Loading date…
LinkedIn Twitter Instagram YouTube WhatsApp

Enable These Windows Logs Right Now to Detect Hidden Cyber Attacks

Enable Every Important Windows Log

How to Enable Every Important Windows Log Using Event Viewer: Full SOC Analyst Guide + Log Locations Cheat Sheet

Most cyberattacks do not start with ransomware.

They start quietly.

A suspicious PowerShell command. A failed login attempt at 3:17 AM. A hidden scheduled task. A malicious USB device. An attacker using Remote Desktop Protocol (RDP) from another country.

In real-world incident response cases, one of the biggest problems SOC analysts face is this:

The required Windows logs were never enabled.

That means investigators cannot trace lateral movement, malware execution, credential theft, persistence mechanisms, or privilege escalation activities. Attackers know this. Many modern threat actors specifically target organizations with weak Windows logging configurations because they understand that “no logs” often means “no evidence.”

Whether you are a SOC analyst, ethical hacker, DFIR investigator, Windows administrator, or cybersecurity student, properly enabling Windows Event Logs is one of the most important defensive steps you can take.

This guide explains how to enable every important Windows security log using Event Viewer, Group Policy, and Audit Policies. You will also get a practical Windows log locations cheat sheet used in real enterprise environments.

Table of Contents

Why Windows Logs Matter in Cybersecurity?

Why Windows Logs Matter in Cybersecurity?

Windows Event Logs are the digital fingerprints of everything happening inside a system.

Every login, failed authentication, PowerShell execution, service creation, malware detection, USB insertion, scheduled task creation, and privilege escalation leaves traces behind.

Attackers rely on organizations ignoring these logs.

During real-world ransomware investigations, analysts commonly discover:

  • PowerShell malware executed without logging enabled
  • RDP brute force attempts never monitored
  • Suspicious service creation events ignored
  • Credential dumping activities not captured
  • Windows Defender logs disabled
  • Firewall logs never configured

Without logs, detection becomes guesswork.

With proper logging enabled, defenders can:

  • Detect lateral movement
  • Identify insider threats
  • Track malware execution
  • Investigate ransomware attacks
  • Detect persistence mechanisms
  • Monitor suspicious PowerShell activity
  • Analyze failed login attempts
  • Build SIEM detections

What is Windows Event Viewer?

What is Windows Event Viewer?

Windows Event Viewer is a built-in Microsoft management console used to view system-generated logs.

It records events from:

  • Windows Security
  • Applications
  • System services
  • PowerShell
  • Microsoft Defender
  • Task Scheduler
  • Windows Firewall
  • Remote Desktop Services
  • Sysmon

To open Event Viewer:

eventvwr.msc

What it does:
Launches the Windows Event Viewer console.

When to use it:
During threat hunting, malware analysis, log investigation, or Windows troubleshooting.

Expected output:
A console containing multiple Windows log categories and event records.

Important Windows Log Categories

Log Type Purpose
Security Logs Authentication, logins, privilege usage
System Logs Driver, service, and OS activity
Application Logs Software crashes and application events
PowerShell Logs Script execution and command activity
Sysmon Logs Advanced endpoint telemetry
Defender Logs Malware detection activity
Firewall Logs Inbound and outbound traffic events
Task Scheduler Logs Persistence and scheduled task abuse
RDP Logs Remote desktop activity

How to Enable Security Logs?

How to Enable Security Logs?

Security logs are critical for monitoring:

  • Successful logins
  • Failed login attempts
  • Privilege escalation
  • Account lockouts
  • Credential abuse

Step 1: Open Local Security Policy

secpol.msc

What it does:
Opens Local Security Policy.

When to use it:
To configure Windows auditing policies.

Expected output:
Local Security Policy management console.

Step 2: Navigate to Audit Policies

Go to:

Security Settings → Advanced Audit Policy Configuration → Audit Policies

Enable These Critical Audit Policies

Audit Policy Recommended Setting
Logon Success + Failure
Account Lockout Success
Process Creation Success
Privilege Use Success + Failure
Policy Change Success + Failure
Account Management Success + Failure
Object Access Success + Failure

How to Enable PowerShell Logging?

