Windows Event ID 4719 — System Audit Policy Changed
Logged when the system's audit policy is modified — which controls what events get recorded in the Security log.
MITRE ATT&CK
Technique
T1562.002 · Disable Windows Event Logging
Tactic
Defense Evasion
Why It Matters
Attackers reduce audit policy coverage to blind defenders before carrying out their main actions. Disabling auditing for logon events or process creation before an attack leaves no trail.
Key Fields
Subject Account NameWho changed the policy
CategoryWhich audit category was changed (e.g. Logon/Logoff, Process Tracking)
SubcategoryThe specific subcategory changed
ChangesSuccess/Failure auditing enabled or disabled
Investigation Tips
- 1.Any reduction in audit policy coverage (Success/Failure removed) outside of authorized changes is suspicious.
- 2.Check if this was done via Group Policy (expected) or directly via auditpol.exe (potentially suspicious).
Related Event IDs
See Event ID 4719 in your logs
Upload a Windows Event Log (.evtx) file — EventPeeker automatically detects system audit policy changed patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Analyze EVTX Logs Free →