ANAVEM
Languagefr
Windows security monitoring dashboard showing Event Viewer with security audit logs and system access events
Event ID 4717InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4717 – Microsoft-Windows-Security-Auditing: System Security Access Was Granted

Event ID 4717 logs when a user or process is granted system security access privileges, typically involving sensitive security operations like backup, restore, or system-level access rights.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 20269 min read 0
Event ID 4717Microsoft-Windows-Security-Auditing 5 methods 9 min
Event Reference

What This Event Means

Event ID 4717 represents a security audit event that Windows generates when the system grants security access privileges to a user, service, or process. This event is part of the Object Access audit category and specifically tracks when security descriptors are modified or when security-related privileges are assigned.

The event contains detailed information about the privilege assignment, including the target account, the type of access granted, the requesting process, and the security context. Windows generates this event through the Local Security Authority (LSA) subsystem when security tokens are created or modified with elevated privileges.

In Windows Server 2025 and Windows 11 24H2, Microsoft enhanced the event logging to include additional context about the privilege assignment source and improved correlation with related security events. The event helps administrators track compliance with security policies and identify potential privilege abuse or unauthorized access attempts.

This event is particularly important in environments with strict security requirements, such as financial institutions, healthcare organizations, and government agencies where every privilege assignment must be audited and tracked for compliance purposes.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • Service account privilege modifications during service startup or configuration changes
  • Administrative tools requesting elevated security permissions for system operations
  • Backup and restore operations requiring system-level access rights
  • Security policy changes that modify user or group privileges
  • Application installations that require security-sensitive permissions
  • Group Policy updates that affect security access rights
  • Domain controller operations involving security principal modifications
  • Certificate services operations requiring cryptographic privileges
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of Event ID 4717 to understand what access was granted and to whom.

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 4717 by right-clicking the Security log and selecting Filter Current Log
  4. Enter 4717 in the Event IDs field and click OK
  5. Double-click on a 4717 event to view detailed information including:
    • Subject account name and domain
    • Target account or object
    • Access rights granted
    • Process name and ID
    • Logon ID for correlation

Use PowerShell to query recent events:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4717} -MaxEvents 50 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
02

Correlate with Related Security Events

Analyze Event ID 4717 alongside related security events to understand the complete security context.

  1. Identify the Logon ID from the 4717 event details
  2. Search for related events using the same Logon ID:
# Replace 0x12345 with the actual Logon ID from your 4717 event
$LogonId = '0x12345'
Get-WinEvent -FilterHashtable @{LogName='Security'} | Where-Object {$_.Message -like "*$LogonId*"} | Select-Object TimeCreated, Id, Message
  1. Look for these correlated events:
    • Event ID 4624 (Successful logon)
    • Event ID 4672 (Special privileges assigned)
    • Event ID 4648 (Logon using explicit credentials)
    • Event ID 4625 (Failed logon attempts)
  2. Create a timeline of events to understand the security operation sequence
Pro tip: Use the Logon ID as a correlation key to track the complete security session from logon to privilege assignment.
03

Analyze Process and Service Context

Investigate the process or service that requested the security access to determine if the privilege assignment is legitimate.

  1. Extract the process information from the Event ID 4717 details
  2. Verify the process legitimacy using PowerShell:
# Check running processes and their security context
Get-Process | Where-Object {$_.ProcessName -eq 'ProcessNameFromEvent'} | Select-Object Id, ProcessName, Path, StartTime

# Verify digital signature of the process
Get-AuthenticodeSignature -FilePath "C:\Path\To\Process.exe"
  1. Check if the process is a known system service:
Get-Service | Where-Object {$_.ServiceName -like '*ServiceName*'} | Select-Object Name, Status, StartType, ServiceType
  1. Review the process security context and privileges:
# Check process privileges (requires administrative access)
whoami /priv

# For specific process analysis, use Process Monitor or Process Explorer
  1. Validate against your organization's approved software inventory
04

Configure Advanced Security Auditing

Enhance your security monitoring by configuring detailed audit policies to capture more context around Event ID 4717.

  1. Open Local Security Policy or Group Policy Management Console
  2. Navigate to Computer ConfigurationWindows SettingsSecurity SettingsAdvanced Audit Policy Configuration
  3. Configure these audit subcategories:
    • Audit Security System Extension - Success and Failure
    • Audit Security State Change - Success and Failure
    • Audit System Integrity - Success and Failure
  4. Apply the policy using PowerShell:
# Enable advanced security auditing
auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable
auditpol /set /subcategory:"Security State Change" /success:enable /failure:enable
auditpol /set /subcategory:"System Integrity" /success:enable /failure:enable

# Verify current audit settings
auditpol /get /category:"System"
  1. Configure Windows Event Forwarding for centralized monitoring:
# Configure event forwarding subscription
wecutil cs subscription.xml

# Check subscription status
wecutil gs SubscriptionName
05

Implement Automated Monitoring and Alerting

Set up automated monitoring to detect unusual patterns in Event ID 4717 occurrences that might indicate security issues.