How to Enable PowerShell Logging?

Modern attackers love PowerShell because it allows fileless malware execution.

Threat actors use PowerShell for:

  • Credential dumping
  • Payload downloads
  • Lateral movement
  • Persistence
  • Defense evasion

Without PowerShell logging enabled, attackers can execute malicious commands silently.

Enable PowerShell Script Block Logging

Open Group Policy Editor:

gpedit.msc

Navigate to:

Computer Configuration → Administrative Templates → Windows Components → Windows PowerShell

Enable:

  • Turn on PowerShell Script Block Logging
  • Turn on Module Logging
  • Turn on PowerShell Transcription

Important PowerShell Event IDs

Event ID Description
4104 Script block logging
4103 Module logging
600 PowerShell engine startup

How to Enable Sysmon Logs?

How to Enable Sysmon Logs?

Sysmon is one of the most powerful Windows logging tools used by SOC teams and DFIR investigators.

It provides advanced telemetry that normal Windows logs often miss.

Download Sysmon

Download Sysmon from Microsoft Sysinternals.

Install Sysmon

sysmon64.exe -i

What it does:
Installs Sysmon with default configuration.

When to use it:
To enhance Windows endpoint visibility.

Expected output:
Sysmon service installation confirmation.

Important Sysmon Event IDs

Event ID Description
1 Process creation
3 Network connection
7 Image loaded
8 Remote thread creation
10 Process access
11 File creation
13 Registry modification
22 DNS queries

How to Enable RDP and Remote Access Logs?

Enable RDP and Remote Access Logs

RDP remains one of the most abused attack vectors in enterprise breaches.

Attackers often brute-force weak passwords and gain remote access to internal systems.

Enable RDP Logging

Navigate inside Event Viewer:

Applications and Services Logs →
Microsoft →
Windows →
TerminalServices-LocalSessionManager →
Operational

Right-click the log and select:

Enable Log

Critical RDP Event IDs

Event ID Description
4624 Successful login
4625 Failed login
4778 Session reconnected
4779 Session disconnected
1149 RDP authentication success

How to Enable Task Scheduler Logs?

How to Enable Task Scheduler Logs?

Attackers frequently use scheduled tasks for persistence.

Malware families commonly create hidden scheduled tasks to relaunch payloads after reboot.

Enable Task Scheduler Logs

Navigate to:

Applications and Services Logs →
Microsoft →
Windows →
TaskScheduler →
Operational

Enable the operational log.

Important Event IDs

Event ID Description
106 Task registered
140 Task updated
141 Task deleted

How to Enable Microsoft Defender Logs?

How to Enable Microsoft Defender Logs?

Microsoft Defender provides valuable malware telemetry even in environments using third-party antivirus solutions.

Navigate to Defender Logs

Applications and Services Logs →
Microsoft →
Windows →
Windows Defender →
Operational

Enable the log if disabled.

Important Defender Event IDs

Event ID Description
1116 Malware detected
1117 Malware remediation
5007 Configuration changed

How to Enable Windows Firewall Logs?

How to Enable Windows Firewall Logs?

Firewall logs help identify:

  • Suspicious outbound traffic
  • Command-and-control communication
  • Blocked connections
  • Lateral movement attempts

Enable Firewall Logging

Open:

wf.msc

Navigate to:

Windows Defender Firewall →
Properties →
Logging →
Customize

Enable:

  • Log dropped packets
  • Log successful connections

Firewall Log Default Location

C:\Windows\System32\LogFiles\Firewall\pfirewall.log

Windows Log Locations Cheat Sheet

Log Type Location
Security Logs C:\Windows\System32\winevt\Logs\Security.evtx
System Logs C:\Windows\System32\winevt\Logs\System.evtx
Application Logs C:\Windows\System32\winevt\Logs\Application.evtx
PowerShell Logs C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx
Sysmon Logs C:\Windows\System32\winevt\Logs\Microsoft-Windows-Sysmon%4Operational.evtx
Task Scheduler Logs C:\Windows\System32\winevt\Logs\Microsoft-Windows-TaskScheduler%4Operational.evtx
Defender Logs C:\Windows\System32\winevt\Logs\Microsoft-Windows-Windows Defender%4Operational.evtx
RDP Logs C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx
Firewall Logs C:\Windows\System32\LogFiles\Firewall\pfirewall.log

