никита какдела
unread,Dec 29, 2025, 6:17:34 AM (2 days ago) Dec 29Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Wazuh Support Team,
I am experiencing an issue with Windows Security Event ID 4624 processing in Wazuh and would appreciate your clarification.
In my environment, not all Event ID 4624 events are processed consistently. I have two very similar 4624 events generated on the same host, from the same channel (Security), with the same logon type and authentication package.
The behavior is the following:
Event 1:
• Is present in archives.log and archives.json
• Passes the built-in Wazuh rules
• Is written to alerts.log
• Is indexed into wazuh-alerts-* and visible in Discover
Event 2:
• Is present in archives.log and archives.json
• Does NOT pass the built-in rules
• Is NOT written to alerts.log as an alert
• Is NOT indexed into wazuh-alerts-* and does not appear in Discover
Both events are structurally identical Windows EventChannel 4624 events. The only noticeable difference is that Event 2 contains network fields (ipAddress and ipPort), while Event 1 does not. Apart from that, both events have the same eventID, logonType (3), authenticationPackageName (Kerberos), and come from the same system.
This leads me to the following questions:
1. Are built-in Wazuh rules for Event ID 4624 dependent on the presence of specific fields such as ipAddress or other network-related attributes?
2. Is it expected behavior that some valid Windows EventChannel 4624 events are archived but never evaluated by built-in rules and therefore never indexed into wazuh-alerts-*?
3. Which exact conditions determine whether a Windows EventChannel event is promoted from archives to alerts and indexed into Discover?
4. Are there any known limitations or design decisions where certain 4624 events are intentionally ignored by default rules, even though they are valid and correctly parsed?
I have verified that both events are correctly collected and stored in archives.log and archives.json, but only one of them is evaluated by the built-in ruleset and indexed.
I can safely provide both raw events from archives.log and archives.json if needed for further analysis.
Thank you in advance for your help.
Best regards,
Shelamov Nikita