Skip to content

Commit 6102837

Browse files
authored
Merge pull request #9566 from aczechowski/cz-20240205-brokenlinks
broken links
2 parents 4dc2719 + 6f33371 commit 6102837

File tree

2 files changed

+71
-79
lines changed

2 files changed

+71
-79
lines changed

windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator.md

-11
Original file line numberDiff line numberDiff line change
@@ -98,17 +98,6 @@ To validate a UE-V settings location template with the UE-V template generator:
9898

9999
After you validate the settings location template for an application, you should test the template. Deploy the template in a lab environment before you put it into a production environment in enterprise.
100100

101-
## Next steps
102-
103-
## <a href="" id="share"></a>Share settings location templates with the Template Gallery
104-
105-
Before you share a settings location template on the UE-V template gallery, ensure it doesn't contain any personal or company information. You can use any XML viewer to open and view the contents of a settings location template file. The following template values should be reviewed before you share a template with anyone outside your company.
106-
107-
- Template Author Name - Specify a general, non-identifying name for the template author name or exclude this data from the template.
108-
- Template Author Email - Specify a general, non-identifying template author email or exclude this data from the template.
109-
110-
Before you deploy any settings location template that you've downloaded from the UE-V gallery, you should first test the template to ensure that the application settings synchronize settings correctly in a test environment.
111-
112101
## Related topics
113102

114103
[Administering UE-V](uev-administering-uev.md)

windows/security/threat-protection/auditing/event-4913.md

+71-68
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,19 @@
11
---
2-
title: 4913(S) Central Access Policy on the object was changed.
2+
title: 4913(S) Central Access Policy on the object was changed
33
description: Describes security event 4913(S) Central Access Policy on the object was changed.
44
ms.pagetype: security
55
ms.mktglfcycl: deploy
66
ms.sitesec: library
77
ms.localizationpriority: low
88
author: vinaypamnani-msft
99
ms.date: 09/08/2021
10-
ms.reviewer:
10+
ms.reviewer:
1111
manager: aaroncz
1212
ms.author: vinpa
1313
ms.topic: reference
1414
---
1515

16-
# 4913(S): Central Access Policy on the object was changed.
17-
16+
# 4913(S): Central Access Policy on the object was changed
1817

1918
<img src="images/event-4913.png" alt="Event 4913 illustration" width="648" height="557" hspace="10" align="left" />
2019

@@ -24,44 +23,45 @@ ms.topic: reference
2423

2524
This event generates when a [Central Access Policy](/windows-server/identity/solution-guides/scenario--central-access-policy) on a file system object is changed.
2625

27-
This event always generates, regardless of the objects [SACL](/windows/win32/secauthz/access-control-lists) settings.
26+
This event always generates, regardless of the object's [SACL](/windows/win32/secauthz/access-control-lists) settings.
2827

29-
> **Note**&nbsp;&nbsp;For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
28+
> [!NOTE]
29+
> For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
3030
31-
<br clear="all">
3231

