Windows Events — Event ID Reference & Troubleshooting
Windows Event ID 8231 – Microsoft-Windows-Kernel-General: System Time Change Detected
Event ID 8231 fires when Windows detects a system time change, typically during time synchronization, manual adjustments, or hardware clock drift corrections.
Windows Event ID 8230 – WinRM: WS-Management Service Authentication Error
Event ID 8230 indicates a Windows Remote Management (WinRM) authentication failure when clients attempt to connect to the WS-Management service using invalid credentials or unsupported authentication methods.
Windows Event ID 8300 – Microsoft-Windows-Kernel-Power: System Thermal Zone Temperature
Event ID 8300 indicates thermal zone temperature changes in Windows systems. This informational event tracks CPU and system temperature thresholds for thermal management and hardware protection.
Windows Event ID 8224 – Kernel-EventTracing: ETW Session Start Failure
Event ID 8224 indicates an Event Tracing for Windows (ETW) session failed to start, typically due to insufficient system resources, permission issues, or conflicting trace sessions.
Windows Event ID 8216 – Kernel-EventTracing: ETW Session Start Failed
Event ID 8216 indicates that an Event Tracing for Windows (ETW) session failed to start, typically due to insufficient permissions, resource constraints, or provider conflicts in the Windows kernel event tracing subsystem.
Windows Event ID 8197 – Microsoft-Windows-Kernel-General: System Time Change Detected
Event ID 8197 fires when Windows detects a significant system time change, either manual adjustment or automatic synchronization. Critical for security auditing and troubleshooting time-related issues.
Windows Event ID 8194 – DNS Client: DNS Query Response Validation Failure
Event ID 8194 indicates DNS query response validation failures in Windows DNS Client service, typically caused by DNSSEC validation errors or corrupted DNS responses.
Windows Event ID 6006 – EventLog: Event Log Service Stopped
Event ID 6006 indicates the Windows Event Log service has stopped. This informational event fires during normal system shutdown or when the EventLog service is manually stopped.
Windows Event ID 6004 – EventLog: Event Log Service Started
Event ID 6004 indicates the Windows Event Log service has successfully started. This informational event confirms the logging subsystem is operational and ready to record system events.
Windows Event ID 6005 – EventLog: Event Log Service Started
Event ID 6005 indicates the Windows Event Log service has successfully started. This informational event appears in the System log during system boot and service restarts.
Windows Event ID 6003 – EventLog: Event Log Service Started
Event ID 6003 indicates the Windows Event Log service has successfully started. This informational event appears in the System log during boot and confirms the logging subsystem is operational.
Windows Event ID 6000 – EventLog: Event Log Service Started
Event ID 6000 indicates the Windows Event Log service has successfully started. This informational event fires during system boot and confirms the logging subsystem is operational.
Windows Event ID 5615 – Security: Credential Manager Vault Access
Event ID 5615 logs when a user or process accesses the Windows Credential Manager vault to retrieve stored credentials, passwords, or certificates for authentication purposes.
Windows Event ID 5617 – Winlogon: User Logon Session Destroyed
Event ID 5617 indicates that a user logon session has been destroyed by the Windows Logon service, typically occurring during normal user logoff or session termination processes.
Windows Event ID 4113 – Microsoft-Windows-Kernel-General: System Time Changed
Event ID 4113 fires when the Windows system time is changed, either manually by a user or automatically by time synchronization services. Critical for security auditing and compliance tracking.
Windows Event ID 4112 – Kerberos: Kerberos Authentication Service (AS) Started
Event ID 4112 indicates the Kerberos Authentication Service (AS) has successfully started on a domain controller, enabling authentication ticket granting for domain users and services.
Windows Event ID 4111 – Microsoft-Windows-Kernel-Process: Process Creation Auditing Event
Event ID 4111 tracks process creation events in Windows when advanced auditing is enabled. This security-focused event provides detailed information about new processes, including parent process details and command line arguments.
Windows Event ID 4109 – Microsoft-Windows-Wininit: User Logoff Notification
Event ID 4109 records user logoff events initiated by the Windows initialization process, providing audit trail for session termination and system security monitoring.
Windows Event ID 4108 – Microsoft-Windows-Eventlog: Event Log Service Encountered an Error
Event ID 4108 indicates the Windows Event Log service encountered an error while processing event logs, often related to log file corruption, disk space issues, or service configuration problems.
Windows Event ID 4097 – Microsoft-Windows-Kernel-General: System Time Change Detected
Event ID 4097 fires when Windows detects a system time change, either manual or automatic. Critical for security auditing and troubleshooting time synchronization issues.
Windows Event ID 4096 – Microsoft-Windows-Wininit: System Initialization Process Started
Event ID 4096 indicates the Windows initialization process (wininit.exe) has started during system boot. This informational event marks the beginning of critical system service initialization and user session preparation.