Event ID 4713 represents a security audit event that Windows generates when Kerberos authentication policy undergoes modification within an Active Directory domain. This event occurs exclusively on domain controllers and captures comprehensive details about policy changes affecting the domain's authentication infrastructure.
The event triggers when administrators modify settings such as maximum ticket lifetime for user accounts, maximum ticket lifetime for services, maximum tolerance for computer clock synchronization, and maximum lifetime for user ticket renewal. These parameters directly control how Kerberos authentication operates across the domain, making their modification significant from both security and operational perspectives.
Windows records this event in the Security log with detailed information including the changed policy attributes, previous values, new values, and the security identifier of the account making the changes. The event also captures the computer name where the change originated and the process responsible for the modification.
From a security monitoring standpoint, Event ID 4713 serves as a critical indicator for tracking authentication policy changes that could affect domain security posture. Malicious actors with sufficient privileges might attempt to weaken Kerberos settings to facilitate attacks, making this event valuable for detecting unauthorized policy modifications.