This document provides a cheat sheet for configuring Windows logging and auditing settings on Windows 7 through Windows 2012 systems. It includes instructions for increasing log sizes, enabling specific audit policies and event logging, and harvesting important security-related events from the logs. The goal is to capture essential system activity like processes, services, authentication events and changes to files, registry keys and more to aid in detecting malicious behavior.