A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why

If you’ve been doing digital forensics, detection engineering, or threat hunting for some time, you already know how essential Windows event logs are for spotting malicious activities. Although Windows’ default logging has improved over the years, it still falls short of delivering the depth of visibility needed to catch sophisticated threats. That’s where Windows Advanced Audit Policies come into play. It offers additional, high-value events that are crucial for detection and hunting. Unfortunately, due to the complexity of Windows, knowing precisely which audit subcategories to enable, while factoring in information such as log volume, event criticality, and whether a particular subcategory justifies the added overhead, can be challenging.

In this blog, we’ll reduce some of that complexity by taking a data-driven look at which subcategories deliver the best coverage. We’ll explore which events are most valuable, helping you make more informed decisions about how to configure your audit policy and maximize visibility without drowning in logs.

Windows Audit Policy: A Primer

If you’ve spent some time working in Windows administration or security, you’re probably already familiar with Windows Audit Policy. Still, let’s do a quick recap to refresh some minds and bring everyone else up to speed.

Windows Audit Policy is the built-in control mechanism for logging security events on a system. It allows administrators to fine-tune what gets recorded, expanding beyond default logs to capture critical activities like user logons, file access, process creation, and handle requests. These events, among other things, help security teams detect malicious activity and investigate incidents after the fact.

In practice, the audit policy can be configured from two different locations, as shown in the image below:


Figure 1: Windows Audit Policy Configuration Page

More details are available at Microsoft documentation, our focus in this publication will be on the “Advanced Audit Policy.”

Advanced Audit Policy Categories and Sub-Categories

Windows “Advanced Audit Policy” consists of nine major categories, each containing a set of subcategories that provide more granular control over what gets logged. This Microsoft documentation provides a great breakdown of each one, that I highly suggest you check out.

Each of these subcategories generates specific events based on the configured audit policy (“Success” or “Failure”). With over 400 Event IDs spread across all categories, keeping track of which category generates which event can be tricky.

To make things easier, the Splunk Threat Research Team has compiled a comprehensive spreadsheet mapping every Event ID to its respective category and subcategory. We’ll be referencing this throughout the rest of this publication to help you navigate Windows auditing more effectively.

Now that we have an overview of Windows Advanced Audit Policy, let’s talk about the challenges that come with configuring it. While having granular control over event logging is powerful, it also introduces complexity—figuring out what to enable, managing log volume, and ensuring you capture the right events without overwhelming your system or SIEM. Let’s dive into some of the key hurdles you might face when setting up an effective audit policy.

The Challenge: Managing Log Volume, Relevance and Coverage

Why not just enable all these audit categories and sub-categories? Well, you’d end up generating an enormous volume of events, many of which might be irrelevant to your specific security goals. Large log volumes can bog down your SIEM (like Splunk Enterprise Security), overwhelm your analysts, and rack up unnecessary storage costs.

This brings up some critical questions:

To answer these questions, let us take a look at the research approach we’ve taken.

STRT Research Approach

We wanted to take a data driven approach to this research project, so we aimed to collect as much accurate information as possible. We focused on the following categories:

Audit Policy Recommendations

For overall Policy recommendations, we performed an extensive review of Microsoft’s official recommendations and various industry and trusted third party guidelines, including but not limited to:

Our aim was to identify differences across these recommendations and gain insights into which audit settings are consistently enabled, prioritized, which ones vary, and where potential gaps might exist. This helps us build a clearer picture of what should be enabled for effective detection and security monitoring.

Event Volume Data

For event volume data, we relied on Microsoft’s official documentation along with insights from trusted third-party sources, including but not limited to:

Event volume data is relatively scarce and differs depending on configured SACLs, installed roles and features, but we leveraged what was available and incorporated it into our overall analysis to better understand the impact of enabling specific audit policies.

