DocumentationAPI ReferenceRelease Notes
Log In
Documentation

Audits and reports

Endpoint Privilege Management for Windows sends events to the local Application event log, depending on the audit and privilege monitoring settings within the Endpoint Privilege Management for Windows policy.

Additionally, BeyondTrust provides an enterprise level, scalable reporting solution in Endpoint Privilege Management Reporting. Endpoint Privilege Management Reporting includes a rich set of dashboards and reports designed to simplify the centralized management and auditing of Endpoint Privilege Management for Windows activity throughout the desktop and server estate. Each dashboard provides detailed and summarized information regarding Application, User, Host, and Workstyle usage.

Events

The following events are logged by Endpoint Privilege Management for Windows:

Event IDDescription
0Service Control Success.
1Service Error.
2Service Warning.
100Process has started with admin rights added to token.
101Process has been started from the shell context menu with admin rights added to token.
103Process has started with admin rights dropped from token.
104Process has been started from the shell context menu with admin rights dropped from token.
106Process has started with no change to the access token (passive mode).
107Process has been started from the shell context menu with no change to the access token (passive mode).
109Process has started with user’s default rights enforced.
110Process has started from the shell context menu with user’s default rights enforced.
112Process requires elevated rights to run.
113Process has started with custom token applied.
114Process has started from the shell context menu with user’s custom token applied.
116Process execution was blocked.
118Process started in the context of the authorizing user.
119Process started from the shell menu in the context of the authorizing user.
120Process execution was canceled by the user.
150Endpoint Privilege Management for Windows handled service control start action.
151Endpoint Privilege Management for Windows handled service control stop action.
152Endpoint Privilege Management for Windows handled service control pause/resume action.
153Endpoint Privilege Management for Windows handled service control configuration action.
154Endpoint Privilege Management for Windows blocked a service control start action.
155Endpoint Privilege Management for Windows blocked a service control stop action.
156Endpoint Privilege Management for Windows blocked a service control pause/resume action.
157Endpoint Privilege Management for Windows blocked a service control configuration action.
158Endpoint Privilege Management for Windows service control action run in the context of the authorizing user.
159Endpoint Privilege Management for Windows service control start action canceled.
160Endpoint Privilege Management for Windows service control stop action canceled.
161Endpoint Privilege Management for Windows service control pause/resume action canceled.
162Endpoint Privilege Management for Windows service control configuration action canceled.
198Privileged group modification blocked.
199Process execution was blocked, the maximum number of challenge / response failures was exceeded.
Configuration Events
10License Error.
200Config Config Load Success.
201Config Config Load Warning.
202Config Config Load Error.
210Config Config Download Success.
211Config Config Download Error.
User / Computer Events
300User User Logon.
400Service Endpoint Privilege Management for Windows Service Start.
401Service Endpoint Privilege Management for Windows Service Stop.
Content Events
600Content has been updated with Add Admin Rights token.
601Content has been updated with a custom token.
602Content has been updated with Drop Admin Rights token.
603Content has been updated with Passive token.
604Content has been updated with Enforce User's Default Rights token.
605Content access was blocked.
606Content access was canceled by the user.
706Process Passive Audit DLL.
716Process Block DLL.
720Process Cancel DLL Audit.
801Rule Script Failure.
802Password Safe Integration Error.

Each process event contains the following information:

  • Command line for the process
  • Process ID for the process (if applicable)
  • Parent process ID of the process
  • Workstyle that applied
  • Application Group that contained the process
  • End user reason (if applicable)
  • Custom access token (if applicable)
  • File hash
  • Certificate (if applicable)

ℹ️

Note

Each process event also contains product properties, where applicable, but these can only be viewed in the Endpoint Privilege Management Reporting Console.

Audit with custom scripts

When an application is allowed, elevated, or blocked, Endpoint Privilege Management for Windows logs an event to the Application event log to record details of the action. If you want to record the action in a bespoke or third-party tracking system that supports PowerShell or JScript based submissions, you can use the Run a Script setting within an Application Rule.

To add a new auditing script:

  1. Create a new or edit an existing Application Rule within a Workstyle.
  2. In Run a Script, click on the Off value and in the dropdown menu, select Manage Scripts to open the Script Manager.
  3. In the Script Manager, click New in the left tree view. A new script is added to the tree. Click the name New Script once to rename the script.
  4. In the right script editor, enter your script code either manually, by copy and paste, or you can import a script from file by clicking Import.
  5. In the Script Language dropdown menu, select either PowerShell or Javascript, depending on the code format you entered.

ℹ️

Note

PowerShell audit scripts can only be run in the system context.

  1. Select a Timeout for how long the script will be allowed to execute, before it is terminated. By default, this is set to Infinite.
  2. Select whether the script should be executed in the System context or the current User context from the Script Context dropdown menu.
  3. Click OK to finish.

The new script is automatically selected in the Run a Script setting.

ℹ️

Note

If you have any existing scripts, these can be selected in the dropdown menu.

The auditing script supports the use of parameters within the script. Parameters are expanded using the COM interface PGScript.

Example

strUserName = PGScript.GetParameter("[PG_USER_NAME]")
strCommandLine = PGScript.GetParameter("[PG_PROG_CMD_LINE]")
strAgentVersion = PGScript.GetParameter("[PG_AGENT_VERSION]")

ℹ️

Note

Scripts created in the script editor can be reused in multiple Application Rules and On-Demand Application Rules. Any modification to an existing script affects all Workstyle rules that have been configured to execute that script.

📘

For a list of available parameters, see Policies and templates.


©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.