ANAVEM
Languagefr
Windows security monitoring dashboard displaying audit policy events and security logs
Event ID 4714InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4714 – Microsoft-Windows-Security-Auditing: System Security Access Control List Was Changed

Event ID 4714 fires when the System Access Control List (SACL) is modified on a Windows system, indicating changes to audit policies or security monitoring configurations.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 202612 min read 0
Event ID 4714Microsoft-Windows-Security-Auditing 5 methods 12 min
Event Reference

What This Event Means

Event ID 4714 represents a fundamental security monitoring capability within Windows' audit infrastructure. When this event fires, it indicates that someone or some process has modified the System Access Control List, which governs what security events get logged and under what circumstances.

The SACL is distinct from the Discretionary Access Control List (DACL) that controls access permissions. While DACLs determine who can access what, SACLs determine what gets audited when accessed. This makes Event ID 4714 particularly significant for security professionals, as it tracks changes to the very mechanisms that provide visibility into system activity.

In Windows Server 2025 and Windows 11, this event has been enhanced with additional context fields that provide more granular information about the nature of the SACL change. The event includes details about the security principal making the change, the target object or policy being modified, and the specific audit categories affected.

From a compliance perspective, Event ID 4714 serves as evidence that audit policies are being actively managed and that changes to security monitoring configurations are properly logged. This creates an audit trail of audit trail modifications, which is often required by regulatory frameworks that mandate comprehensive logging and monitoring capabilities.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • Administrator modifying audit policies through Local Security Policy (secpol.msc)
  • Group Policy changes affecting audit policy settings being applied to domain-joined systems
  • PowerShell scripts or applications programmatically changing audit configurations via SetSecurityInfo API
  • Security software or endpoint protection tools modifying system audit settings
  • Windows Update or system maintenance tasks updating default audit policies
  • Third-party management tools changing audit configurations remotely
  • Manual registry modifications to audit policy keys under HKLM\SECURITY
  • System restore operations that revert audit policy changes
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of the Event ID 4714 occurrence to understand what changed and who initiated it.

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 4714 by right-clicking the Security log and selecting Filter Current Log
  4. Enter 4714 in the Event IDs field and click OK
  5. Double-click on a recent Event ID 4714 entry to view details
  6. Examine the General tab for basic information and the Details tab for XML data
  7. Note the Subject fields showing who made the change and the Object fields showing what was modified

Use PowerShell for more efficient filtering:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4714} -MaxEvents 20 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
Pro tip: The event message contains the Security ID of the user who made the change and the specific audit policy category that was modified.
02

Analyze Current Audit Policy Configuration

Compare the current audit policy settings with your baseline to identify what specific changes were made.

  1. Open an elevated Command Prompt or PowerShell session
  2. Run the audit policy query command to see current settings:
auditpol /get /category:*
  1. For more detailed subcategory information:
auditpol /get /subcategory:* /r
  1. Export current audit policy for documentation:
auditpol /backup /file:C:\temp\current_audit_policy.csv
  1. Compare with a known good baseline policy if available
  2. Check Group Policy settings that might have triggered the change:
gpresult /h C:\temp\gpresult.html
  1. Review the generated HTML report for audit policy settings under Computer Configuration
Warning: Audit policy changes can significantly impact log volume and system performance. Ensure changes align with your security requirements and storage capacity.
03

Investigate Using PowerShell Advanced Filtering

Use PowerShell to perform detailed analysis of Event ID 4714 occurrences and correlate them with other security events.

  1. Create a comprehensive query to analyze patterns:
$Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4714; StartTime=(Get-Date).AddDays(-7)}
$Events | ForEach-Object {
    $xml = [xml]$_.ToXml()
    [PSCustomObject]@{
        TimeCreated = $_.TimeCreated
        SubjectUserName = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'SubjectUserName'} | Select-Object -ExpandProperty '#text'
        SubjectDomainName = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'SubjectDomainName'} | Select-Object -ExpandProperty '#text'
        CategoryId = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'CategoryId'} | Select-Object -ExpandProperty '#text'
        SubcategoryId = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'SubcategoryId'} | Select-Object -ExpandProperty '#text'
    }
} | Format-Table -AutoSize
  1. Look for correlating events around the same time:
$TimeWindow = (Get-Date).AddHours(-1)
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=@(4719,4817,4902,4904,4905); StartTime=$TimeWindow} | Format-Table TimeCreated, Id, Message -Wrap
  1. Check for Group Policy processing events:
Get-WinEvent -FilterHashtable @{LogName='System'; Id=@(1500,1501,1502)} -MaxEvents 10 | Format-Table TimeCreated, Id, Message -Wrap
Pro tip: Event IDs 4719 (system audit policy changed) and 4817 (audit settings on object changed) often appear alongside 4714 and provide additional context.
04

Registry Analysis for Audit Policy Changes

Examine the registry locations where audit policy settings are stored to understand the technical details of the changes.

  1. Open Registry Editor as Administrator (regedit.exe)
  2. Navigate to the primary audit policy location:
HKEY_LOCAL_MACHINE\SECURITY\Policy\PolAdtEv
  1. Check the advanced audit policy settings:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Audit
  1. Use PowerShell to query audit-related registry values:
Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\Audit" | Format-List
  1. Check for Group Policy-applied audit settings:
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" -ErrorAction SilentlyContinue | Format-List
  1. Monitor registry changes in real-time using Process Monitor (ProcMon):
  2. Download ProcMon from Microsoft Sysinternals
  3. Set filters for Process Name contains "lsass.exe" and Path contains "Audit"
  4. Reproduce the audit policy change to see registry modifications
Warning: The SECURITY registry hive requires special permissions to access. Some values may not be visible even with Administrator privileges due to Windows security architecture.
05

Advanced SIEM Integration and Automated Response

Implement comprehensive monitoring and automated response for Event ID 4714 in enterprise environments.

