Microsoft

LogZilla App Store application: Microsoft

Overview

Microsoft Windows produces log events from various services and programs but does not natively support forwarding events to external log collectors. The LogZilla Windows Event Forwarder reads local Windows events and forwards them to LogZilla in JSON format.

Prerequisites

Required: The LogZilla Windows Event Forwarder must be installed on each Windows system. Without the agent, no Windows events will be forwarded to LogZilla.

App Function

Windows events forwarded by the LogZilla Windows Event Forwarder are processed to extract security-relevant metadata including:

  • Event IDs and descriptions
  • Usernames and domain information
  • Source IP addresses
  • MITRE ATT&CK technique mappings
  • Process creation details for suspicious activity detection

Device Configuration

  1. Download the agent from the LogZilla extras repository
  2. Install the agent on each Windows system to monitor
  3. Configure the agent with the LogZilla server address and ingest token
  4. Select which Event Logs to forward (Security, System, Application, etc.)
  5. Start the LogZilla Windows Event Forwarder service

The agent configuration interface allows selection of specific Event Logs and filtering options.

Vendor Documentation

Parsed Metadata Fields

Tag NameExampleDescription
VendorMicrosoftVendor name for cross-vendor filtering
ProductWindowsProduct name for cross-vendor filtering
Event Classauth, security, systemCross-vendor event classification
Event Typelogin_failureSpecific event type (login_failure, login_success, account_created)
MSWin EventID4625Windows Event ID
MSWin EventLogSecurityWindows Event Log name
MSWin CategoryLogon/LogoffWindows event category
MSWin Sub CategoryLogonWindows event sub-category
CriticalityHigh, Medium, LowEvent criticality level
MSWin DescriptionAn account failed to log onHuman-readable event description
MitreIdT1110MITRE ATT&CK technique ID
MITRE TacticCredential AccessMITRE ATT&CK tactic category
UserjsmithTarget username for auth events
User Domain NameCORPTarget user domain name
SrcIP192.168.1.100Source IP address
MSWin Failed Login UseradminUsername for failed login (4625)
MSWin Failed Login Source Network192.168.1.100Source IP for failed login (4625)
MSWin New ProcessC:\Windows\System32\cmd.exeNew process path (4688)
MSWin Process Argspowershell.exe -enc ...Process arguments (4688)
MSWin Parent ProcessC:\Windows\explorer.exeParent process (4688)
MSWin Suspicious IndicatorEncoded CommandSuspicious activity indicator

MITRE ATT&CK Mapping

The app maps security-relevant Windows events to MITRE ATT&CK techniques:

Event IDTechniqueTacticDescription
4625, 4740, 4776T1110Credential AccessBrute Force
4771, 4768, 4769T1558Credential AccessKerberos Tickets
4720T1136.001PersistenceCreate Account
7045, 4697T1543.003PersistenceWindows Service
4672, 4728, 4732, 4756T1078Privilege EscalationValid Accounts
1102T1070.001Defense EvasionClear Event Logs
4624T1021Lateral MovementRemote Services
4688 (suspicious)T1059ExecutionCommand Interpreter

Process creation events (4688) are only flagged when suspicious patterns are detected, such as encoded PowerShell commands, LOLBins, or execution from temporary directories.

Triggers

Trigger NameConditionAction
Windows: Suspicious Process Execution4688 with suspicious indicatorAlert
Windows: MITRE ATT&CK ActivityAny event with MitreIdAlert
Windows: Failed Login AttemptEvent ID 4625Alert
Windows: Account Locked OutEvent ID 4740Alert
Windows: Audit Log ClearedEvent ID 1102Alert
Windows: Account CreatedEvent ID 4720Alert
Windows: Account DeletedEvent ID 4726Alert
Windows: Security Group ChangedEvent ID 4728, 4732, 4756Alert
Windows: Special Privileges AssignedEvent ID 4672Alert
Windows: New Service InstalledEvent ID 7045Alert
Windows: Unexpected ShutdownEvent ID 6008Alert

Incoming Log Format

The Windows Syslog Agent converts native Windows events into JSON format for LogZilla processing.

Log Examples

Windows Event Viewer

Windows Event Message

Windows Event Raw Data

Windows Event XML Data

JSON Format (LogZilla Input)

The Windows Agent sends events via HTTP with metadata in extra_fields:

json
{
  "host": "WIN-SERVER01",
  "program": "Microsoft-Windows-Security-Auditing",
  "message": "EventID=\"4625\" EventLog=\"Security\" An account failed to log on",
  "extra_fields": {
    "_source_type": "WindowsAgent",
    "_log_type": "eventlog",
    "event_id": "4625",
    "event_log": "Security",
    "computer": "WIN-SERVER01",
    "event_user_name": "jsmith",
    "event_user_domain": "CORP",
    "SubjectUserSid": "S-1-5-21-1234567890-1234567890-1234567890-1001",
    "SubjectUserName": "WIN-SERVER01$",
    "SubjectDomainName": "CORP",
    "TargetUserName": "jsmith",
    "TargetDomainName": "CORP",
    "WorkstationName": "WORKSTATION01",
    "IpAddress": "192.168.1.100",
    "ProcessName": "C:\\Windows\\System32\\svchost.exe"
  }
}

Standard fields (host, program, message) are at the top level. Event-specific fields are in extra_fields and vary by Event ID.

Microsoft | LogZilla Documentation