Setup / Implementation Complexity


Figure 2: Monitor the use of removable storage devices - MSDN

One of the common blockers when configuring an audit policy is the additional configuration required for certain subcategories to generate meaningful events. Simply enabling a subcategory isn’t always enough—some require extra policy adjustments, registry changes, or even system reboots. Here are a few examples:

MITRE ATT&CK Events to Techniques Mapping


Figure 3: MITRE ATT&CK - Data Sources

One of the major goals of this research project was to factor in ATT&CK data into our audit policy recommendations. As one of the most adopted frameworks in cybersecurity and detection specifically, ATT&CK provides us with a structured way to map documented adversary TTPs with Windows event logs. By aligning Event IDs with ATT&CK techniques we can start prioritizing specific events or sub-categories depending on our needs.

To achieve this, we leveraged multiple sources of ATT&CK-aligned data, including, but not limited to:

Additionally, since the ATT&CK framework is widely used in threat intelligence reports as a standard mapping mechanism, we can leverage these reports to identify which techniques are most frequently exploited by threat actors. Fortunately our colleagues at SURGe, did most of the heavy lifting with their Macro-ATT&CK research, where they compiled macro-level cyber incident data from open-source reporting (Red Canary, CISA, Mandiant’s M-Trends and The Center for Threat Informed Defense (CTID) Sightings Ecosystem project) covering a span of five years.

This combination of ATT&CK mappings and real-world frequency data gave us a more grounded way to prioritize events and subcategories.

Event Usage in Open Source Detections and Public Recommendations

Figure 4: Splunk Research Website - research.splunk.com

Another key data point we wanted to capture was the real-world usage of Windows event logs from different audit policy subcategories in open-source detection rules. To do this, we analyzed three major open-source detection projects:

The goal was to understand which Windows events are actively used in practice. By identifying which event IDs are referenced often in these rulesets, we could use this as an additional data point to help prioritize audit policy recommendations.

Key Takeaways

As one might expect, there’s no one-size-fits-all approach to configuring an advanced audit policy, it ultimately depends on your specific security needs, infrastructure, and priorities. However, by following the approach laid out in the previous section, we’ve identified some key takeaways that can help guide your decision-making:

The “Obvious” Winner: Event ID 4688 / Detailed Tracking

To no one’s surprise, across almost all metrics we’ve established above, Event ID 4688 from the “Detailed Tracking” sub-category is by far the best bang for your buck.

First from an audit policy configuration point of view, all the recommendations we looked at suggest that you enable auditing for the “Process Creation” category.

In terms of log volume, Event ID 4688 does generate a medium to high number of logs, depending on system activity. While that might sound like a lot, the security benefits far outweigh the storage costs. Here’s why:

So if you walk away from this publication wondering what’s the single most important event to enable, the answer is simple: Event ID 4688. It provides great visibility into system activity, aligns with real-world attack techniques, and serves as the foundation for countless security detections.

Beyond Coverage: ATT&CK Coverage Is Not Enough

Leveraging ATT&CK data from the different sources mentioned in the previous section we can build a table giving us an approximative or theoretically possible coverage of certain techniques and sub-techniques per sub-category.

Keep in mind that ATT&CK is not representative of all possible attacks or attack paths, and saying an event detects X amount of technique is not completely accurate, as implementation of techniques vary and data sources provide different amounts of information. But using this would give a good initial baseline for developing a recommendation and it's an acceptable approximation.

Audit Sub-Category
Number of Techniques/Sub Covered
Process Creation
286
File System
146
Registry
65
Filtering Platform Connection
58
SAM
46
Logon
43
Other Logon/Logoff Events
32
Special Logon
32
Account Lockout
20
Kernel Object
18
Security System Extension
15
Directory Service Changes
13
User Account Management
12
Other Object Access Events
10
Kerberos Authentication Service
7
Kerberos Service Ticket Operations
7
Authentication Policy Change
6
Detailed File Share
5
File Share
5
Directory Service Access
3
MPSSVC Rule-Level Policy Change
3
Other System Events
3
Process Termination
3

At first glance, the table above seems to offer a straightforward solution to configuring an optimal audit policy—just enable the subcategories with the highest MITRE ATT&CK coverage, and you’re set. Unfortunately, it’s not that simple.

