audit Authentication Policy Change

Policy Change

4717

System security access was granted to an account.

Audit Authentication Policy Change

Policy Change

4718

System security access was removed from an account.

Audit Authentication Policy Change

Policy Change

4719

System audit policy was changed.

Audit Audit Policy Change

Policy Change

4720

A user account was created.

Audit User

Account Management

4722

A user account was enabled.

Audit User

Account Management

4723

An attempt was made to change an account's password.

Audit User

Account Management

4724

An attempt was made to reset an account's password.

Audit User

Account Management

4725

A user account was disabled.

Audit User

Account Management

4726

A user account was deleted.

Audit User

Account Management

4727

A security-enabled global group was created.

Audit Security Group

Account Management

4728

A member was added to a security-enabled global group.

Audit Security Group

Account Management

4729

A member was removed from a security-enabled global group.

Audit Security Group

Account Management

4730

A security-enabled global group was deleted.

Audit Security Group

Account Management

4731

A security-enabled local group was created.

Audit Security Group

Account Management

4732

A member was added to a security-enabled local group.

Audit Security Group

Account Management

4733

A member was removed from a security-enabled local group.

Audit Security Group

Account Management

4734

A security-enabled local group was deleted.

Audit Security Group

Account Management

4735

A security-enabled local group was changed.

Audit Security Group

Account Management

4737

A security-enabled global group was changed.

Audit Security Group

Account Management

4738

A user account was changed.

Audit User

Account Management

4739

Domain Policy was changed.

Audit Authentication Policy Change

Policy Change

4740

A user account was locked out.

Audit User

Account Management

4741

A computer account was created.

Audit Computer

Account Management

4742

A computer account was changed.

Audit Computer

Account Management

4743

A computer account was deleted.

Audit Computer

Account Management

4744

A security-disabled local group was created.

Audit Distribution Group

Account Management

4745

A security-disabled local group was changed.

Audit Distribution Group

Account Management

4746

A member was added to a security-disabled local group.

Audit Distribution Group

Account Management

4747

A member was removed from a security-disabled local group.

Audit Distribution Group

Account Management

4748

A security-disabled local group was deleted.

Audit Distribution Group

Account Management

4749

A security-disabled global group was created.

Audit Distribution Group

Account Management

4750

A security-disabled global group was changed.

Audit Distribution Group

Account Management

4751

A member was added to a security-disabled global group.

Audit Distribution Group

Account Management

4752

A member was removed from a security-disabled global group.

Audit Distribution Group

Account Management

4753

A security-disabled global group was deleted.

Audit Distribution Group

Account Management

4754

A security-enabled universal group was created.

Audit Security Group

Account Management

4755

A security-enabled universal group was changed.

Audit Security Group

Account Management

4756

A member was added to a security-enabled universal group.

Audit Security Group

Account Management

4757

A member was removed from a security-enabled universal group.

Audit Security Group

Account Management

4758

A security-enabled universal group was deleted.

Audit Security Group

Account Management

4759

A security-disabled universal group was created.

Audit Distribution Group

Account Management

4760

A security-disabled universal group was changed.

Audit Distribution Group

Account Management

4761

A member was added to a security-disabled universal group.

Audit Distribution Group

Account Management

4762

A member was removed from a security-disabled universal group.

Audit Distribution Group

Account Management

4764

A group's type was changed.

Audit Security Group

Account Management

4765

SID History was added to an account.

Audit User

Account Management

4766

An attempt to add SID History to an account failed.

Audit User

Account Management

4767

A user account was unlocked.

Audit User

Account Management

4780

The ACL was set on accounts which are members of administrators groups.

Audit User

Account Management

4781

The name of an account was changed:

Audit User

Account Management

4782

The password hash for an account was accessed.

Audit Other Account

Account Management

4783

A basic application group was created.

Audit Application Group

Account Management

4784

A basic application group was changed.

Audit Application Group

Account Management

4785

A member was added to a basic application group.

