Windows Security Log Event ID 4718

Operating Systems Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Windows Server 2019 and 2022
 • Subcategory
Policy Change
 • Authentication Policy Change
Type Success
Corresponding events
in Windows 2003
and before

4718: System security access was removed from an account

On this page

This event documents the revokation of logon rights such as "Access this computer from the network" or "Logon as a service".

Rights, like most other security settings, are defined in group policy objects and applied by the computer. Therefore this event will normally show the Assigned By user as the system itself. To determine who actually made the rights assignment change you must search the domain controllers' security logs for changes to groupPolicyContainer objects (logged by Directory Service auditing). Logon ID allows you to link this event to the prior event 4624 logon event of the user who performed this action.

This event, 4718 documents the system name for each logon right as opposed to the more familiar description. Click here for a cross reference.

Note: This event and 4717 log changes to strictly logon rights such as "Access this computer from the network" or "Logon as a service" - not to other rights such as "Change the system time" or "Take ownership of files and other objects". See events 4704 and 4705.

Free Security Log Resources by Randy

Description Fields in 4718


The ID and logon session of the user that changed the policy - always the local system - see note above. 

  • Security ID:  The SID of the account.
  • Account Name:  The account logon name.
  • Account Domain:  The domain or - in the case of local accounts - computer name.
  • Logon ID is a semi-unique (unique between reboots) number that identifies the logon session.  Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same session.

Account Modified:

  • Account Name: SID of the user/group/computer who lost the logon right

Access Granted:

  • Access Right: The logon right that was revoked
    Name Description
    SeNetworkLogonRight Access this computer from the network
    SeRemoteInteractiveLogonRight Allow logon through Terminal Services
    SeDenyNetworkLogonRight Deny access to this computer from the network
    SeDenyBatchLogonRight Deny logon as a batch job
    SeDenyServiceLogonRight Deny logon as a service
    SeDenyInteractiveLogonRight Deny logon locally
    SeDenyRemoteInteractiveLogonRight Deny logon through Terminal Services
    SeBatchLogonRight Log on as a batch job
    SeServiceLogonRight Log on as a service
    SeInteractiveLogonRight Log on locally

Supercharger Free Edition

Supercharger's built-in Xpath filters leave the noise behind.



Examples of 4718

System security access was removed from an account.


   Security ID:  SYSTEM
   Account Name:  WIN-R9H529RIO4Y$
   Account Domain:  WORKGROUP
   Logon ID:  0x3e7

Account Modified:

   Account Name:  BUILTIN\Users

Access Removed:

   Access Right:  SeNetworkLogonRight

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection


Additional Resources