--- title: 4649(S) A replay attack was detected. (Windows 10) description: Describes security event 4649(S) A replay attack was detected. ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: Mir0sh --- # 4649(S): A replay attack was detected. **Applies to** - Windows 10 - Windows Server 2016 This event generates on domain controllers when **KRB\_AP\_ERR\_REPEAT** Kerberos response was sent to the client. Domain controllers cache information from recently received tickets. If the server name, client name, time, and microsecond fields from the Authenticator match recently seen entries in the cache, it will return KRB\_AP\_ERR\_REPEAT. You can read more about this in [RFC-1510](http://www.ietf.org/rfc/rfc1510.txt). One potential cause for this is a misconfigured network device between the client and server that could send the same packet(s) repeatedly. There is no example of this event in this document. ***Subcategory:*** [Audit Other Logon/Logoff Events](audit-other-logonlogoff-events.md) ***Event Schema:*** *A replay attack was detected.* *Subject:* > *Security ID:%1* > > *Account Name:%2* > > *Account Domain:%3* > > *Logon ID:%4* *Credentials Which Were Replayed:* > *Account Name:%5* > > *Account Domain:%6* *Process Information:* > *Process ID:%12* > > *Process Name:%13* *Network Information:* > *Workstation Name:%10* *Detailed Authentication Information:* > *Request Type:%7* > > *Logon Process:%8* > > *Authentication Package:%9* > > *Transited Services:%11* *This event indicates that a Kerberos replay attack was detected- a request was received twice with identical information. This condition could be caused by network misconfiguration."* ***Required Server Roles:*** Active Directory domain controller. ***Minimum OS Version:*** Windows Server 2008. ***Event Versions:*** 0. ## Security Monitoring Recommendations For 4649(S): A replay attack was detected. - This event can be a sign of Kerberos replay attack or, among other things, network device configuration or routing problems. In both cases, we recommend triggering an alert and investigating the reason the event was generated.