Skip to content

Commit f4526bd

Browse files
Merge pull request #313056 from sbreingold-ms/wi-494009-uuf-allsecurity-applocker-events
wi-494009-uuf-allsecurity-applocker-events
2 parents 64ffafa + bfc08e2 commit f4526bd

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/sentinel/windows-security-event-id-reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the pre-built sets of Windows security events that you
44
author: guywi-ms
55
ms.author: guywild
66
ms.topic: reference
7-
ms.date: 11/09/2021
7+
ms.date: 03/12/2026
88

99
#Customer intent: As a security analyst, I want to select specific sets of Windows security events to ingest into Microsoft Sentinel, so that I can efficiently monitor and detect potential threats while managing data volume.
1010

@@ -14,7 +14,7 @@ ms.date: 11/09/2021
1414

1515
When ingesting security events from Windows devices using the [Windows Security Events data connector](data-connectors-reference.md#windows-security-events-via-ama) (including the legacy version), you can choose which events to collect from among the following sets:
1616

17-
- **All events** - All Windows security and AppLocker events.
17+
- **All events** - Collects the full, unfiltered set of events from the Windows Security event log and the AppLocker event log channels. The Security log (`Windows Logs > Security` in Event Viewer) records auditing events such as logons, privilege use, and policy changes. The AppLocker logs (`Application and Services Logs > Microsoft > Windows > AppLocker`) cover application execution and installation policies. This set does *not* include events from other Windows event logs such as Application, System, or Setup.
1818

1919
- **Common** - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, it contains both user sign-in and user sign-out events (event IDs 4624, 4634). There are also auditing actions such as security group changes, key domain controller Kerberos operations, and other types of events in line with accepted best practices.
2020

@@ -38,5 +38,5 @@ The following list provides a complete breakdown of the Security and App Locker
3838

3939
In this document, you learned how to filter the collection of Windows events into Microsoft Sentinel.
4040

41-
- Learn more about [collecting Windows security events](connect-windows-security-events.md).
41+
- Learn more about [collecting Windows security events](connect-services-windows-based.md).
4242
- Get started detecting threats with Microsoft Sentinel, using [built-in](detect-threats-built-in.md) or [custom](detect-threats-custom.md) rules.

0 commit comments

Comments
 (0)