Most Important Windows Event IDs Every SOC Analyst Should Know

Event ID Description
4624 Successful login
4625 Failed login attempt
4672 Special privileges assigned
4688 Process creation
4698 Scheduled task created
7045 New service installed
4104 PowerShell execution
1116 Malware detected
5156 Windows Filtering Platform allowed connection

Expert SOC Analyst Tips

Expert SOC Analyst Tips

1. Increase Log Retention Size

Default Windows log sizes are often too small.

Attackers sometimes generate noise intentionally to overwrite old logs.

Increase log storage capacity in Event Viewer properties.

2. Forward Logs to a SIEM

Never rely only on local logs.

Forward logs to:

  • Splunk
  • Microsoft Sentinel
  • Elastic Stack
  • Graylog
  • QRadar

3. Enable Command Line Logging

Enable process command-line auditing to capture malicious command execution.

4. Monitor PowerShell Aggressively

Most modern Windows malware abuses PowerShell.

PowerShell Event ID 4104 is one of the highest-value logs for threat hunting.

5. Deploy Sysmon Enterprise-Wide

Sysmon dramatically improves endpoint visibility.

Most mature SOC teams use customized Sysmon configurations.

Related Cybersecurity Topics You Should Explore

FAQ

1. Are Windows logs enabled by default?

Some basic logs are enabled by default, but advanced security logging like PowerShell Script Block Logging and Sysmon must be manually configured.

2. What is the most important Windows Event ID?

Event ID 4688 (process creation) and 4104 (PowerShell execution) are extremely valuable for threat detection.

3. Can attackers delete Windows logs?

Yes. Attackers often clear logs using built-in Windows tools to hide evidence.

4. Why is Sysmon important?

Sysmon provides advanced visibility into processes, network activity, registry changes, and persistence techniques.

5. What log is best for ransomware detection?

PowerShell logs, Defender logs, Sysmon logs, and file modification monitoring are highly effective.

6. Where are Windows Event Logs stored?

Most logs are stored inside:

C:\Windows\System32\winevt\Logs\

7. Should small businesses enable advanced logging?

Absolutely. Small businesses are heavily targeted because many lack monitoring and detection capabilities.

Conclusion

Cybersecurity investigations are only as strong as the logs available.

In real-world incidents, defenders rarely say:

“We had too many logs.”

Instead, they usually say:

“We wish logging had been enabled earlier.”

Proper Windows logging transforms a blind environment into a visible one. It allows SOC teams to detect attacks faster, investigate incidents more accurately, and stop attackers before major damage occurs.

If you are serious about Windows security, threat hunting, malware detection, ransomware defense, or incident response, enabling these logs should be one of the first things you do today.

Because in cybersecurity, visibility is survival.

Shubham Chaudhary

Welcome to Xpert4Cyber! I’m a passionate Cyber Security Expert and Ethical Hacker dedicated to empowering individuals, students, and professionals through practical knowledge in cybersecurity, ethical hacking, and digital forensics. With years of hands-on experience in penetration testing, malware analysis, threat hunting, and incident response, I created this platform to simplify complex cyber concepts and make security education accessible. Xpert4Cyber is built on the belief that cyber awareness and technical skills are key to protecting today’s digital world. Whether you’re exploring vulnerability assessments, learning mobile or computer forensics, working on bug bounty challenges, or just starting your cyber journey, this blog provides insights, tools, projects, and guidance. From secure coding to cyber law, from Linux hardening to cloud and IoT security, we cover everything real, relevant, and research-backed. Join the mission to defend, educate, and inspire in cyberspace.

Post a Comment

Previous Post Next Post
×

🤖 Welcome to Xpert4Cyber

Xpert4Cyber shares cybersecurity tutorials, ethical hacking guides, tools, and projects for learners and professionals to explore and grow in the field of cyber defense.

🔒 Join Our Cybersecurity Community on WhatsApp

Get exclusive alerts, tools, and guides from Xpert4Cyber.

Join Now