Audit Application Group

Account Management

4786

A member was removed from a basic application group.

Audit Application Group

Account Management

4787

A non-member was added to a basic application group.

Audit Application Group

Account Management

4788

A non-member was removed from a basic application group.

Audit Application Group

Account Management

4789

A basic application group was deleted.

Audit Application Group

Account Management

4790

An LDAP query group was created.

Audit Application Group

Account Management

4793

The Password Policy Checking API was called.

Audit Other Account

Account Management

4794

An attempt was made to set the Directory Services Restore Mode.

Audit User

Account Management

4817

Auditing settings on an object were changed.

Audit Audit Policy Change

Policy Change

4864

A namespace collision was detected.

Audit Authentication Policy Change

Policy Change

4865

A trusted forest information entry was added.

Audit Authentication Policy Change

Policy Change

4866

A trusted forest information entry was removed.

Audit Authentication Policy Change

Policy Change

4867

A trusted forest information entry was modified.

Audit Authentication Policy Change

Policy Change

4902

The Per-user audit policy table was created.

Audit Audit Policy Change

Policy Change

4904

An attempt was made to register a security event source.

Audit Audit Policy Change

Policy Change

4905

An attempt was made to unregister a security event source.

Audit Audit Policy Change

Policy Change

4906

The CrashOnAuditFail value has changed.

Audit Audit Policy Change

Policy Change

4907

Auditing settings on object were changed.

Audit Audit Policy Change

Policy Change

4908

Special Groups Logon table modified.

Audit Audit Policy Change

Policy Change

4909

The local policy settings for the TBS were changed.

Audit Other Policy Change Events

Policy Change

4910

The group policy settings for the TBS were changed.

Audit Other Policy Change Events

Policy Change

4912

Per User Audit Policy was changed.

Audit Audit Policy Change

Policy Change

4944

The following policy was active when the Windows Firewall started.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4945

A rule was listed when the Windows Firewall started.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4946

A change has been made to Windows Firewall exception list. A rule was added.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4947

A change has been made to Windows Firewall exception list. A rule was modified.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4948

A change has been made to Windows Firewall exception list. A rule was deleted.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4949

Windows Firewall settings were restored to the default values.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4950

A Windows Firewall setting has changed.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4951

A rule has been ignored because its major version number was not recognized by Windows Firewall.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4952

Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4953

A rule has been ignored by Windows Firewall because it could not parse the rule.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4954

Windows Firewall Group Policy settings have changed. The new settings have been applied.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4956

Windows Firewall has changed the active profile.

Audit MPSSVC Rule-Level Policy Change

Policy Change

4957

Windows Firewall did not apply the following rule:

Audit MPSSVC Rule-Level Policy Change

Policy Change

4958

Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:

Audit MPSSVC Rule-Level Policy Change

Policy Change

5040

A change has been made to IPsec settings. An Authentication Set was added.

Audit Filtering Platform Policy Change

Policy Change

5041

A change has been made to IPsec settings. An Authentication Set was modified.

Audit Filtering Platform Policy Change

Policy Change

5042

A change has been made to IPsec settings. An Authentication Set was deleted.

Audit Filtering Platform Policy Change

Policy Change

5043

A change has been made to IPsec settings. A Connection Security Rule was added.

Audit Filtering Platform Policy Change

Policy Change

5044

A change has been made to IPsec settings. A Connection Security Rule was modified.

Audit Filtering Platform Policy Change

Policy Change

5045

A change has been made to IPsec settings. A Connection Security Rule was deleted.

Audit Filtering Platform Policy Change

Policy Change

5046

A change has been made to IPsec settings. A Crypto Set was added.

Audit Filtering Platform Policy Change

Policy Change

5047

A change has been made to IPsec settings. A Crypto Set was modified.

Audit Filtering Platform Policy Change

Policy Change

5048

A change has been made to IPsec settings. A Crypto Set was deleted.

Audit Filtering Platform Policy Change

Policy Change

5063

A cryptographic provider operation was attempted.

