Microsoft-eventlog-mindmap
Microsoft-eventlog-mindmap copied to clipboard
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
Microsoft-eventlog-mindmap
Project purpose
Microsoft eventlog mindmap provides a global view of most valuable and security related Windows Event logs, as well as their auditing capacities. It enables defenders to enhance visibility on monitored assets for different purposes:
- Log collection (eg: into a SIEM)
- Threat hunting
- Forensic / DFIR
- Troubleshooting
Active mindmaps
The following mindmaps are currently provided in PDF and PNG formats:
- Windows OS auditing baseline
- Windows Server roles auditing (includes SQL Server and Advanced Threat Analytics)
- Active Directory (ADDS) auditing
- Microsoft Azure auditing
- Exchange Server 2016/2019 auditing
Windows OS event logs
This map provides an overview of the native Event logs shipped in Windows OS. They are classified into different categories (network, security, application,...) and their related auditing settings.

Windows Server roles event logs
This map provides an overview of the different Event logs and auditing capacities provided by Windows Server roles (ADCS, DHCP, DNS, OCSP, IIS, NPS, ADFS, MSSQL, RDS...).

Active Directory event logs
This map provides an overview of the different Event logs and auditing capacities provided by Active Directory (ADDS) role.

Microsoft Azure
This map provides an overview of the different data sources provided in Azure, available via EventHub or API.

Exchange Server 2016/2019 event logs
This map provides an overview of the different data sources provided by Exchange Server.
