Windows Security Log Event ID 4649

Operating Systems Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Category
 • Subcategory
Logon/Logoff
 • Other Logon/Logoff Events
Type Success
Corresponding events
in Windows 2003
and before
 
Discussions on Event ID 4649
Event code :4649 A replay attack was detected sample logs
KRB_AP_ERR_REPEAT during IIS worker process crash

4649: A replay attack was detected

On this page

I haven't been able to produce this event. Have you? If so, please start a discussion (see above) and post a sample along with any comments you may have! Don't forget to sanitize any private information.

Free Security Log Resources by Randy

Integrating Identity and Authentication Events to Improve SIEM Threat Detection


 

Examples of 4649

A replay attack was detected.

Subject:
   Security ID:  %1
   Account Name:  %2
   Account Domain:  %3
   Logon ID:  %4

Credentials Which Were Replayed:
   Account Name:  %5
   Account Domain:  %6

Process Information:
   Process ID:  %12
   Process Name:  %13

Network Information:
   Workstation Name: %10
Detailed Authentication Information:
   Request Type:  %7
   Logon Process:  %8
   Authentication Package: %9
   Transited Services: %11

This event indicates that a Kerberos replay attack was detected- a request was received twice with identical information. This condition could be caused by network misconfiguration.

Keep me up-to-date on the Windows Security Log.
Email*:
*We will NOT share this

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection



 

Additional Resources