Event ID 4793 - The Password Policy Checking API was called
| Event ID | 4793 |
| Category | Account management |
| Sub category | Other account management events |
| Description | The Password Policy Checking API was called |
In Active Directory, event ID 4793 is a typical behavior and is often observed on SQL servers which can be ignored.
This log data gives the following information:
| Subject: User who performed the action | Security ID Account Name Account Domain Logon ID |
| Additional Information | Caller Workstation Provided Account Name Status Code |
Why event ID 4793 needs to be monitored?
- Prevention of privilege abuse
- Detection of potential malicious activity
- Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
- Compliance mandates
Pro tip:
ADAudit Plus records all modifications made on a GPO and lists these changes in a convenient and easily understandable reports. The time of change and the modification made are prominently displayed.
Event 4793 applies to the following operating systems:
- Windows Server 2008 R2 and Windows 7
- Windows Server 2012 R2 and Windows 8.1
- Windows Server 2016 and Windows 10
Explore Active Directory auditing and reporting with ADAudit Plus.
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Hybrid AD, cloud, and file auditing and security
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Self-Service Password Management
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools

