Policy Change Event: 617

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Process Tracking » Policy Change Event: 617

Event ID 617 – Kerberos Policy Changed

Event ID 617
Category Policy Change
Type Success Audit

This event is logged whenever the Kerberos policy is changed. The "User Name" field of the 617 event log does not identify the actual user who changed the policy, as these policies are configured in a group policy object and applied to the computer.

This event is logged only when the modified policy is applied rather than when the group policy object is actually changed.

This log data provides the following information:

  • User Name
  • Domain Name
  • Logon ID
  • Changes Made

Why does event ID 617 need to be monitored?

This event should be monitored, as unauthorized and unplanned changes in Kerberos policy warrant further investigation.

Pro Tip:

ADAudit Plus helps you avoid the GPOs monitoring complexities with real-time pre-configured reports and auditing of the changes along with alerts within a Domain & OU. The advanced Group Policy settings real-time audit reports highlight the elusive change details, and also provide the old and new values of the modified attributes.

Event 617 applies to the following operating systems:

  • Windows Server 2000
  • Windows 2003 and XP

Corresponding event ID in Windows 2008 and Windows Vista is 4713.