Submit a ticketCall us

Get a crash course on Network Monitoring delivered right to your inbox
This free 7-day email course provides a primer to the philosophy, theory, and fundamental concepts involved in IT monitoring. Lessons will explain not only how to perform various monitoring tasks, but why and when you should use them. Sign up now.

Home > Success Center > Log & Event Manager (LEM) > Windows 10 Security Event Log populated with ID 4703 events

Windows 10 Security Event Log populated with ID 4703 events

Table of contents

 

Overview

Windows 10 can generate Policy Change auditing events with ID 4703. These events are generated when your audit policy settings are set to SUCCESS and the requested action succeeds. 

Policy Change auditing is usually set to to audit FAIL events. When you change this setting to SUCCESS, you may receive multiple events in your security log. These events may not be critical security events, which can require an extensive amount of time to troubleshoot and resolve. 

Environment

  • Workstations running Windows 10

Detail

LEM 6.3 will not normalize ID 4703 events related to your LEM agent. You can disable the SUCCESS auditing policy in the group policy console located at:

Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy

 

 

 

Last modified
15:59, 10 Aug 2016

Tags

Classifications

Public