Hello
Event ID 5038 indicates that the image hash of a file is not valid, which can be due to unauthorized modification or a potential disk device error. Given that the flagged file is associated with Crowdstrike, it does seem logical to consider it a Crowdstrike issue. Here's a summary of the issues and some potential steps you could take:
Summary of Issues:
- Event ID 5038:Thousands of security log entries daily, filling up the log and preventing user logins.
- Crowdstrike's Response:Crowdstrike is pointing to Microsoft, suggesting these logs can be ignored but filling up the log file becomes a problem.
- Microsoft Case:Crowdstrike provided a Microsoft ticket number but you lack a Microsoft Technical Account Manager (TAM) or escalation engineer to contact directly.
- Specific File:The file
\Device\HarddiskVolume3\Windows\System32\ScriptControl64_15908.dll
is being flagged, which appears to be related to Crowdstrike.
Potential Steps:
- Temporary Workaround (Increasing Log Size):
- Increase Log Size:Temporarily increase the maximum size of the Security Event Log to prevent it from filling up too quickly. This is a stop-gap measure but might give you some breathing room.
- Open Event Viewer.
- Right-click "Security" log and select "Properties."
- Increase the log size.
- Automate Log Clearance:
- Script: Set up a scheduled task using a script to clear the security logs at regular intervals.
- Example script:
```powershell
wevtutil clear-log Security
```
- Ensure this complies with your organization's log retention policies.
- Reduce Logging for Specific IDs:
- Audit Policy:If appropriate, adjust the security audit policy to reduce logging for specific event IDs.
- Group Policy Editor: Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies
- Contact Microsoft Support:
- Even without a Microsoft TAM, you can still open a support case with Microsoft. Provide the referenced ticket number.
- Microsoft Support:You can open a support case via the Microsoft support website or through your Microsoft 365 admin portal if applicable.
- Re-engage Crowdstrike:
- Provide detailed logs and emphasize the operational impact (users unable to log in).
- Request escalation within Crowdstrike for further assistance.
- If they maintain it's a Microsoft issue due to the flagged file, push for more specific evidence or an official statement.
- Check for Updates:
- Ensure you are running the latest versions of both Windows and Crowdstrike Falcon sensors, as updates may contain fixes for such issues.
Long-term Solutions:
- Unified Logging Strategy:Work on a longer-term solution for unified logging, perhaps involving SIEM solutions.
- Security Log Management:Implement centralized logging solutions to better handle large volumes of security events without impacting the workstation's log file size.
Final Note:
Given that the flagged file is associated with Crowdstrike, it indeed seems logical that Crowdstrike should take a more active role in resolving this issue.