A privileged service was called
On this page
Event 4673 indicates that the specified user exercised the user right specified in the Privileges field.
Note: "User rights" and "privileges" are synonymous terms used interchangeably in Windows.
Some user rights are logged by this event - others by 4674. Still other, ""high-volume"" rights are not logged when they are exercised unless you enable the security option "Audit: Audit the use of Backup and Restore privilege".
Unfortunately, Microsoft has overloaded these privileges so that each privilege may govern your authority to perform many different operations and which privilege is required for which operations is not well documented. Therefore seeing that a privilege was exercised doesn't really tell you much. In Win2008 this has been improved with better information in the Server: and Service Name: fields. In general though, I still classify these events as noise. Microsoft admits: "These are high volume events, which typically do not contain sufficient information to act upon since they do not describe what operation occurred."
Note: 4673 and 4674 do not log any activity associated with Logon Rights such as the SeNetworkLogonRight. Do not confuse events 4673 and 4674 with events 4717 and 4718 which document rights assignment changes as opposed to the exercise of rights which is the purpose of events 4673 and 4674.
The ID and logon session of the user that excercised the right.
- Security ID: The SID of the account.
- Account Name: The account logon name.
- Account Domain: The domain or - in the case of local accounts - computer name.
- Logon ID is a semi-unique (unique between reboots) number that identifies the logon session. Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session.
These fields help you narrow down what the user exercised the the right for.
- Server: The system component affected
- Service Name: The operation affected
Start a discussion below if you have information on these fields!
These fields tell you the program that exercised the right. The Process Name identifies the program executable. Process ID is the process ID specified when the executable started as logged in 4688.
Service Request Information: Privileges: The names of the privileges just exercised
- Security ID: %1
- Account Name: %2
- Account Domain: %3
- Logon ID: %4
- Server: %5
- Service Name: %6
- Process ID: %8
- Process Name: %9
Service Request Information:
Top 10 Windows Security Events to Monitor
A privileged service was called.
Security ID: SYSTEM
Account Name: WIN-R9H529RIO4Y$
Account Domain: WORKGROUP
Logon ID: 0x3e7
Server: NT Local Security Authority / Authentication Service
Service Name: LsaRegisterLogonProcess()
Process ID: 0x238
Process Name: C:\Windows\System32\lsass.exe
Service Request Information:
Keep me up-to-date on the Windows Security Log.
*We will NOT share this