Event ID 4672 — Special Privileges Assigned to New Logon
Event ID 4672 is logged whenever an account logs on with sensitive or special privileges such as SeDebugPrivilege, SeImpersonatePrivilege, or SeTakeOwnershipPrivilege. It fires for every privileged logon, including administrators and service accounts.
MITRE ATT&CK
T1078 · Valid Accounts
Privilege Escalation
Security Relevance
Attackers who gain access to privileged accounts will trigger 4672 events. While this event is noisy in environments with many admins, unexpected accounts appearing in 4672 logs — especially after a credential attack — indicate privilege escalation or lateral movement. It's also a key indicator of pass-the-hash and token impersonation attacks.
Example Log Entry
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Event ID: 4672
Level: Information
Special privileges assigned to new logon.
Subject:
Security ID: CORP\svc-backup
Account Name: svc-backup
Account Domain: CORP
Logon ID: 0x4F3A1
Privileges: SeSecurityPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeTakeOwnershipPrivilege
SeDebugPrivilegeInvestigation Steps
- 1.Check the account — is this a known admin or service account? Unexpected accounts are the red flag, not the event itself.
- 2.Cross-reference the Logon ID with Event ID 4624 to see how the session was established (interactive, network, remote).
- 3.Note which privileges were assigned — SeDebugPrivilege and SeTakeOwnershipPrivilege are the most dangerous.
- 4.Look for 4672 events from service accounts that should never log on interactively.
- 5.Check the time — privileged logons outside business hours or during incidents deserve immediate attention.
- 6.Look for clusters of 4672 events from a single account in a short time — this may indicate credential reuse across systems.
Check your own logs for this technique — upload an EVTX file for instant detection, no account required.
Remediation
- ✓Apply least-privilege — accounts should only hold the privileges they need for their specific function.
- ✓Separate admin accounts from daily-use accounts — admins should use a dedicated privileged account.
- ✓Enable Privileged Access Workstations (PAWs) for sensitive admin tasks.
- ✓Review and trim group memberships regularly — remove stale admins.
- ✓Alert on 4672 for service accounts or non-admin accounts — these should never appear.
- ✓Implement JIT (Just-in-Time) access for privileged roles to reduce permanent membership.
Related Event IDs
Related Detection Guides
Analyze your Windows Event Logs
Upload an .evtx file from servers, domain controllers, or endpoints — get instant detections, MITRE mappings, and an AI-generated triage report.
Detect this technique in your logs →