While ATT&CK coverage is a great starting point, it doesn’t tell the full story. A high number of mapped techniques doesn’t always translate to high detection value, and enabling everything indiscriminately can introduce unnecessary complexity, noise, and performance overhead.

Hence, additional factors need to be considered.

Complexity of Implementation

As was stated in the research approach section, not all audit subcategories are created equal. Some are straightforward to enable, while others require additional configuration (e.g., registry changes, SACL setups, role installation, or reboots) to generate the corresponding events.

Let’s take a look at a slice from the our data to illustrate this:

Audit Sub-Category
Additional Requirements
Complexity Level
Application Group Management
In order for this sub-category to generate events the Authorization Manager (AzMan) is required to be installed/enabled
Low/Medium
Process Creation
Requires an additional configuration to enable CommandLine logging
Easy
File System
Requires SACL configuration
High
Registry
Requires SACL configuration
High
Removable Storage
The registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage\HotPlugSecureOpen to be set to 1 and a reboot in order to start logging the removable storage audit events.
Medium

Some of the most powerful subcategories—like File System or Registry auditing—require additional configurations before they can provide meaningful security value. Without these tweaks, enabling them won’t actually log useful data.

Log Volume Considerations

A high event volume isn’t necessarily a bad thing, it depends on the signal-to-noise ratio, and your ability to tune, filter and scope the events. For instance,as we’ve seen with Process Creation EventID 4688, in the previous section, volume does not correlate to usefulness . On the other hand, File System auditing can flood your SIEM with logs that aren’t always useful unless carefully scoped.

Usage in Open-Source Detection Rules

When you’re building custom detections or trying to increase coverage, you will likely be leveraging open source detections. Using this vector will also help showcase how often these audit subcategories are used in open-source detection rules like SigmaHQ, Elastic detections, and Splunk Security Content. If a subcategory is rarely used in public detections, it will decrease the immediate usefulness from a detection engineering perspective, perhaps that it provides low practical value, is too noisy to be effective or simply its not meant to be enabled by a user but to be ingested by a tool like an EDR. Here’s a look at how these subcategories are used in terms of community-driven / open source detections:

Note that these do not indicate that the telemetry generated by those categories is necessarily missing or not collected by that platform. This table represents the rules that make use of specific events generated by a specific category. If at least one of these is used then the category is marked.

Audit Sub-Category
Splunk Security Content
Elastic Detection Rules
Sigma Detection Rules
Credential Validation
X
N/A
X
Kerberos Authentication Service
X
N/A
X
Kerberos Service Ticket Operations
X
N/A
X
Other Account Logon Events
N/A
N/A
N/A
Application Group Management
X
N/A
N/A
Computer Account Management
X
N/A
X
Distribution Group Management
X
N/A
N/A
Other Account Management Events
N/A
N/A
N/A
Security Group Management
X
X
X
User Account Management
X
X
X
DPAPI Activity
N/A
N/A
X
PNP Activity
N/A
N/A
X
Process Creation
X
X
X
Process Termination
N/A
N/A
N/A
RPC Events
N/A
N/A
N/A
Token Right Adjusted
X
X
N/A
Detailed Directory Service Replication
N/A
N/A
N/A
Directory Service Access
X
X
X
Directory Service Changes
X
X
X
Directory Service Replication
N/A
N/A
N/A
Account Lockout
N/A
N/A
N/A
Group Membership
X
N/A
N/A
IPsec Extended Mode
N/A
N/A
N/A
IPsec Main Mode
N/A
N/A
N/A
IPsec Quick Mode
N/A
N/A
N/A
Logoff
N/A
N/A
X
Logon
X
X
X
Network Policy Server
N/A
N/A
N/A
Other Logon/Logoff Events
N/A
N/A
X
Special Logon
X
X
X
User / Device Claims
N/A
N/A
N/A
Application Generated
N/A
N/A
N/A
Central Access Policy Staging
N/A
N/A
N/A
Certification Services
X
N/A
X
Detailed File Share
X
X
X
File Share
X
N/A
X
File System
X
X
X
Filtering Platform Connection
N/A
X
X
Filtering Platform Packet Drop
N/A
X
N/A
Handle Manipulation
N/A
N/A
N/A
Kernel Object
N/A
N/A
X
Other Object Access Events
X
X
X
Registry
X
N/A
X
Removable Storage
N/A
N/A
X
SAM
N/A
N/A
X
Audit Policy Change
X
X
X
Authentication Policy Change
N/A
N/A
X
Authorization Policy Change
X
X
X
Filtering Platform Policy Change
N/A
N/A
X
MPSSVC Rule-Level Policy Change
N/A
N/A
N/A
Other Policy Change Events
N/A
X
Non Sensitive Privilege Use
N/A
N/A
N/A
Other Privilege Use Events
N/A
N/A
N/A
Sensitive Privilege Use
N/A
N/A
X
IPsec Driver
N/A
N/A
Other System Events
N/A
X
X
Security State Change
N/A
N/A
X
Security System Extension
N/A
X
X
System Integrity
N/A
N/A
X

Introducing the Eventlog Compendium

Figure 5: EventLog Compendium Streamlit

To help apply the research shared throughout this post, we built a Streamlit app called Eventlog Compendium. It's designed to assist defenders in building tailored Windows Advanced Audit Policy configurations (among many other things)—without the need to dig through spreadsheets or lengthy documentation.

The goal is to take everything we’ve talked about—MITRE coverage, volume, complexity, and detection rule usage, and make it actionable.

How Does It Work?

We take all the elements discussed in the previous sections and expose them as configurable user inputs within the app.

Figure 6: Audit Policy Output Example

Wait, I Already Have an EDR Solution, Should I Care About This?

The short answer is YES*, albeit the configured audit policy might slightly differ depending on the product you use or the goals you want to achieve. I’ll highlight some common scenarios:

Complementing EDR Solution

Most EDR products collect data using kernel-level drivers or ETW (Event Tracing for Windows) providers. However, they don’t always cover everything. Some solutions enable or recommend enabling certain audit policies to fill in the gaps.

For example:

Check out dedicated vendors documentation for details such as these and the EDR Telemetry Project to get a sense of which telemetry is generated and how.

Digital Forensics and Incident Response Needs

In DFIR scenarios, gaps in telemetry are common. An EDR agent might be misconfigured, disabled, or simply not deployed on the system in question. In those cases, having a properly configured Windows audit policy or a Sysmon agent logging everything locally can make a big difference.

Even if you're not using the logs day-to-day, having them available when you need them—especially for high-value systems—can save time and help recover key parts of the investigation timeline.

In short, if you're relying on your EDR as the only source of truth, you're making an assumption. Audit policy (as well as event logging in general) gives you an opportunity to validate, complement, or backstop that visibility, especially when something breaks.

Conclusion

Configuring a Windows audit policy isn’t just about checking compliance boxes, it’s about enabling the right logs, at the right level, for the right reasons. Through this research, we’ve shown that a data-driven approach, one that factors in MITRE coverage, event volume, detection usage, and implementation complexity, can go a long way in helping teams build smarter, effective and more importantly understandable policies.

Whether you're tuning for detection, preparing for incident response, or complementing an existing EDR setup, having a tailored audit policy gives you better visibility and stronger footing. The Eventlog Compendium app is our way of making that easier. Use it, tweak it, and let it guide your next steps.

Feedback

Any feedback or requests? Feel free to put in an issue on Github and we’ll follow up. Alternatively, join us on the Slack channel #security-research. Follow these instructions If you need an invitation to our Splunk user groups on Slack.

Contributors

We would like to thank Nasreddine Bencherchali for authoring this post and the entire Splunk Threat Research Team for their contributions: Michael Haag, Jose Hernandez, Lou Stella, Bhavin Patel, Rod Soto, Eric McGinnis, Patrick Bareiss, and Teoderick Contreras.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.