Event Details
Operating System->Microsoft Windows->Application logs->Sysinternals->Microsoft-Windows-Sysmon/Operational->EventID 20 - WmiEventConsumer activity detected
EventID 20 - WmiEventConsumer activity detected
 Sample:
WmiEventConsumer activity detected:
    RuleName: %1!s!
    EventType: %2!s!
    UtcTime: %3!s!
    Operation: %4!s!
    User: %5!s!
    Name: %6!s!
    Type: %7!s!
    Destination: %8!s!
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Microsoft-Windows-Sysmon/Operational
Filtering Field Equals to Value
EventId 20
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Activity Type InsertionString2
Operation InsertionString4
User Name InsertionString5
Destination InsertionString8
Comments
You must be logged in to comment