SlideShare a Scribd company logo
Digital Forensics and Windows 7
            Event Logs

                                         Troy Larson
               Principal Forensics Program Manager
               TWC Network Security Investigations
           NSINV-R3– Research|Readiness|Response
Introduction
Vista/Windows 7 Event
Logging:
• New format *.evtx.
• More, many more,
   event log files.
• New system for
   collecting and displaying
   events.
• New security event
   numbering.
Windows Event Logs
Before Vista—Event Log.               Vista to present—Windows Event
• The big three:                      Log.
    – System.                         • The big three:
    – Security.                            –   System.
    – Application.                         –   Security.
• Binary file, .evt.                       –   Application.
• WindowsSystem32config                 –   Plus 100+ more event log files.
                                           –   Binary/xml format—.evtx.*
• Documented and well known.
                                      • C:WindowsSystem32winevt
                                        Logs
                                      • New, documentation growing.

http://msdn.microsoft.com/en-         http://msdn.microsoft.com/en-
us/library/aa363652(v=VS.85).aspx     us/library/aa385780(v=VS.85).aspx

    *http://computer.forensikblog.de/en/topics/windows/vista_event_log/
Windows Event Logs



  C:WindowsSystem32winevtLogs
Windows Event Logs


What is an event log?
Windows Event Logs
An event log is more than its .evtx file.
• The log displayed in the Event Viewer is a compilation of an .evtx
   file and components of one or more message DLLs.
• The Registry links the .evtx to its message DLLs, which together
   create the complete event log presented by the Event Viewer.




     HKEY_LOCAL_MACHINESYSTEMCurrentControlSetserviceseventlog
From *.evtx to Event Log

                   Registry:
                   HKLMSYSTEMControlSet001serviceseventlog




*.evtx file                                                      MessageFile.dll




                                   Event Viewer
Windows Event Logs
• Impact on forensics?
  – Information in an event log often depends on message
    DLLs.
  – To get the message information, one must have the
    message DLLs available at the time the logs are-
     • Collected; or
     • Read.
  – Security events generally consistent within same
    versions of Windows (message DLLs the same).
  – Application logs pose the biggest risk of incompatible
    or missing message information—as message DLLs
    depend on the installed applications.
Windows Event Logs
• Solutions:
  – Collect logs live, before shutting down a system.
     • For Example:
        – >psloglist.exe -s -x Application > AppEvent.csv
        – >psloglist.exe -s -x System > SysEvent.csv
        – >psloglist.exe -s -x Security > SecEvent.csv
  – Rebuild registry references to message DLLs on
    the analysis workstation.
     • Generally, not necessary unless there are recorded
       events that are important and need to be resolved with
       their corresponding message DLLs.
Windows Event Logs
• Configuring the analyst workstation for
  reviewing event logs:
  – Identify the missing message DLLs.
     • Specified by the registry key for the component with
       the incomplete event record.
  – Copy message DLLs to analyst work station.
  – Add registry keys for component to specify
    location of the message DLLs.
Windows Event Logs
• Identify missing message DLLs.
  – Review system registry hive file of the system from
    which the event log file was taken.
Windows Event Logs
• Extract the message DLL(s) from the source
  system and copy to the analyst’s workstation.
  – New location or recreate original path.
Windows Event Logs
• Recreate the registry serviceseventlog key(s) and values on
  the analyst’s workstation so that they point to the copied
  message DLL(s). Include all original values.

