Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

unresolvedhost/windows-security-reference

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows Security Events Terminal

A comprehensive lookup tool for Windows Security Audit Events and their field definitions for cybersecurity professionals.

📝 How to Use

1. Basic Search

  • Event ID: Enter a specific Windows Event ID (e.g., 4624 for successful logon)
  • Category: Select from dropdown (System, Logon/Logoff, etc.)
  • Subcategory: Filter by specific subcategory
  • Message Search: Type keywords to search in event descriptions

2. Field-Based Filtering

  • Search Fields: Use the search box to find specific field names
  • Multi-Select: Check multiple fields to find events containing ALL selected fields
  • Quick Actions:
    • select all visible - Select all currently filtered fields
    • clear all - Uncheck all selected fields

3. Query Generation

Each event result includes two query generation buttons:

🔍 Splunk Query

Generates ready-to-use Splunk searches:

EventCode=4624
| table _time, host, SubjectUserSid, SubjectUserName, TargetUserSid, LogonType, _raw

⚡ Elasticsearch Query

Generates Elasticsearch/ELK queries:

| where winlog.event_id == 4624
| keep @timestamp, host.name, winlog.event_data.SubjectUserSid, winlog.event_data.SubjectUserName, message

4. Copy to Clipboard

  • Click any query button to automatically copy to clipboard
  • Visual feedback shows "copied!" confirmation
  • Works in all modern browsers

🔧 Data Setup

Adding Your Event Data

Replace Sample Data: In script.js, locate the loadData() method and replace the sample events:

loadData() {
    try {
        this.events = [
            // Replace this array with your complete JSON data
            {
                "event_id": 4624,
                "category": "Logon/Logoff",
                "subcategory": "Logon",
                "message_summary": "An account was successfully logged on.",
                "field_count": 18,
                "field_names": ["SubjectUserSid", "SubjectUserName", ...],
                "documentation_url": "https://learn.microsoft.com/..."
            }
            // ... more events
        ];

Expected JSON Format

[
  {
    "event_id": 4624,
    "category": "Logon/Logoff", 
    "subcategory": "Logon",
    "message_summary": "An account was successfully logged on.",
    "field_count": 18,
    "field_names": ["SubjectUserSid", "SubjectUserName", "TargetUserSid"],
    "documentation_url": "https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4624"
  }
]

🔍 Search Tips

Advanced Filtering

  • Combine Filters: Use multiple filters together for precise results
  • Field Search: Type partial field names (e.g., "User" finds all user-related fields)
  • Message Keywords: Search descriptions with terms like "logon", "failed", "access"

📚 Resources

Documentation Links

🤝 Contributing

  1. Fork the repository
  2. Add new features or improvements
  3. Test thoroughly across browsers
  4. Submit pull request with clear description

Happy Hunting! 🛡️

Built with ❤️ for the cybersecurity community

Releases

No releases published

Packages

No packages published
Morty Proxy This is a proxified and sanitized view of the page, visit original site.