Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Detailed Tracking->Token Right Adjusted Events->EventID 4703 - A token right was adjusted.
EventID 4703 - A token right was adjusted.

This event generates when token privileges were enabled or disabled for a specific account’s token. As of Windows 10, event 4703 is also logged by applications or services that dynamically adjust token privileges.

Find more information about this event on ultimatewindowssecurity.com.
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/20/2016 9:22:27 AM
Event ID:      4703
Task Category: Token Right Adjusted Events
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      IIZHU2016.itss.wm.zhu.cn.qsft
Description:
A token right was adjusted.

Subject:
	Security ID:		SYSTEM
	Account Name:		IIZHU2016$
	Account Domain:		ITSS
	Logon ID:		0x3E7

Target Account:
	Security ID:		NULL SID
	Account Name:		IIZHU2016$
	Account Domain:		ITSS
	Logon ID:		0x3E7

Process Information:
	Process ID:		0x4c8
	Process Name:		C:\Windows\System32\svchost.exe

Enabled Privileges:
			SeSecurityPrivilege

Disabled Privileges:
			-
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Detailed Tracking
Source Microsoft-Windows-Security-Auditing
TaskCategory Token Right Adjusted Events
EventId 4703
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom -
Object Type -
Class Name -
Security ID -
Account Name -
Account Domain -
Subject: Account Domain Name of the domain that account initiating the action belongs to. InsertionString3 ITSS
Subject: Security ID InsertionString1 SYSTEM
Subject: Account Name InsertionString2 IIZHU2016$
Subject: Logon ID InsertionString4 0x3E7
Target Account: Security ID InsertionString5 NULL SID
Target Account: Account Name InsertionString6 IIZHU2016$
Target Account: Account Domain InsertionString7 ITSS
Target Account: Logon ID InsertionString8 0x3E7
Process Information: Process ID InsertionString10 0x4c8
Process Information: Process Name InsertionString9 C:\Windows\System32\svchost.exe
Enabled Privileges InsertionString11 SeSecurityPrivilege
Disabled Privileges InsertionString12 -
Comments
You must be logged in to comment