Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Policy Change->Other Policy Change Events->EventID 5447 - A Windows Filtering Platform filter has been changed.
EventID 5447 - A Windows Filtering Platform filter has been changed.

Find more information about this event on ultimatewindowssecurity.com.
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/27/2009 9:53:52 PM
Event ID:      5447
Task Category: Other Policy Change Events
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      dcc1.Logistics.corp
Description:   
A Windows Filtering Platform filter has been changed.
	
Subject:
	Security ID:		S-1-5-19
	Account Name:		NT AUTHORITY\LOCAL SERVICE
Process Information:
	Process ID:	1324
Provider Information:
	ID:		{4B153735-1049-4480-AAB4-D1B9BDC03710}
	Name:		Windows Firewall
Change Information:
	Change Type:	Add
Filter Information:
	ID:		{F81CF288-ECF7-42BF-995D-20FA26BB9404}
	Name:		Allow RPC/TCP traffic to EventLog
	Type:		Not persistent
	Run-Time ID:	65639
Layer Information:
	ID:		{E1CD9FE7-F4B5-4273-96C0-592E487B8650}
	Name:		ALE Receive/Accept v4 Layer
	Run-Time ID:	44
Callout Information:
	ID:		{00000000-0000-0000-0000-000000000000}
	Name:		-
Additional Information:
	Weight:	123172129079296	
	Conditions:	
	Condition ID:	{d78e1e87-8644-4ea5-9437-d809ecefc971}
	Match value:	Equal to
	Condition value:	
    00000000  5c 00 64 00 65 00 76 00-69 00 63 00 65 00 5c 00  \.d.e.v.i.c.e.\.
    00000010  68 00 61 00 72 00 64 00-64 00 69 00 73 00 6b 00  h.a.r.d.d.i.s.k.
    00000020  76 00 6f 00 6c 00 75 00-6d 00 65 00 31 00 5c 00  v.o.l.u.m.e.1.\.
    00000030  77 00 69 00 6e 00 64 00-6f 00 77 00 73 00 5c 00  w.i.n.d.o.w.s.\.
    00000040  73 00 79 00 73 00 74 00-65 00 6d 00 33 00 32 00  s.y.s.t.e.m.3.2.
    00000050  5c 00 73 00 76 00 63 00-68 00 6f 00 73 00 74 00  \.s.v.c.h.o.s.t.
    00000060  2e 00 65 00 78 00 65 00-00 00                    ..e.x.e...


	Condition ID:	{af043a0a-b34d-4f86-979c-c90371af6e66}
	Match value:	Equal to
	Condition value:	
O:SYG:SYD:(A;;CCRC;;;S-1-5-80-880578595-1860270145-482643319-2788375705-1540778122)


	Condition ID:	{b9f4e088-cb98-4efb-a2c7-ad07332643db}
	Match value:	Equal to
	Condition value:	0x00000001

	Condition ID:	{3971ef2b-623e-4f9a-8cb1-6e79b806b9a7}
	Match value:	Equal to
	Condition value:	0x06

	Filter Action:	Permit
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Policy Change
Source Microsoft-Windows-Security-Auditing
TaskCategory Other Policy Change Events
EventId 5447
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom -
Object Type -
Class Name -
Security ID -
Account Name -
Account Domain -
Subject: Security ID InsertionString2 S-1-5-19
Subject: Account Name InsertionString3 NT AUTHORITY\LOCAL SERVICE
Process Information: Process ID InsertionString1 1324
Provider Information: ID InsertionString4 {4B153735-1049-4480-AAB4-D1B9BDC03710}
Provider Information: Name InsertionString5 Windows Firewall
Change Information: Change Type InsertionString6 Add
Filter Information: ID InsertionString7 {F81CF288-ECF7-42BF-995D-20FA26BB9404}
Filter Information: Name InsertionString8 Allow RPC/TCP traffic to EventLog
Filter Information: Type InsertionString9 Not persistent
Filter Information: Run-Time ID InsertionString10 65639
Layer Information: ID InsertionString11 {E1CD9FE7-F4B5-4273-96C0-592E487B8650}
Layer Information: Name InsertionString12 ALE Receive/Accept v4 Layer
Layer Information: Run-Time ID InsertionString13 44
Callout Information: ID InsertionString17 {00000000-0000-0000-0000-000000000000}
Callout Information: Name InsertionString18 -
Additional Information: Weight InsertionString14 123172129079296
Additional Information: Conditions InsertionString15
Additional Information: Filter Action InsertionString16 Permit
Comments
You must be logged in to comment