EventID 4688: A new process has been created
Last updated
Last updated
This event, logged to the Security
channel, indicates a process was created on the system.
This event requires the Audit Process Creation
policy to be configured, which is by default not configured.
Windows 11
⚠️
Server 2019
⚠️
Windows 10
⚠️
Server 2016
⚠️
Windows 8
⚠️
Server 2012
⚠️
Windows 7
⚠️
Server 2008
⚠️
Windows Vista
⚠️
Server 2003
⚠️
Windows XP
⚠️
In Windows XP/Windows Server 2003, the corresponding Event ID is 592
.
For the events to contain the full command line for each logged process, an additional policy called Include command line in process creation events
must also be configured.
%SystemRoot%\System32\Winevt\Logs\Security.evtx
EventData/SubjectLogonId
Provides the LogonID of the account that spawned the new process
EventData/NewProcessName
Provides the full path of the application that was spawned
EventData/CommandLine
The command line that spawned the new process
EventData/SubjectUserSid
The SID of the account that spawned the process
EventData/SubjectUserName
The username of the account that spawned the new process
EventData/SubjectDomainName
The domain name of the account that spawned the new process, if it exists. If the user is not a domain user, this field will be -
EventData/TokenElevationType
EventData/NewProcessID
The process ID of the newly spawned process
EventData/ProcessID
The process ID of the parent process
The EventData\TokenElevationType
field relates to UAC. The following interpretations are made possible by this field:
%%1936
indicates that UAC is disabled on the system, or that the local administrator account launched the process.
%%1937
indicates that the user manually ran the process as an administrator, or that the program requested administrative privileges upon execution.
%%1938
indicates that the process did not run with administrator privileges.
In the event that UAC was used to elevate permissions in order to execute an application, this information will be stored in the Target
fields instead.
In the event that Process Tracking is enabled (defaults to disabled), the full command line will be available in the Process Command Line
field.
In order for this to be available, the system's policy must be enabled under Computer Configuration/Administrative Templates/System/Audit Process Creation/Include command line in process creation events
.
In the following example, notepad.exe
was launched by a user through Explorer.
This example was produced on Windows 10, Version 10.0.19044 Build 19044
In the following example, regedit.exe
was launched by a user through the command line. Note the TokenElevationType
has a value of %%1937
, indicating they were likely prompted for administrative credentials/permissions. This also causes the user information to be stored in the Target
fields, as opposed to the Subject
fields as seen in the previous example.
This example was produced on Windows 10, Version 10.0.19044 Build 19044
The token elevation type, related to UAC (see )