Windows System Event: 4618

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

System Event » Windows System Event: 4618

Event ID 4618: A monitored security event pattern has occurred.

Description The event is generated when Windows is configured to generate alerts in accordance with the Common Criteria Security Audit Analysis requirements (FAU_SAA) and an auditable event pattern occurs.
Category System
Subcategory System integrity

This event logs the following information:

Subject
  • Security ID
  • Account Name
  • Account Domain
  • Logon ID
Alert information
  • Computer
  • Event ID
  • Number of events
  • Duration
Failure Information
  • Reason
  • Return code

Reasons to monitor this event:

This event can only be generated manually/externally using the following command.

%windir%\system32\rundll32

%windir%\system32\authz.dll,AuthziGenerateAdminAlertAudit

OrgEventId ComputerName UserSid UserName UserDomain

UserLogonId EventCount Duration

Pro tips:

  • ADAudit Plus can generate reports and alerts when a monitored security event pattern has occurred.
  • These reports consolidate all the information required about the monitored security event, such as time of occurrence, and the domain controller on which it occurs.

Event 4618 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10