HKEY_LOCAL_MACHINESYSTEMControlSet001serviceseventlogApplicationCommunicator




• The Event Viewer should now pull in the expected message
  DLL information when the event log is viewed.
Windows Event Logs
• Event logs in forensic examinations:
  – Rarely a primary source of information.
     • Noisy.
     • Significant events often only stand out when there are dates,
       times, or other items to bring focus to an event.
  – Security events are often not significant.
     • Dependent on the security audit settings.
  – Often evidence of compromise is found in the System
    and Application event logs or one of the new,
    narrowly focused logs.
     • System or application crashes.
     • Errors, warnings, information.
Windows Event Logs



Working with the Windows 7 Event Viewer
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs




 Filtering is much improved in Windows 7.
 Filter the event logs to reduce the noise.
Windows Event Logs




• Start by selecting the event source, as this will populate the other
  choices.
Windows Event Logs




• Next, focus on Task categories—here, selecting logon and logoff.
Windows Event Logs




• Finally, Keywords, here selecting Audit Failure and Audit Success.
Windows Event Logs




   The filtered view.
Windows Event Logs



 And now, the event logs.
Windows Event Logs
• System Events.
      – Logged by Windows and Windows system services,
        and are classified as error, warning, or information.
      – Typical interesting events:
            •   Time Change.
            •   Startup and shutdown.
            •   Services startup, shutdown, failures.
            •   Startups should be logged, but crashes or errors could
                prevent logging of shutdown or termination events.


http://windows.microsoft.com/en-US/windows7/What-information-appears-in-event-logs-Event-Viewer
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
• Application events.
   – Program Events are classified as error, warning, or information, depending on
     the severity of the event. An error is a significant problem, such as loss of
     data. A warning is an event that isn't necessarily significant, but might indicate
     a possible future problem. An information event describes the successful
     operation of a program, driver, or service.
   – Typical interesting events would be those relating to programs that could be
     relevant to an investigation.
        • Application errors.
             – E.g., BackupExec agent attack.
             – Antivirus or malware detection events.
        • Combined with System events, Application events can show that symptoms of suspected
          intrusions or compromises could have been long standing system problems.
   – Note: application logging is controlled by the applications—so events are
     defined by the application developers.
   – Not all application generate events.
Windows Event Logs
Windows Event Logs
Windows Event Logs
• Security events.
   – These events are called audits and are described as successful or failed
     depending on the event, such as whether a user trying to log on to
     Windows was successful.
   – Depend on audit policy.
   – Noisy.
   – Completely different Security event IDs from all versions before Vista.
   – General Tip: Translate pre-Vista Event ID numbers to the new Vista
     event ID numbers by adding 4096.
   – There are a number of new security events.
   – Typical events of interest:
       •   Account logon and logoff.
       •   Failed logon attempts.
       •   Account escalation.
       •   Process execution.
Windows Event Logs




      9 audit categories.
Windows Event Logs
Clicking on an audit category can provide you with an explanation of
what the category audits.
Windows Event Logs




http://www.microsoft.com/downloads/en/details.aspx?FamilyID=3A15B562-4650-4298-9745-D9B261F35814&displaylang=en
Windows Event Logs
Windows Event Logs



         http://support.microsoft.com/kb/977519
Windows Event Logs
Further Information:



 http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx




                       http://blogs.msdn.com/b/ericfitz/
Windows Event Logs




  All those other logs.
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs
Windows Event Logs

•   Emphasis: Usually on Security Events, but other event logs may have more to offer.

•   Event log are not typically the primary evidence.
     –   Often too noisy.

•   Best used when other facts fix times, or implicate specific accounts or computers.

•   Often, most useful in a timeline with other items of significance.
Windows Event Logs

More Related Content

PPTX
Security Information and Event Management (SIEM)
PPTX
Memory forensics.pptx
PPTX
Processing Crimes and Incident Scenes
PDF
QRadar Architecture.pdf
PPT
Lecture2 Introduction to Digital Forensics.ppt
PPTX
Beginner's Guide to SIEM
PPTX
Security operation center (SOC)
PPTX
Network forensics and investigating logs
Security Information and Event Management (SIEM)
Memory forensics.pptx
Processing Crimes and Incident Scenes
QRadar Architecture.pdf
Lecture2 Introduction to Digital Forensics.ppt
Beginner's Guide to SIEM
Security operation center (SOC)
Network forensics and investigating logs

What's hot (20)

