Policy Change Event: 4713

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Management » Event ID 4713 - Kerberos policy was changed

Event ID 4713 - Kerberos policy was changed

Event ID 4713
Category Policy change
Sub category Authentication policy change
Description Kerberos policy was changed

When the Kerberos policy is changed in a domian, it is captured in event ID 4713.

This log data gives the following information:

Security ID
Account Name
Account Domain
Logon ID
Changes Made

Why event ID 4713 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

ADAudit Plus helps you avoid the GPOs monitoring complexities with real-time pre-configured reports and auditing of the changes along with alerts within a Domain & OU. The advanced Group Policy settings real-time audit reports emphasize on the elusive change details and give a detailed report on the modifications along with the old and new values of the attributes.

Event 4713 applies to the following operating systems: 

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10
year-end-offer-2021-banner