3.6 KiB
title, description, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, author
title | description | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | author |
---|---|---|---|---|---|---|
4618(S) A monitored security event pattern has occurred. (Windows 10) | Describes security event 4618(S) A monitored security event pattern has occurred. | security | w10 | deploy | library | Mir0sh |
4618(S): A monitored security event pattern has occurred.
Applies to
- Windows 10
- Windows Server 2016
Subcategory: Audit System Integrity
This event can be generated (invoked) only externally using the following command:
%windir%\system32\rundll32 %windir%\system32\authz.dll,AuthziGenerateAdminAlertAudit OrgEventId ComputerName UserSid UserName UserDomain UserLogonId EventCount Duration
Account must have SeAuditPrivilege (Generate security audits) to be able to generate this event.
-
UserSid is resolved when viewing the event in event viewer.
-
Only OrgEventID, ComputerName, and EventCount are required—others are optional. Fields not specified appear with “-“ in the event description field.
-
If a field doesn’t match the expected data type, the event is not generated. (i.e., if EventCount = “XYZ” then no event is generated.)
-
UserSid, UserName, and UserDomain are not related to each other (think SubjectUser fields, where they are)
-
Parameters are space delimited, even if a parameter is enclosed in double-quotes.
-
Here are the expected data types for the parameters:
Parameter | Expected Data Type |
---|---|
OrgEventID | Ulong |
ComputerName | String |
UserSid | SID (in string format) |
UserName | String |
UserDomain | String |
UserLogonID | Luid (a ULongLong converted to Hex in the event) |
EventCount | Ulong |
Duration | String |

Event XML:
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
- <System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
<EventID>4618</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>12290</Task>
<Opcode>0</Opcode>
<Keywords>0x8020000000000000</Keywords>
<TimeCreated SystemTime="2015-11-11T21:42:33.264246700Z" />
<EventRecordID>1198759</EventRecordID>
<Correlation />
<Execution ProcessID="500" ThreadID="528" />
<Channel>Security</Channel>
<Computer>DC01.contoso.local</Computer>
<Security />
</System>
- <EventData>
<Data Name="EventId">4624</Data>
<Data Name="ComputerName">DC01.contoso.local</Data>
<Data Name="TargetUserSid">S-1-5-21-3457937927-2839227994-823803824-1104</Data>
<Data Name="TargetUserName">dadmin</Data>
<Data Name="TargetUserDomain">CONTOSO</Data>
<Data Name="TargetLogonId">0x1</Data>
<Data Name="EventCount">10</Data>
<Data Name="Duration">“Hour"</Data>
</EventData>
</Event>
Required Server Roles: None.
Minimum OS Version: Windows Server 2008, Windows Vista.
Event Versions: 0.
Security Monitoring Recommendations
For 4618(S): A monitored security event pattern has occurred.
- This event can be invoked only manually/intentionally, it is up to you how interpret this event depends on information you put inside of it.