PDF
Email Forensics
PPT
Windowsforensics
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
SOAR and SIEM.pptx
PDF
Information Security Risk Management
PPTX
Data Loss Prevention
PPTX
Cyber kill chain
PPTX
Intrusion detection system
PPTX
Incident response process
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Introduction to SIEM.pptx
PPT
Malware forensics
PDF
Ceh v5 module 19 evading ids firewall and honeypot
PDF
Secure Design: Threat Modeling
PDF
CS6004 Cyber Forensics
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Introduction IDS
PPTX
Logging, monitoring and auditing
PDF
Digital forensic principles and procedure
Email Forensics
Windowsforensics
Cybersecurity Attack Vectors: How to Protect Your Organization
SOAR and SIEM.pptx
Information Security Risk Management
Data Loss Prevention
Cyber kill chain
Intrusion detection system
Incident response process
From SIEM to SOC: Crossing the Cybersecurity Chasm
Introduction to SIEM.pptx
Malware forensics
Ceh v5 module 19 evading ids firewall and honeypot
Secure Design: Threat Modeling
CS6004 Cyber Forensics
Cybersecurity 1. intro to cybersecurity
Introduction IDS
Logging, monitoring and auditing
Digital forensic principles and procedure
Ad

Viewers also liked (20)

PDF
Forensics of a Windows System
PDF
Windows 8.x Forensics 1.0
PDF
Windows 7 forensics -overview-r3
PPTX
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
PPT
Registry forensics
PPTX
Windows 7 forensics jump lists-rv3-public
PPT
Installation of Joomla on Windows XP
PDF
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
PPT
File system
PDF
Become an Internet Sleuth!
PPT
Raidprep
PPTX
Open Source Forensics
PDF
Windows logging cheat sheet
PDF
Sadfe2007
PPTX
Windows 8 Forensics & Anti Forensics
PDF
Sleuth kit by echavarro - HABEMUSHACKING
PPTX
Msra 2011 windows7 forensics-troyla
PPT
Translating Geek To Attorneys It Security
PPT
Mac Forensics
Forensics of a Windows System
Windows 8.x Forensics 1.0
Windows 7 forensics -overview-r3
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Registry forensics
Windows 7 forensics jump lists-rv3-public
Installation of Joomla on Windows XP
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Windows 10 Forensics: OS Evidentiary Artefacts
File system
Become an Internet Sleuth!
Raidprep
Open Source Forensics
Windows logging cheat sheet
Sadfe2007
Windows 8 Forensics & Anti Forensics
Sleuth kit by echavarro - HABEMUSHACKING
Msra 2011 windows7 forensics-troyla
Translating Geek To Attorneys It Security
Mac Forensics
Ad

Similar to Windows 7 forensics event logs-dtl-r3 (20)

PDF
williams-wwhf-20210617-eventlogs.pdf
PPTX
LDAP-prepare.pptx
PPTX
LDAP-prepare.pptx
PDF
File000138
PPTX
First Responders Course - Session 6 - Detection Systems [2004]
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PPTX
EventLog Analyzer - Product overview
PDF
ISACA -Threat Hunting using Native Windows tools .pdf
PDF
Windows Threat Hunting
PPTX
Windows 7 Application Compatibility
ODT
Operating System Forensics
PDF
This project is broken up into Windows and Mac versions lis.pdf
PPT
Intrusion Discovery on Windows
PDF
MNSEC 2018 - Windows forensics
PDF
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
PDF
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
PPTX
Spug pt session2 - debuggingl
PDF
Note This project is broken up into Windows and Mac version.pdf
PDF
Vulnerability and Patch Management
PDF
Top 10 Tricks and Tools of an Oracle EPM Administrator
williams-wwhf-20210617-eventlogs.pdf
LDAP-prepare.pptx
LDAP-prepare.pptx
File000138
First Responders Course - Session 6 - Detection Systems [2004]
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
EventLog Analyzer - Product overview
ISACA -Threat Hunting using Native Windows tools .pdf
Windows Threat Hunting
Windows 7 Application Compatibility
Operating System Forensics
This project is broken up into Windows and Mac versions lis.pdf
Intrusion Discovery on Windows
MNSEC 2018 - Windows forensics
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Spug pt session2 - debuggingl
Note This project is broken up into Windows and Mac version.pdf
Vulnerability and Patch Management
Top 10 Tricks and Tools of an Oracle EPM Administrator

