Views:
Identity Security uses data from Active Directory (on-premises) for identity-related threat detection and identity asset discovery.
The following table lists the Windows event data used by Identity Security for identity-related threat detection.
Category
Event ID
Description
4624
An account was successfully logged on.
4625
An account failed to log on.
4634
An account was logged off.
4672
Special privileges assigned to new logon.
4661
A handle to an object was requested.
4662
An operation was performed on an object.
4720
A user account was created.
4726
A user account was deleted.
4728
A member was added to a security-enabled global group.
4732
A member was added to a security-enabled local group
4769
A Kerberos service ticket was requested.
4776
The computer attempted to validate the credentials for an account.
The following table lists the Active Directory data used by Identity Security for identity asset discovery.

Category
Data
User information
  • Canonical name
  • Username
  • SAM account name
  • User principal name
  • User display name
  • Description
  • Distinguished name
  • Given name
  • Surname
  • Email address
  • Company name
  • Department
  • Job title
  • SID
  • Account enabled
  • Domain
  • Direct parent group
  • All parent groups
  • Usage location
  • Last password change time
Group information
  • Canonical name
  • Description
  • Distinguished name
  • Member
  • SAM account name
  • Display name
  • Email address
  • Direct parent group
  • All parent groups
  • Direct members
  • All members
Computer information
  • Canonical name
  • Distinguished name
  • Country code
  • Display name
  • Description
  • SAM account name
  • DNS host name
  • Bad password time
  • Bad password count
  • Last logon
  • Last logoff
  • Logon count
  • OS
  • Service principal name
  • Direct parent group
  • All parent groups
Event log
  • Timestamp
  • Agent ID
  • System event ID
  • System time created
  • System security
  • System computer
  • IP address
  • IP port
  • Logon type
  • Member SID
  • New UAC value
  • Old UAC value
  • Password last set
  • Primary group ID
  • Privilege list
  • Process ID
  • Process name
  • Service name
  • Service SID
  • Status
  • Sub-status
  • Subject domain name
  • Subject logon ID
  • Subject username
  • Subject user SID
  • Target domain name
  • Target linked logon ID
  • Target logon ID
  • Target SID
  • Target username
  • Target user SID
  • Virtual account
  • Workstation
  • Workstation name