Privilege Use Event: 4673

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Privilege Use » Event ID 4673 - A privileged service was called

Event ID 4673 - A privileged service was called

Event ID 4673
Category Privilege use
Description Privileged Service Called

Windows logs event ID 4673 to register that a user has a set of special privileges when the user logs in.

This log data gives the following information:

Subject:
  • Security ID
  • Account Name
  • Account Domain
  • Logon ID
Service
  • Server Name
  • Service Name
Process 
  • Process ID
  • Process Name
Service Request Information
  • Privileges

Why event ID 4673 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

With pre-defined reports from ADAudit Plus, you can easily track and audit permissions granted on a network for users or computers to complete defined tasks. 

Event 4673 applies to the following operating systems: 

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10

  • Corresponding event ID for 4673 in Windows Server 2003 and older is 577