Windows Security Log Events
All Sources
Windows Audit
SharePoint Audit
(
LOGbinder for SharePoint
)
SQL Server Audit
(
LOGbinder for SQL Server
)
Exchange Audit
(
LOGbinder for Exchange
)
Sysmon
(
MS Sysinternals Sysmon
)
Windows Audit Categories:
All categories
Account Logon
Account Management
Directory Service
Logon/Logoff
Non Audit (Event Log)
Object Access
Policy Change
Privilege Use
Process Tracking
System
Uncategorized
Subcategories:
All subcategories
Detailed Directory Service Replication
Directory Service Access
Directory Service Changes
Directory Service Replication
Windows Versions:
All events
Win2000, XP and Win2003 only
Win2008, Win2012R2, Win2016 and Win10+, Win2019
Category:
Directory Service
Windows
4661
A handle to an object was requested
Windows
4662
An operation was performed on an object
Windows
4928
An Active Directory replica source naming context was established
Windows
4929
An Active Directory replica source naming context was removed
Windows
4930
An Active Directory replica source naming context was modified
Windows
4931
An Active Directory replica destination naming context was modified
Windows
4932
Synchronization of a replica of an Active Directory naming context has begun
Windows
4933
Synchronization of a replica of an Active Directory naming context has ended
Windows
4934
Attributes of an Active Directory object were replicated
Windows
4935
Replication failure begins
Windows
4936
Replication failure ends
Windows
4937
A lingering object was removed from a replica
Windows
5136
A directory service object was modified
Windows
5137
A directory service object was created
Windows
5138
A directory service object was undeleted
Windows
5139
A directory service object was moved
Windows
5141
A directory service object was deleted
Windows
5169
A directory service object was modified
Windows
5170
A directory service object was modified during a background cleanup task
Stay up-to-date on the Latest in Cybersecurity
Sign up for the Ultimate IT Security newsletter to hear about the latest webinars, patches, CVEs, attacks, and more.
Work Email:
Upcoming Webinars
Understanding REST APIs and Their Security Issues: Secrets, Input Validation, Output Filtering, Call Limits, Automation, Authorization
Top 8 Features of Human Risk Management that Results in Real Behavior Change
From the Trenches: How BeyondTrust Detected a Breach at Okta and Lessons we Keep Learning from This Story
Additional Resources
Encyclopedia
•
Event IDs
•
All Event IDs
•
Audit Policy
Go To Event ID:
Security Log
Quick Reference
Chart
Download now!
Tweet
User name:
Password:
/
Forgot?
Register
April 2025
Patch Tuesday
"Patch Tuesday - One Zero Day! " - sponsored by LOGbinder
Home
Cookies help us deliver the best experience on our website. By using our website, you agree to the use of cookies.