Partition/Diagnostic.evtx

C:\Windows\System32\winevt\Logs\Microsoft-Windows-Partition%4Diagnostic.evtx

Primarily a diagnostic channel for troubleshooting failing drives, this log has a deceptively powerful secondary purpose in forensics. It exposes deep low-level details about the partitioning scheme and geometry of every newly attached drive - data that can uniquely fingerprint a suspect device even when no other identifying information survives.

Log Channel Microsoft-Windows-Partition/Diagnostic - written by the Windows partition manager during device enumeration
Trace Type USB Artifacts Device Geometry Partition Analysis
Req. Audit Policy No Active by default. Diagnostic events are generated automatically during device attachment and enumeration.
User Specific No System-wide. Partition analysis is performed by the OS at the kernel level during device initialization.

General

The Partition Diagnostic log is written by the Windows partition manager the moment a new disk is attached and enumerated. Unlike higher-level volume events, it operates at the raw disk geometry layer - reading the partition table before any filesystem driver gets involved. This gives investigators access to whether the drive uses MBR or GPT, the number and offset of partitions, sector sizes and any non-standard layout that may indicate a custom formatting tool was used. Because this inspection happens during hardware enumeration, it cannot be suppressed by disabling Autorun or blocking volume mounting.

Traces

The most forensically significant Event IDs in the Partition Diagnostic log are:

Event ID Description
1006 Disk geometry and partition layout recorded. Contains the partition style (MBR/GPT), total sectors, sector size, number of partitions and per-partition offset data. The primary device fingerprinting source in this log.

Forensic Value