Audit Other Policy Change Events

Policy Change

5064

A cryptographic context operation was attempted.

Audit Other Policy Change Events

Policy Change

5065

A cryptographic context modification was attempted.

Audit Other Policy Change Events

Policy Change

5066

A cryptographic function operation was attempted.

Audit Other Policy Change Events

Policy Change

5067

A cryptographic function modification was attempted.

Audit Other Policy Change Events

Policy Change

5068

A cryptographic function provider operation was attempted.

Audit Other Policy Change Events

Policy Change

5069

A cryptographic function property operation was attempted.

Audit Other Policy Change Events

Policy Change

5070

A cryptographic function property modification was attempted.

Audit Other Policy Change Events

Policy Change

5376

Credential Manager credentials were backed up.

Audit User

Account Management

5377

Credential Manager credentials were restored from a backup.

Audit User

Account Management

5440

The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Audit Filtering Platform Policy Change

Policy Change

5441

The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

Audit Filtering Platform Policy Change

Policy Change

5442

The following provider was present when the Windows Filtering Platform Base Filtering Engine started.

Audit Filtering Platform Policy Change

Policy Change

5443

The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.

Audit Filtering Platform Policy Change

Policy Change

5444

The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.

Audit Filtering Platform Policy Change

Policy Change

5446

A Windows Filtering Platform callout has been changed.

Audit Filtering Platform Policy Change

Policy Change

5447

A Windows Filtering Platform filter has been changed.

Audit Other Policy Change Events

Policy Change

5448

A Windows Filtering Platform provider has been changed.

Audit Filtering Platform Policy Change

Policy Change

5449

A Windows Filtering Platform provider context has been changed.

Audit Filtering Platform Policy Change

Policy Change

5450

A Windows Filtering Platform sub-layer has been changed.

Audit Filtering Platform Policy Change

Policy Change

5456

PAStore Engine applied Active Directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5457

PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5458

PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5459

PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5460

PAStore Engine applied local registry storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5461

PAStore Engine failed to apply local registry storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5462

PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.

Audit Filtering Platform Policy Change

Policy Change

5463

PAStore Engine polled for changes to the active IPsec policy and detected no changes.

Audit Filtering Platform Policy Change

Policy Change

5464

PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.

Audit Filtering Platform Policy Change

Policy Change

5465

PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.

Audit Filtering Platform Policy Change

Policy Change

5466

PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied.

Audit Filtering Platform Policy Change

Policy Change

5467

PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used.

Audit Filtering Platform Policy Change

Policy Change

5468

PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used.

Audit Filtering Platform Policy Change

Policy Change

5471

PAStore Engine loaded local storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5472

PAStore Engine failed to load local storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5473

PAStore Engine loaded directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5474

PAStore Engine failed to load directory storage IPsec policy on the computer.

Audit Filtering Platform Policy Change

Policy Change

5477

PAStore Engine failed to add quick mode filter.

Audit Filtering Platform Policy Change

Policy Change

6144

Security policy in the group policy objects has been applied successfully.

Audit Other Policy Change Events

Policy Change

6145

One or more errors occurred while processing security policy in the group policy objects.

Audit Other Policy Change Events

Policy Change

About AcitveDirectory EventLog的更多相关文章

  1. .NET Core的日志[4]:将日志写入EventLog

    面向Windows的编程人员应该不会对Event Log感到陌生,以至于很多人提到日志,首先想到的就是EventLog.EventLog不仅仅记录了Windows系统自身针对各种事件的日志,我们的应用 ...

  2. 服务器重启后SQL Server Agent由于"The EventLog service has not been started" 启动失败

    案例环境: 操作系统   : Microsoft Windows Server 2003 Standard Edtion SP2 数据库版本 : SQL Server 2005 Standard Ed ...

  3. 添加无线服务wzcsvc服务,Eventlog服务

    <添加eventlog服务.reg> Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentCont ...