3332
***Event XML:***
34-
```
33+
34+
```xml
3535
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
3636
- <System>
37-
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
38-
<EventID>4913</EventID>
39-
<Version>0</Version>
40-
<Level>0</Level>
41-
<Task>13570</Task>
42-
<Opcode>0</Opcode>
43-
<Keywords>0x8020000000000000</Keywords>
44-
<TimeCreated SystemTime="2015-11-09T23:40:43.118758100Z" />
45-
<EventRecordID>1183666</EventRecordID>
46-
<Correlation />
47-
<Execution ProcessID="516" ThreadID="524" />
48-
<Channel>Security</Channel>
49-
<Computer>DC01.contoso.local</Computer>
50-
<Security />
37+
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
38+
<EventID>4913</EventID>
39+
<Version>0</Version>
40+
<Level>0</Level>
41+
<Task>13570</Task>
42+
<Opcode>0</Opcode>
43+
<Keywords>0x8020000000000000</Keywords>
44+
<TimeCreated SystemTime="2015-11-09T23:40:43.118758100Z" />
45+
<EventRecordID>1183666</EventRecordID>
46+
<Correlation />
47+
<Execution ProcessID="516" ThreadID="524" />
48+
<Channel>Security</Channel>
49+
<Computer>DC01.contoso.local</Computer>
50+
<Security />
5151
</System>
5252
- <EventData>
53-
<Data Name="SubjectUserSid">S-1-5-21-3457937927-2839227994-823803824-1104</Data>
54-
<Data Name="SubjectUserName">dadmin</Data>
55-
<Data Name="SubjectDomainName">CONTOSO</Data>
56-
<Data Name="SubjectLogonId">0x37901</Data>
57-
<Data Name="ObjectServer">Security</Data>
58-
<Data Name="ObjectType">File</Data>
59-
<Data Name="ObjectName">C:\\Audit Files\\HBI Data.txt</Data>
60-
<Data Name="HandleId">0x3d4</Data>
61-
<Data Name="OldSd">S:AI</Data>
62-
<Data Name="NewSd">S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534)</Data>
63-
<Data Name="ProcessId">0x884</Data>
64-
<Data Name="ProcessName">C:\\Windows\\System32\\dllhost.exe</Data>
53+
<Data Name="SubjectUserSid">S-1-5-21-3457937927-2839227994-823803824-1104</Data>
54+
<Data Name="SubjectUserName">dadmin</Data>
55+
<Data Name="SubjectDomainName">CONTOSO</Data>
56+
<Data Name="SubjectLogonId">0x37901</Data>
57+
<Data Name="ObjectServer">Security</Data>
58+
<Data Name="ObjectType">File</Data>
59+
<Data Name="ObjectName">C:\\Audit Files\\HBI Data.txt</Data>
60+
<Data Name="HandleId">0x3d4</Data>
61+
<Data Name="OldSd">S:AI</Data>
62+
<Data Name="NewSd">S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534)</Data>
63+
<Data Name="ProcessId">0x884</Data>
64+
<Data Name="ProcessName">C:\\Windows\\System32\\dllhost.exe</Data>
6565
</EventData>
6666
</Event>
6767
```
@@ -82,25 +82,25 @@ This event always generates, regardless of the object’s [SACL](/windows/win32/
8282
8383
- **Account Name** \[Type = UnicodeString\]**:** the name of the account that changed the Central Access Policy on the object.
8484

85-
- **Account Domain** \[Type = UnicodeString\]**:** subjects domain or computer name. Formats vary, and include the following ones:
85+
- **Account Domain** \[Type = UnicodeString\]**:** subject's domain or computer name. Formats vary, and include the following ones:
8686

8787
- Domain NETBIOS name example: CONTOSO
8888

8989
- Lowercase full domain name: contoso.local
9090

9191
- Uppercase full domain name: CONTOSO.LOCAL
9292

93-
- For some [well-known security principals](/windows/security/identity-protection/access-control/security-identifiers), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is NT AUTHORITY.
93+
- For some [well-known security principals](/windows-server/identity/ad-ds/manage/understand-security-identifiers), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is "NT AUTHORITY".
9494

95-
- For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: Win81.
95+
- For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: "Win81".
9696

97-
- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, [4624](event-4624.md): An account was successfully logged on.
97+
- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, "[4624](event-4624.md): An account was successfully logged on."
9898

9999
**Object**:
100100

101-
- **Object Server** \[Type = UnicodeString\]: has **Security** value for this event.
101+
- **Object Server** \[Type = UnicodeString\]: has "**Security**" value for this event.
102102

103-
- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always **File** for this event.
103+
- **Object Type** \[Type = UnicodeString\]: The type of an object that was accessed during the operation. Always **"File"** for this event.
104104

105105
The following table contains the list of the most common **Object Types**:
