Skip to main content

Active Directory JSON Log File

The following information lists all of the attributes generated by Active Directory Activity Monitor into a JSON log file:

AttributesDescription
AffectedObjectIf resolved, contains DN of the object affected by operation; otherwise, some textual representation of the object
AffectedObjectAccountNameIf resolved, contains account name of the object affected by operation
AffectedObjectSidIf resolved, contains Sid of the object affected by operation
AgentDomainDomain where SI agent is installed
AgentHostHost name where SI agent is installed
AgentIPIP address where SI agent is installed. If multiple IP addresses, one of them is reported.
AuthenticationTypeIndicates type of the authentication event. Possible values: Kerberos, NTLM.
AuthProtocolIndicates authentication protocol. Possible values: Unknown, Kerberos, KerberosTgs, KerberosAS, NTLM, NTLMv1, NTLMMixed, NTLMv2.
BlockedIndicates if operation was blocked by SI agent. Blocking policies are required.
ClassNameAffected object class
DesiredAccessSecurity and access rights requested during OpenProcess invoke. List of possible values can be found at:  https://docs.microsoft.com/en-us/windows/desktop/ProcThread/process-security-and-access-rights.
EncryptionTypeIndicates encryption type used in request part of the Kerberos ticket. Possible values: des_cbc_crc, des_cbc_md4, des_cbc_md5, reserved_0x4, des3_cbc_md5, reserved_0x6, des3_cbc_sha1, dsaWithSHA1, md5WithRSAEncryption, rc2CBC, rsaEncryption, rsaES, des_ede3_cbc, des3_cbc_sha1_kd, aes128, aes256, rc4_hmac, rc4_hmac_exp, subkey_keymaterial.
EventResultResult of the operation triggered current event
EventTypeIdentifies event
EventsCountNumber of similar events captured during consolidation period which is 1 minute by default
FromContains raw representation of the machine from which event was triggered
FromHostIf resolved, contains host name of the machine from which event was triggered
FromIpIf resolved, contains the IP address of the machine from which event was triggered
FromMacIf resolved, contains mac address of the machine from which event was triggered
IsN2PasswordIndicates if password that was used for authentication is a previous or one before previous
IsUserExistIndicates if user exists
KerbAuthTimeTime at which KDC issued the initial ticket that corresponds to this ticket
KerbEndTimeTicket expiration time
KerbRenewTillLatest time at which renewal of ticket can be valid
KerbSPNService principal name for which ticket was requested
KerbStartTimeTicket start time
LogonTypeContains SECURITY_LOGON_TYPE. More details at https://docs.microsoft.com/en-us/windows/win32/api/ntsecapi/ne-ntsecapi-security_logon_type.
NewAttributesMap of new attributes where key is name and value attribute value
NewNameNew name of the AD object
NlpLogonTypeNTLM logon type. Possible values: Unknown, Interactive, Network, Service, Generic, TransitiveInteractive, TransitiveNetwork, TransitiveService
OldAttributesMap of old attributes where key is attribute name and value attribute value
PACList of RIDs extracted from ticket authorization data
ProcessIDContains process ID that attempted to open LSASS process
ProcessNameContains process name that attempted to open LSASS process
ProtocolOperation specific details
QueryFilterLDAP filter used in the operation
QueryIsSSLIndicates if LDAP connection is secure or not
QueryObjectsReturnedNumber of returned objects produced by the LDAP request
SourceIndicates source of the operation. Currently can be: ‘Authentication’, ‘Active Directory’, ‘LSASS Guardian – Monitor’, ‘LDAP Monitor’, ‘AD Replication Monitoring’.
SuccessIndicates if original operation completed successfully or not
TargetHostContains host name to which authentication attempt took place. In case of failed Kerberos AS, this field contains name of the domain controller.
TargetHostIPIf resolved, contains IP address of the target host
TargetProcessContains process name that is monitored. Currently this is only lsass.exe.
TgsReplyEncryptionTypeIndicates encryption type used in reply part of the TGS Kerberos ticket. Possible values the same as for EncryptionType.
TimeLoggedUTC timestamp of the event
UserDNIf resolved, contains DN of the object triggered operation
UserNameIf resolved, contains account name of the object triggered operation
UserSidIf resolved, contains SID of the object triggered operation