Hub
Endpoint

Windows Security Event Log

The Security channel of Windows Event Log — logon/logoff sessions, process creation, privilege escalation, account management, and audit policy changes from a 120-host Active Directory fleet.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/windows-security/generator.yml \
  --id winlog \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
4688Process Creation~25%process
4689Process Termination~25%process
4624Successful Logon~15%authentication
4634Logoff~14%authentication
4672Special Privileges Assigned~10%iam
4625Failed Logon~5%authentication
4648Explicit Credential Logon~3%authentication
4697Service Installedrareiam, configuration
4720User Account Createdrareiam
4726User Account Deletedrareiam
4732Member Added to Local Grouprareiam
1102Audit Log Clearedrareiam

Realism Features

  • Weighted event distribution matching production Windows Server / Domain Controller traffic
  • Correlated sessions — logon (4624) creates sessions consumed by logoff (4634)
  • Correlated processes — creation (4688) tracked through termination (4689)
  • Realistic logon types — Network (55%), Service (20%), RDP (8%), Interactive (5%)
  • 120-host fleet — each event is attributed to a random host from a pool of domain controllers, servers, and workstations
  • Per-host record IDs — sequential winlog.record_id scoped per hostname

Sample Output

{
    "@timestamp": "2026-02-21T12:00:01.234567+00:00",
    "event": {
        "action": "logged-in",
        "category": ["authentication"],
        "code": "4624",
        "kind": "event",
        "outcome": "success"
    },
    "user": {
        "domain": "CONTOSO",
        "id": "S-1-5-21-3457937927-2839227994-823803824-1234",
        "name": "jsmith"
    },
    "source": {
        "ip": "192.168.0.42",
        "port": 52431
    },
    "winlog": {
        "channel": "Security",
        "event_data": {
            "AuthenticationPackageName": "NTLM",
            "LogonType": "3",
            "TargetUserName": "jsmith"
        },
        "event_id": "4624",
        "keywords": ["Audit Success"],
        "logon": { "type": "Network" },
        "record_id": "1"
    }
}

Parameters

ParameterDefaultDescription
domainCONTOSOActive Directory domain (NetBIOS name)
fqdn_suffixcontoso.localFQDN suffix appended to hostname
domain_sidS-1-5-21-3457937927-...Domain SID prefix for user SIDs
agent_version8.17.0Winlogbeat version string

Related Generators