Account Logon Event: 4820

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on his Active Directory. This helps him identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Logon » Event ID 4820 - A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions

Event ID 4820 - A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions

Event ID 4820
Category Account Logon
Sub category Kerberos Authentication Service
Description A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions

When a Kerberos Ticket-granting-ticket is denied, event ID 4820 is logged.

This log data gives the following information:

Account Information Account Name
Supplied Realm Name
User ID
Authentication Information Silo Name
Policy Name
TGT Lifetime
Device Information Device Name
Service Information Service Name
Service ID
Network Information Client Address
Client Port
Additional Information Ticket Options
Result Code
Ticket Encryption Type
Pre-Authentication Type
Certificate Information Certificate Issuer Name
Certificate Serial Number
Certificate Thumbprint

Why event ID 4820 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

ADAudit Plus account logon real-time pre-configured reports help identify miscreant users attempting logon into machines that requires elevated privileges and provide evidence for any action administered by any user. These reports can be advantageously in overcoming account logon audit challenges.

Event 4820 applies to the following operating systems:

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10

Explore Active Directory auditing and reporting with ADAudit Plus.

  • Enter your email id
    Please enter a valid email id
  • Enter your phone number
  • Select demo date
  •  
  • By clicking 'Schedule a personalized demo', you agree to processing of personal data according to the Privacy Policy. You can unsubscribe from our mails at anytime.
AD User Auditing
Active Directory Auditing
Windows Server Auditing