Chapter 10
Privilege Use Events
You can use the Privilege Use audit category to track the
exercise of user rights. Microsoft uses the terms privilege, right, and permission inconsistently. In the case of this audit
category, privilege refers to most
of the user rights that you find in the Local Security Policy under Security
Settings\Local Policies\User Rights Assignment — with one important
exception. Intermingled within those user rights are logon rights. Logon rights
such as Allow logon locally and Access this computer from the network are not addressed by the Privilege Use category because they aren’t technically user rights. (To find out when a logon right is exercised, you can refer to the Logon/Logoff category’s Logon subcategory, which we discussed in Chapter 5).
The chart below lists the subcategories of the Privilege Use
category, along with the privileges that Microsoft considers Sensitive
Privilege Use and Non Sensitive Privilege Use. We have not observed any events
in the Non Sensitive Privilege Use subcategory, and most of the listed
privileges in this category are not audited.
Privilege Use Subcategories
|
Included Privileges
|
Sensitive Privilege Use
|
Act as part of the operating system
Back up files and directories
Create a token object
Debug programs
Enable computer and user accounts to be trusted for delegation
Generate security audits
Impersonate a client after authentication
Load and unload device drivers
Manage auditing and security log
Modify firmware environment values
Replace a process-level token
Restore files and directories
Take ownership of files or other objects
|
Non Sensitive Privilege Use
|
Access Credential Manager as a trusted caller
Access this computer from the network
Add workstations to domain
Adjust memory quotas for a process
Allow logon locally
Allow logon through Terminal Services
Bypass traverse checking
Change the system time
Create a pagefile
Create global objects
Create permanent shared objects
Create symbolic links
Deny access this computer from the network
Deny log on as a batch job
Deny log on as a service
Deny log on locally
Deny log on through Terminal Services
Force shutdown from a remote system
Increase a process working set
Increase scheduling priority
Lock pages in memory
Log on as a batch job
Log on as a service
Modify an object label
Perform volume maintenance tasks
Profile single process
Profile system performance
Remove computer from docking station
Shut down the system
Synchronize directory service data
|
Other Privilege Use Events
|
No events in this subcategory
|
The Privilege Use category logs two events.
Event ID
|
Title
|
4673
|
A privileged service was called
|
4674
|
An operation was attempted on a privileged object
|
For most user rights, Windows logs a Privilege Use event
when a user exercises the right. However, some rights are exercised so
frequently during the normal course of a user’s activities that the Security
log would quickly fill if Windows were to log each use. Therefore Windows
doesn’t normally log some rights. Among these high-use rights are Back up
files and directories and Restore files and directories.
You can force Windows to log these two rights
by enabling the Audit: Audit the use of Backup and Restore privilegesecurity option, but enabling this option will
result in a Privilege Use event being logged for every single file, folder, and
other object during system backups, overwhelming your log with events of
questionable value.
Backup and Restore privileges are also used at other
times, specifically whenever an application attempts access through the NTFS
backup API. For normal user rights, Windows logs either event ID
4673 or event ID 4674 when right is exercised. As mentioned earlier, logon
rights are never logged by Privilege Use events: The use of logon rights is
documented by Logon/Logoff events. Event ID 4674 has to do with a privilege
that is used to access an object. Therefore, this event lists the object name.
Event ID 4673 lists the affected process and service name.
System Name of Privilege
|
Description
|
Notes
|
SeTcbPrivilege
|
Act as part of the operating system
|
Logged frequently Event 4673
|
SeMachineAccountPrivilege
|
Add workstations to domain
|
Not logged
|
SeBackupPrivilege
|
Back up files and directories
|
Logged only when the
Audit the use of Backup and
Restore privilege
security option is enabled
|
SeCreatePermanentPrivilege
|
Create permanent shared objects
|
|
SeEnableDelegationPrivilege
|
Enable computer and user accounts to be trusted for
delegation
|
|
SeRemoteShutdownPrivilege
|
Force shutdown from a remote system
|
|
SeLoadDriverPrivilege
|
Load and unload device drivers
|
|
SeRestorePrivilege
|
Restore files and directories
|
Logged only when the
Audit the use of Backup and
Restore privilege
security option is enabled
|
SeSecurityPrivilege
|
Manage auditing and Security log
|
Event 4674
|
SeShutdownPrivilege
|
Shut down the system
|
Event 4674
|
SeTakeOwnershipPrivilege
|
Take ownership of files or other objects
|
Event 4674
|
SeIncreaseBasePriorityPrivilege
|
Increase Scheduling Priority
|
Event 4673
|
By default, the following rights are suppressed and not
audited by the Privilege Use category:
- ChangeNotifyPrivilege
- AuditPrivilege
- CreateTokenPrivilege
- AssignPrimaryTokenPrivilege
- BackupPrivilege
- RestorePrivilege
- DebugPrivilege
Bottom Line
The Privilege Use category generates a lot of noise, and we
usually recommend leaving it disabled. In fact, Microsoft’s former Security log
guru,
Eric Fitzgerald, as much as says that this audit policy and its events are
useless because no “central reference” of which operations are controlled by
each privilege exists. That lack reduces the value of this category.