Event ID 6273 represents a successful completion of the RADIUS authentication and authorization process within Microsoft's Network Policy Server infrastructure. When a client device attempts to connect to a network resource protected by 802.1X authentication, VPN gateway, or wireless access point configured for RADIUS authentication, the request flows through NPS for policy evaluation.
The event generates after NPS validates the client's credentials against Active Directory, evaluates applicable network policies, and determines that access should be granted based on configured conditions. This includes checking user group memberships, device compliance status, time-based restrictions, and location-based policies depending on your NPS configuration.
The event record contains comprehensive details including the client's IP address, MAC address, authentication method used (such as PEAP-MSCHAPv2, EAP-TLS, or PAP), the network policy that granted access, and session-specific identifiers. These details prove invaluable for security auditing, compliance reporting, and troubleshooting network access issues.
In modern Windows Server 2025 environments, this event integrates with advanced security features like conditional access policies and device compliance checks, making it a critical component of zero-trust network architectures.