106106

@@ -118,7 +118,7 @@ This event always generates, regardless of the object’s [SACL](/windows/win32/
118118

119119
<!-- -->
120120

121-
- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, [4663](event-4663.md)(S): An attempt was made to access an object. This parameter might not be captured in the event, and in that case appears as 0x0.
121+
- **Handle ID** \[Type = Pointer\]: hexadecimal value of a handle to **Object Name**. This field can help you correlate this event with other events that might contain the same Handle ID, for example, "[4663](event-4663.md)(S): An attempt was made to access an object." This parameter might not be captured in the event, and in that case appears as "0x0".
122122

123123
**Process:**
124124

@@ -128,37 +128,38 @@ This event always generates, regardless of the object’s [SACL](/windows/win32/
128128

129129
If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager.
130130

131-
You can also correlate this process ID with a process ID in other events, for example, [4688](event-4688.md): A new process has been created **Process Information\\New Process ID** field.
131+
You can also correlate this process ID with a process ID in other events, for example, "[4688](event-4688.md): A new process has been created" **Process Information\\New Process ID** field.
132132

133133
- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process.
134134

135135
**Central Policy ID:**
136136

137137
- **Original Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the old Central Policy ID (for the policy that was formerly applied to the object).
138138

139-
SDDL contains Central Access Policy SID, here's an example: S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534), Central Access Policy SID here is **S-1-17-1442530252-1178042555-1247349694-2318402534**. To resolve this SID to the real Central Access Policy name, you need to do the following steps:
139+
SDDL contains Central Access Policy SID, here's an example: S:ARAI(SP;ID;;;;S-1-17-1442530252-1178042555-1247349694-2318402534), Central Access Policy SID here is "**S-1-17-1442530252-1178042555-1247349694-2318402534**". To resolve this SID to the real Central Access Policy name, you need to do the following steps:
140140

141-
1. Find Central Access Policy Active Directory object in: CN=Central Access Policies,CN=Claims Configuration,CN=Services,CN=Configuration,DC=XXX,DC=XX Active Directory container.
141+
1. Find Central Access Policy Active Directory object in: "CN=Central Access Policies,CN=Claims Configuration,CN=Services,CN=Configuration,DC=XXX,DC=XX" Active Directory container.
142142

143-
2. Open object’s “**Properties**.
143+
2. Open object's "**Properties**".
144144

145-
3. Find **msAuthz-CentralAccessPolicyID** attribute.
145+
3. Find "**msAuthz-CentralAccessPolicyID**" attribute.
146146

147-
4. Convert hexadecimal value to SID (string). Here you can see more information about how to perform this action: <https://social.technet.microsoft.com/Forums/scriptcenter/en-US/11585f2c-ed0d-4c2b-a2b6-ef2aa07b3745/how-to-convert-sid>.
147+
4. Convert hexadecimal value to SID (string).
148148

149149
<img src="images/adsi-edit.png" alt="ADSI Edit illustration" width="763" height="454" hspace=10" align="left" />
150150

151-
> If no Central Access Policies were applied to the object, then SDDL will not contain any SIDs, for example **S:AI**.
151+
> If no Central Access Policies were applied to the object, then SDDL will not contain any SIDs, for example "**S:AI**".
152152
153153
- **New Security Descriptor** \[Type = UnicodeString\]**:** the Security Descriptor Definition Language (SDDL) value for the new Central Policy ID (for the policy that has been applied to the object). See more information in **Central Policy ID\\Original Security Descriptor** field section for this event.
154154

155-
> **Note**&nbsp;&nbsp;The **Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
156-
>
155+
> [!NOTE]
156+
> The **Security Descriptor Definition Language (SDDL)** defines string elements for enumerating information contained in the security descriptor.
157+
>
157158
> Example:
158-
>
159-
> *O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
160-
>
161-
> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
159+
>
160+
> `*O*:BA*G*:SY*D*:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0007;;;SY)(A;;0×7;;;BA)*S*:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)`
161+
>
162+
