Folder Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Privilege Use
Privilege Use
Events in this category track each instance of a user exercising a user right.
Privilege refers to the user rights you find in the Local Security Policy under Security Settings\Local Policies\User Right Assignment.

By default audits are not generated for use of the following user rights, even if success audits or failure audits are specified for "Audit privilege use":
  • Bypass traverse checking
  • Debug programs
  • Create a token object
  • Replace process level token
  • Generate security audits
  • Back up files and directories
  • Restore files and directories

This category generates a lot of noise and it is recommended to disable auditing for these events. The problem is that there is no clear information about which user operations are actually controlled by each privilege.

Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Privilege Use
Source Microsoft-Windows-Security-Auditing
Field Matching
FieldDescriptionSample Value
DateTime Date/Time of event origination in GMT format. 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Security
Type Warning, Information, Error, Success, Failure, etc. Success
User Domain\Account name of user/service/computer initiating event. RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. DC1
EventID Numerical ID of event. Unique within one Event Source. 576
Description The entire unparsed event message. Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) Security
Task Category A name for a subclass of events within the same Event Source.
Level Warning, Information, Error, etc.
Keywords Audit Success, Audit Failure, Classic, Connection etc.
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Account Logon
Object Name
Object Type
Class Name
Security ID
Account Name
Account Domain
Subject: Security ID Security ID of the account that performed the action. Usually resolved to Domain\Name in home environment. S-1-5-18
Subject: Account Name Name of the account that initiated the action. DCC1$
Subject: Account Domain Name of the domain that account initiating the action belongs to. LOGISTICS
Subject: Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. 0x3e7