Additional Microsoft Defender tools and services that provide security across various platforms and environments
Below is a list of some classified events IDs
Authentication & Logon Events
- 4625 – Failed logon (brute-force, password guessing)
- 4649 – Replay attack detected
Account Management
- 4732 – Member added to a security-enabled local group
- 4740 – Account locked out
System Integrity & Audit Policy
- 1102 – Audit log cleared
- 4719 – System audit policy changed
- 4616 – System time changed (can be used to hide activity)
Object Access & Privilege Use
- 4660 – Object deleted
- 4674 – Operation attempted on a privileged object
Process & Script Monitoring
- 4104 – PowerShell script block logging Additional Information: Appendix L: Events to monitor
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.