More from CTIN (20)

PPTX
Mounting virtual hard drives
PDF
Encase V7 Presented by Guidance Software august 2011
PPTX
Windows 7 forensics thumbnail-dtl-r4
PPTX
Time Stamp Analysis of Windows Systems
PPT
Vista Forensics
PPT
Nra
PPT
Live Forensics
PPT
Edrm
PPT
Computer Searchs, Electronic Communication, Computer Trespass
PPT
CyberCrime
PPT
Search Warrants
PPT
Part6 Private Sector Concerns
PPT
Networking Overview
PPT
M Compevid
PPT
L Scope
PPT
Level1 Part8 End Of The Day
PPT
Law Enforcement Role In Computing
PPT
Level1 Part7 Basic Investigations
PPT
K Ai
PPT
July132000
Mounting virtual hard drives
Encase V7 Presented by Guidance Software august 2011
Windows 7 forensics thumbnail-dtl-r4
Time Stamp Analysis of Windows Systems
Vista Forensics
Nra
Live Forensics
Edrm
Computer Searchs, Electronic Communication, Computer Trespass
CyberCrime
Search Warrants
Part6 Private Sector Concerns
Networking Overview
M Compevid
L Scope
Level1 Part8 End Of The Day
Law Enforcement Role In Computing
Level1 Part7 Basic Investigations
K Ai
July132000

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Windows 7 forensics event logs-dtl-r3