  1. Configure Windows Event Forwarding (WEF) to centralize Event ID 4714:
# On collector server
wecutil cs subscription.xml

# Create subscription.xml with Event ID 4714 filter
$SubscriptionXML = @"

    AuditPolicyChanges
    SourceInitiated
    Monitor audit policy changes
    true
    http://schemas.microsoft.com/wbem/wsman/1/windows/EventLog
    Normal
    
            
                
            
        
    ]]>

"@
$SubscriptionXML | Out-File -FilePath "C:\temp\audit_subscription.xml" -Encoding UTF8
  1. Create PowerShell script for automated analysis:
# Monitor-AuditChanges.ps1
param(
    [int]$Hours = 24
)

$StartTime = (Get-Date).AddHours(-$Hours)
$Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4714; StartTime=$StartTime}

foreach ($Event in $Events) {
    $xml = [xml]$Event.ToXml()
    $UserName = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'SubjectUserName'} | Select-Object -ExpandProperty '#text'
    $Domain = $xml.Event.EventData.Data | Where-Object {$_.Name -eq 'SubjectDomainName'} | Select-Object -ExpandProperty '#text'
    
    # Send alert if change made by non-admin account
    if ($UserName -notmatch "admin|service") {
        Write-Warning "Suspicious audit policy change by $Domain\$UserName at $($Event.TimeCreated)"
        # Add SIEM integration here
    }
}
  1. Set up scheduled task to run the monitoring script:
$Action = New-ScheduledTaskAction -Execute "PowerShell.exe" -Argument "-File C:\Scripts\Monitor-AuditChanges.ps1"
$Trigger = New-ScheduledTaskTrigger -Daily -At "09:00AM"
$Principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -LogonType ServiceAccount
Register-ScheduledTask -TaskName "MonitorAuditChanges" -Action $Action -Trigger $Trigger -Principal $Principal
Pro tip: Integrate with Microsoft Sentinel or other SIEM solutions using the Windows Event Forwarding connector for real-time alerting on unauthorized audit policy changes.

Overview

Event ID 4714 is a security audit event that fires whenever the System Access Control List (SACL) is modified on a Windows system. This event is part of the advanced audit policy framework introduced in Windows Vista and refined through Windows 11 and Server 2025. The SACL controls which security events are audited for specific objects, users, or system components.

This event appears in the Security log when administrators modify audit policies through Group Policy, Local Security Policy, or programmatically via APIs. The event captures who made the change, what was changed, and when the modification occurred. In enterprise environments, this event is crucial for maintaining audit trail integrity and ensuring compliance with security frameworks like SOX, HIPAA, or PCI-DSS.

The event fires immediately after SACL modifications are committed to the system, making it valuable for real-time security monitoring. Security teams often configure SIEM systems to alert on this event, as unauthorized SACL changes could indicate privilege escalation attempts or insider threats trying to disable audit logging.

Frequently Asked Questions

What does Event ID 4714 mean and why is it important?+
Event ID 4714 indicates that the System Access Control List (SACL) has been modified on your Windows system. This is important because the SACL controls what security events get audited and logged. When someone changes audit policies, this event fires to create an audit trail of those changes. It's crucial for security monitoring because unauthorized modifications to audit settings could be an attempt to hide malicious activity by disabling logging.
How can I tell who made the audit policy change that triggered Event ID 4714?+
The Event ID 4714 details contain subject information showing exactly who made the change. Look for the SubjectUserName and SubjectDomainName fields in the event details. You can extract this information using PowerShell: Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4714} | ForEach-Object { $xml = [xml]$_.ToXml(); $xml.Event.EventData.Data | Where-Object {$_.Name -match 'Subject'} }. The event also includes the Security ID (SID) of the account that made the modification.
Is Event ID 4714 always a security concern?+
Not necessarily. Event ID 4714 is informational and can result from legitimate administrative activities like applying Group Policy updates, installing security software, or administrators manually adjusting audit policies. However, it becomes a security concern when: the changes are made by unauthorized users, occur outside of maintenance windows, disable critical audit categories, or happen frequently without explanation. Context and timing are key to determining if the event represents normal operations or potential security issues.
What audit policy categories are most commonly affected by Event ID 4714?+
The most commonly modified audit policy categories include Logon/Logoff events, Account Management, Object Access, Policy Change, and Privilege Use. In Windows 11 and Server 2025, you'll often see changes to Advanced Audit Policy subcategories like 'Audit Policy Change', 'Security Group Management', 'File Share Access', and 'Removable Storage'. These categories are frequently adjusted based on compliance requirements, security monitoring needs, or performance considerations since some audit categories can generate high volumes of events.
How can I prevent unauthorized changes that trigger Event ID 4714?+
To prevent unauthorized audit policy changes: 1) Implement proper role-based access control limiting who can modify audit policies, 2) Use Group Policy to enforce audit settings from a central location, making local changes ineffective, 3) Enable the 'Audit: Force audit policy subcategory settings' policy to prevent local overrides, 4) Monitor Event ID 4714 with SIEM tools for real-time alerting, 5) Regularly review audit policy configurations against your baseline, and 6) Consider using Windows Defender Application Control or similar tools to prevent unauthorized tools from modifying system security settings.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...