  1. Create a PowerShell script for continuous monitoring:
# Monitor Event ID 4717 with alerting
$Query = @"

  
    
  

"@

# Register event watcher
Register-WmiEvent -Query "SELECT * FROM Win32_NTLogEvent WHERE LogFile='Security' AND EventCode=4717" -Action {
    $Event = $Event.SourceEventArgs.NewEvent
    Write-Host "Security access granted: $($Event.Message)"
    # Add your alerting logic here
}
  1. Configure Windows Event Log forwarding to SIEM systems
  2. Set up custom views in Event Viewer for quick analysis:
# Custom view XML for Event Viewer

  
    
  
  1. Create scheduled tasks for regular security access reviews:
# Create scheduled task for daily security review
$Action = New-ScheduledTaskAction -Execute "PowerShell.exe" -Argument "-File C:\Scripts\SecurityReview.ps1"
$Trigger = New-ScheduledTaskTrigger -Daily -At "06:00AM"
Register-ScheduledTask -TaskName "Daily Security Access Review" -Action $Action -Trigger $Trigger
Warning: Excessive security auditing can impact system performance. Monitor disk space usage and consider log rotation policies.

Overview

Event ID 4717 fires when Windows grants system security access to a user account or process. This event appears in the Security log whenever the system assigns or modifies security-related privileges that allow access to sensitive system functions. The event typically occurs during privilege escalation scenarios, service account modifications, or when applications request elevated security permissions.

This audit event is part of Windows advanced security auditing and requires specific audit policies to be enabled. The event captures critical information about who received the access, what type of access was granted, and the context in which the privilege assignment occurred. System administrators use this event to track privilege escalations and monitor security-sensitive operations across their Windows infrastructure.

The event fires most commonly during service startups, administrative tool launches, backup operations, and security policy modifications. Understanding this event is crucial for maintaining proper security oversight in enterprise environments where privilege management and access control are paramount.

Frequently Asked Questions

What does Event ID 4717 indicate and should I be concerned?+
Event ID 4717 indicates that Windows granted system security access to a user or process. This is typically normal behavior during legitimate operations like service startups, administrative tasks, or backup operations. However, you should investigate if you see unusual patterns, unknown processes, or access granted to unexpected user accounts. The event itself is informational and indicates successful privilege assignment, but the context determines whether it represents normal or suspicious activity.
How can I determine if an Event ID 4717 represents a security threat?+
To assess potential security threats, examine the process name, user account, and timing of the event. Legitimate events typically involve known system processes, service accounts, or administrative users during expected operational windows. Red flags include unknown processes, user accounts that shouldn't have elevated privileges, events occurring during off-hours, or multiple rapid privilege assignments. Cross-reference the process with your approved software inventory and verify digital signatures of executable files involved in the privilege assignment.
Why am I not seeing Event ID 4717 in my Security log?+
Event ID 4717 requires specific audit policies to be enabled. You need to configure 'Audit Security System Extension' and related Object Access audit subcategories in your Local Security Policy or Group Policy. Additionally, ensure that your system's audit policy is set to capture success events for security-related operations. Use 'auditpol /get /category:System' to verify current settings and enable the necessary audit subcategories using 'auditpol /set' commands or Group Policy configuration.
Can Event ID 4717 help with compliance auditing requirements?+
Yes, Event ID 4717 is valuable for compliance auditing as it provides a detailed audit trail of security privilege assignments. The event captures who received access, when it was granted, and the context of the privilege assignment. This information supports compliance frameworks like SOX, HIPAA, and PCI-DSS that require monitoring of privileged access. Ensure you're collecting these events centrally, retaining them according to your compliance requirements, and regularly reviewing them for unauthorized privilege escalations or policy violations.
How do I reduce false positives when monitoring Event ID 4717?+
To reduce false positives, establish baselines of normal Event ID 4717 activity in your environment by documenting legitimate processes, service accounts, and typical operational patterns. Create filtering rules that exclude known good processes and expected service account activities. Focus monitoring on events involving interactive user accounts, unknown processes, or activities outside normal business hours. Implement correlation rules that consider multiple events together rather than individual 4717 events in isolation, and regularly update your baseline as your environment changes.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...