  4. 写window应用程序日志System.Diagnostics.EventLog.WriteEntry

    System.Diagnostics.EventLog.WriteEntry( MySource , Writing to event log. ); 可以写window应用程序日志 查看的地方:右击 ...

  5. 使用EventLog类写Windows事件日志

    在程序中经常需要将指定的信息(包括异常信息和正常处理信息)写到日志中.在C#3.0中可以使用EventLog类将各种信息直接写入Windows日志.EventLog类在System.Diagnosti ...

  6. EventLog组件

    1.使用EventLog组件读写事件日志 SourceExists方法  确定事件源是否已在本地计算机上注册 DeleteEventSource方法  用于从事件日志中移除应用程序的事件源注册 pri ...

  7. EventLog实现事件日志操作

    选中”我的电脑”,在其右键菜单中选择“管理”,在打开的对话框中包括了如下图所示的“日志”信息: 选中其中的某一条日志,可以看到如下的详细信息: 我们应该如何通过写代码的方式向其中添加“日志”呢? 在操 ...

  8. 将日志写入EventLog

    将日志写入EventLog 面向Windows的编程人员应该不会对Event Log感到陌生,以至于很多人提到日志,首先想到的就是EventLog.EventLog不仅仅记录了Windows系统自身针 ...

  9. Eventlog控件的使用

    CreateEventSource 已重载. 建立一个能够将事件信息写入到系统的特定日志中的应用程序. Delete 已重载. 移除日志资源. DeleteEventSource 已重载. 从事件日志 ...

随机推荐

  1. Linux软件包安装和卸载

    安装软件包的三种方法 1.rpm.yum.源码包 2.yum会把依赖的包都安装上 rpm包介绍 3.rmp报名组成结构:yum-3.4.3-132.el7.centos.0.1.noarch.rpm ...

  2. 如何修改Linux系统的 /etc/ssh/sshd_config 文件 "/etc/ssh/sshd_config" E212: Can't open file for writin

    第一步:我们使用命令行vim /etc/ssh/sshd_config   执行修改,强制保持  :wq!  系统不让我们修改这个文件 "/etc/ssh/sshd_config" ...

  3. Myeclipse10安装git 完美解决-费元星

    1. 拥有自己的github版本库 这年头,不在GitHub上弄几个项目都不好意思跟人家打招呼. 首先,进入GitHub注册账号,话说人家这页面做的那叫一个舒服啊. 然后,登陆并创建自己的版本库(Re ...

  4. Atitit.sql where条件表达式的原理  attilax概括

    Atitit.sql where条件表达式的原理  attilax概括 1. 数据查询接口sql api标准化1 2. Sql接口的问题2 2.1. 虽然sql是结构化的dsl,但是任然是编程语言类型 ...

  5. Atitit.随时间变色特效 ---包厢管理系统的规划

    Atitit.随时间变色特效 ---包厢管理系统的规划 1 流程滴定仪 定义的参数 颜色.位置(开始值,结束值,当前比值) >>返回数值 可以后期处理转成双位16进制码 分别定义复合颜色的 ...

  6. Sublime Text 2 和 Verilog HDL

    Sublime Text 2 和 Verilog HDL Date  Fri 04 July 2014 Tags Sublime Text / Vivado Sublime Text 代码编辑器之于程 ...

  7. iOS多线程与网络开发之NSURLCache

    郝萌主倾心贡献,尊重作者的劳动成果.请勿转载. // 2 // ViewController.m 3 // NSURLCacheDemo 4 // 5 // Created by haomengzhu ...

  8. erlang supervisor simple_one_for_one实例

    simple_one_for_one vs one_for_one: 相同点: 这种Restart Strategy和one_for_one基本相同(即当一个child process挂掉后,仅仅重启 ...

  9. HDU 1978 How many ways DP问题

    How many ways Time Limit: 3000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)Tot ...

  10. tensolrflow之基础变量

    #优化一个乘法算子 #coding:utf- __author__ = 'similarface' import tensorflow as tf sess=tf.Session() #创建一个常量张 ...