> - *O*: = Owner. SID of specific security principal, or reserved (pre-defined) value, for example: BA (BUILTIN\_ADMINISTRATORS), WD (Everyone), SY (LOCAL\_SYSTEM), etc.
162163
> See the list of possible values in the table below:
163164
164165
| Value | Description | Value | Description |
@@ -193,13 +194,13 @@ Example: D:(A;;FA;;;WD)
193194

194195
- entry\_type:
195196

196-
“D” - DACL
197+
"D" - DACL
197198

198-
“S” - SACL
199+
"S" - SACL
199200

200201
- inheritance\_flags:
201202

202-
"P - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
203+
"P" - SDDL\_PROTECTED, Inheritance from containers that are higher in the folder hierarchy are blocked.
203204

204205
"AI" - SDDL\_AUTO\_INHERITED, Inheritance is allowed, assuming that "P" isn't also set.
205206

@@ -231,7 +232,7 @@ Example: D:(A;;FA;;;WD)
231232

232233
"NP" - NO PROPAGATE: only immediate children inherit this ace.
233234

234-
"IO" - INHERITANCE ONLY: ace doesnt apply to this object, but may affect children via inheritance.
235+
"IO" - INHERITANCE ONLY: ace doesn't apply to this object, but may affect children via inheritance.
235236

236237
"ID" - ACE IS INHERITED
237238

@@ -262,24 +263,26 @@ Example: D:(A;;FA;;;WD)
262263
- inherit\_object\_guid: N/A
263264
- account\_sid: SID of specific security principal, or reserved value, for example: AN (Anonymous), WD (Everyone), SY (LOCAL\_SYSTEM), etc. For more information, see the table above.
264265

265-
For more information about SDDL syntax, see these articles: <https://msdn.microsoft.com/library/cc230374.aspx>, <https://msdn.microsoft.com/library/windows/hardware/aa374892(v=vs.85).aspx>.
266+
For more information about SDDL syntax, see these articles:
267+
268+
- [2.5.1.1 Syntax](/openspecs/windows_protocols/ms-dtyp/f4296d69-1c0f-491f-9587-a960b292d070)
269+
- [ACCESS_MASK](/windows/win32/secauthz/access-mask)
266270

267271
## Security Monitoring Recommendations
268272

269273
For 4913(S): Central Access Policy on the object was changed.
270274

271-
> **Important**&nbsp;&nbsp;For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
272-
273-
- If you need to monitor events related to specific Windows object types (“**Object Type**”), for example **File** or **Key**, monitor this event for the corresponding “**Object Type**.”
275+
> [!IMPORTANT]
276+
> For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
274277
275-
- If you need to monitor all changes to specific files or folders (in this case, changes to the Central Access Policy), monitor for the **Object Name**” that corresponds to the file or folder.
278+
- If you need to monitor events related to specific Windows object types ("**Object Type**"), for example **File** or **Key**, monitor this event for the corresponding "**Object Type**."
276279

277-
- If you have a pre-defined “**Process Name**” for the process reported in this event, monitor all events with “**Process Name**” not equal to your defined value.
280+
- If you need to monitor all changes to specific files or folders (in this case, changes to the Central Access Policy), monitor for the "**Object Name**" that corresponds to the file or folder.
278281

279-
- You can monitor to see if “**Process Name**” isn't in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
282+
- If you have a pre-defined "**Process Name**" for the process reported in this event, monitor all events with "**Process Name**" not equal to your defined value.
280283

281-
<!-- -->
284+
- You can monitor to see if "**Process Name**" isn't in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**).
282285

283-
- If you have a pre-defined list of restricted substrings or words in process names (for example, **mimikatz** or **cain.exe**), check for these substrings in **Process Name**.
286+
- If you have a pre-defined list of restricted substrings or words in process names (for example, "**mimikatz**" or "**cain.exe**"), check for these substrings in "**Process Name**."
284287

285-
- If you have specific files, folders, or entire systems to which a specific Central Access Policy should be applied, you can monitor this event and compare the Central Access Policy SID in **New Security Descriptor** to see if it matches the expected policy.
288+
- If you have specific files, folders, or entire systems to which a specific Central Access Policy should be applied, you can monitor this event and compare the Central Access Policy SID in "**New Security Descriptor**" to see if it matches the expected policy.

0 commit comments

Comments
 (0)