T1654

Log Enumeration

This detection identifies adversaries enumerating system and service logs to gather intelligence about the environment, including authentication records, security events, software inventory, and network hosts. The detection focuses on the use of native Windows utilities such as wevtutil.exe and PowerShell cmdlets (Get-EventLog, Get-WinEvent) to query or export Windows event logs, Azure VM Agent's CollectGuestLogs.exe for cloud-hosted log collection, and Linux tools like journalctl and ausearch for authentication log enumeration. Suspicious patterns include querying Security and System event logs outside of known administrative context, bulk exporting logs, and log enumeration activity originating from unusual parent processes indicative of post-exploitation. Real-world threat actors including Volt Typhoon, Ember Bear, and Aquatic Panda have used these techniques to identify authenticated sessions, map the environment, and monitor incident response activity in real time.

Microsoft Sentinel / Defender
kusto
let TimeWindow = 1d;
let SuspiciousParents = dynamic(["cmd.exe", "wscript.exe", "cscript.exe", "mshta.exe", "regsvr32.exe", "rundll32.exe", "msiexec.exe"]);
DeviceProcessEvents
| where TimeGenerated > ago(TimeWindow)
| where (
    // wevtutil log enumeration and export
    (FileName =~ "wevtutil.exe" and ProcessCommandLine has_any ("qe ", "epl ", "query-events", "export-log", "gl ", "qel ", "get-log"))
    // PowerShell native log cmdlets
    or (FileName in~ ("powershell.exe", "pwsh.exe") and ProcessCommandLine has_any ("Get-EventLog", "Get-WinEvent", "Get-WinEvent", "[System.Diagnostics.EventLog]"))
    // Azure VM Guest log collection
    or FileName =~ "CollectGuestLogs.exe"
)
| extend
    LogTarget = case(
        ProcessCommandLine has_any ("security", "Security"), "Security",
        ProcessCommandLine has_any ("system", "System"), "System",
        ProcessCommandLine has_any ("application", "Application"), "Application",
        ProcessCommandLine has_any ("powershell", "PowerShell"), "PowerShell Operational",
        ProcessCommandLine has "ForwardedEvents", "Forwarded Events",
        "Other"
    ),
    IsBulkExport = iff(
        ProcessCommandLine has_any ("epl", "export-log", "Out-File", "Export-Csv", "Set-Content", " > ", "Tee-Object"),
        true, false
    ),
    SuspiciousParent = iff(
        InitiatingProcessFileName in~ (SuspiciousParents),
        true, false
    ),
    RiskScore = case(
        ProcessCommandLine has_any ("epl", "export-log", "Out-File") and ProcessCommandLine has "security", 9,
        ProcessCommandLine has_any ("epl", "export-log", "Out-File"), 7,
        InitiatingProcessFileName in~ (SuspiciousParents), 8,
        ProcessCommandLine has "security", 6,
        true, 3
    )
| where RiskScore >= 3
| project
    TimeGenerated,
    DeviceName,
    AccountName,
    AccountDomain,
    FileName,
    ProcessCommandLine,
    InitiatingProcessFileName,
    InitiatingProcessCommandLine,
    LogTarget,
    IsBulkExport,
    SuspiciousParent,
    RiskScore
| order by RiskScore desc, TimeGenerated desc
medium severity medium confidence

Data Sources

Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • SIEM agents and log forwarders (e.g., Splunk Universal Forwarder, Elastic Winlogbeat) regularly query Windows event logs using wevtutil or WinAPI equivalents
  • IT operations teams and sysadmins running wevtutil.exe or Get-WinEvent during troubleshooting, capacity planning, or scheduled log archival
  • Backup and compliance solutions (e.g., Veeam, Commvault, Netwrix Auditor) that export Security and System logs as part of audit retention workflows
  • Azure Monitor Agent and Microsoft Monitoring Agent (MMA/AMA) using CollectGuestLogs.exe on cloud-hosted VMs as part of normal diagnostics
  • Vulnerability scanners and configuration management tools (e.g., Nessus, Qualys, SCCM) that enumerate event log state to assess system health

Unlock Pro Content

Get the full detection package for T1654 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections