Windows Event ID 4935 serves as a critical security indicator within the Microsoft-Windows-Security-Auditing framework, specifically designed to detect and log excessive password reset attempts that could indicate malicious activity. This event is generated by the Local Security Authority (LSA) when the number of password reset requests for a specific user account exceeds the configured daily threshold.
The event mechanism operates independently of standard account lockout policies, focusing specifically on password reset operations. This separation ensures that legitimate authentication attempts aren't affected by password reset abuse, while still providing protection against attackers who might exploit self-service password reset functionality.
When this event fires, Windows temporarily blocks further password reset attempts for the affected account, typically for a 24-hour period. The exact duration and threshold values are configurable through Group Policy or local security policy settings. The event log entry includes comprehensive details such as the target account name, the source IP address or workstation name, and the timestamp of the triggering attempt.
In modern Windows environments, particularly those integrated with Azure AD or hybrid identity solutions, this event becomes increasingly important as password reset functionality is often exposed through web portals and mobile applications. The event helps administrators identify potential security threats while maintaining usability for legitimate users who may occasionally need to reset their passwords.