  • 1. Digital Forensics and Windows 7 Event Logs Troy Larson Principal Forensics Program Manager TWC Network Security Investigations NSINV-R3– Research|Readiness|Response
  • 2. Introduction Vista/Windows 7 Event Logging: • New format *.evtx. • More, many more, event log files. • New system for collecting and displaying events. • New security event numbering.
  • 3. Windows Event Logs Before Vista—Event Log. Vista to present—Windows Event • The big three: Log. – System. • The big three: – Security. – System. – Application. – Security. • Binary file, .evt. – Application. • WindowsSystem32config – Plus 100+ more event log files. – Binary/xml format—.evtx.* • Documented and well known. • C:WindowsSystem32winevt Logs • New, documentation growing. http://msdn.microsoft.com/en- http://msdn.microsoft.com/en- us/library/aa363652(v=VS.85).aspx us/library/aa385780(v=VS.85).aspx *http://computer.forensikblog.de/en/topics/windows/vista_event_log/
  • 4. Windows Event Logs C:WindowsSystem32winevtLogs
  • 5. Windows Event Logs What is an event log?
  • 6. Windows Event Logs An event log is more than its .evtx file. • The log displayed in the Event Viewer is a compilation of an .evtx file and components of one or more message DLLs. • The Registry links the .evtx to its message DLLs, which together create the complete event log presented by the Event Viewer. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetserviceseventlog
  • 7. From *.evtx to Event Log Registry: HKLMSYSTEMControlSet001serviceseventlog *.evtx file MessageFile.dll Event Viewer
  • 8. Windows Event Logs • Impact on forensics? – Information in an event log often depends on message DLLs. – To get the message information, one must have the message DLLs available at the time the logs are- • Collected; or • Read. – Security events generally consistent within same versions of Windows (message DLLs the same). – Application logs pose the biggest risk of incompatible or missing message information—as message DLLs depend on the installed applications.
  • 9. Windows Event Logs • Solutions: – Collect logs live, before shutting down a system. • For Example: – >psloglist.exe -s -x Application > AppEvent.csv – >psloglist.exe -s -x System > SysEvent.csv – >psloglist.exe -s -x Security > SecEvent.csv – Rebuild registry references to message DLLs on the analysis workstation. • Generally, not necessary unless there are recorded events that are important and need to be resolved with their corresponding message DLLs.
  • 10. Windows Event Logs • Configuring the analyst workstation for reviewing event logs: – Identify the missing message DLLs. • Specified by the registry key for the component with the incomplete event record. – Copy message DLLs to analyst work station. – Add registry keys for component to specify location of the message DLLs.
  • 11. Windows Event Logs • Identify missing message DLLs. – Review system registry hive file of the system from which the event log file was taken.
  • 12. Windows Event Logs • Extract the message DLL(s) from the source system and copy to the analyst’s workstation. – New location or recreate original path.
  • 13. Windows Event Logs • Recreate the registry serviceseventlog key(s) and values on the analyst’s workstation so that they point to the copied message DLL(s). Include all original values. HKEY_LOCAL_MACHINESYSTEMControlSet001serviceseventlogApplicationCommunicator • The Event Viewer should now pull in the expected message DLL information when the event log is viewed.
  • 14. Windows Event Logs • Event logs in forensic examinations: – Rarely a primary source of information. • Noisy. • Significant events often only stand out when there are dates, times, or other items to bring focus to an event. – Security events are often not significant. • Dependent on the security audit settings. – Often evidence of compromise is found in the System and Application event logs or one of the new, narrowly focused logs. • System or application crashes. • Errors, warnings, information.
  • 15. Windows Event Logs Working with the Windows 7 Event Viewer
  • 19. Windows Event Logs Filtering is much improved in Windows 7. Filter the event logs to reduce the noise.
  • 20. Windows Event Logs • Start by selecting the event source, as this will populate the other choices.
  • 21. Windows Event Logs • Next, focus on Task categories—here, selecting logon and logoff.
  • 22. Windows Event Logs • Finally, Keywords, here selecting Audit Failure and Audit Success.
  • 23. Windows Event Logs The filtered view.
  • 24. Windows Event Logs And now, the event logs.
  • 25. Windows Event Logs • System Events. – Logged by Windows and Windows system services, and are classified as error, warning, or information. – Typical interesting events: • Time Change. • Startup and shutdown. • Services startup, shutdown, failures. • Startups should be logged, but crashes or errors could prevent logging of shutdown or termination events. http://windows.microsoft.com/en-US/windows7/What-information-appears-in-event-logs-Event-Viewer
  • 29. Windows Event Logs • Application events. – Program Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service. – Typical interesting events would be those relating to programs that could be relevant to an investigation. • Application errors. – E.g., BackupExec agent attack. – Antivirus or malware detection events. • Combined with System events, Application events can show that symptoms of suspected intrusions or compromises could have been long standing system problems. – Note: application logging is controlled by the applications—so events are defined by the application developers. – Not all application generate events.
  • 32. Windows Event Logs • Security events. – These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful. – Depend on audit policy. – Noisy. – Completely different Security event IDs from all versions before Vista. – General Tip: Translate pre-Vista Event ID numbers to the new Vista event ID numbers by adding 4096. – There are a number of new security events. – Typical events of interest: • Account logon and logoff. • Failed logon attempts. • Account escalation. • Process execution.
  • 33. Windows Event Logs 9 audit categories.
  • 34. Windows Event Logs Clicking on an audit category can provide you with an explanation of what the category audits.
  • 37. Windows Event Logs http://support.microsoft.com/kb/977519
  • 38. Windows Event Logs Further Information: http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx http://blogs.msdn.com/b/ericfitz/
  • 39. Windows Event Logs All those other logs.
  • 48. Windows Event Logs • Emphasis: Usually on Security Events, but other event logs may have more to offer. • Event log are not typically the primary evidence. – Often too noisy. • Best used when other facts fix times, or implicate specific accounts or computers. • Often, most useful in a timeline with other items of significance.