Sounds like some auditing was enabled.
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-main-mode
--please don't forget to Accept as answer if the reply is helpful--
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
When I log in to the window server 2012. the account may trigger the server to query the existence of a blank password for all of the local account in the server (Event ID 4797)
In the security event log, there will be a list of action logged to indicate that my account queried the existence of a blank password for all of the local account in the server.
What are the causes to lead this abnormal action?
As the query actions are not triggered every time when I log in the server. There is only some chances to trigger the action.
What condition will trigger the account to query the existence of a blank password for all of the local account in the server ?
Are there any security issues for the query action?
Thanks.
Sounds like some auditing was enabled.
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-main-mode
--please don't forget to Accept as answer if the reply is helpful--
Hello,
Thank you so much for posting here.
According to my research, it is EventID 4797 - An attempt was made to query the existence of a blank password for an account. But it is Event ID 4979 according to our description. We could kindly have a recheck about the event ID.
As Dave mentioned, it looks like a security audit. The condition would be security auditing.
Open a command prompt as administrator, type the following command. Then we could check the output.
auditpol /get /category:*
The User Account Management category is probably the culprit. We could kindly check about this.
Reference: https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4797
For any question, please feel free to contact us.
Please note: Information posted in the given link is hosted by a third party. Microsoft does not guarantee the accuracy and effectiveness of information.
Best regards,
Hannah Xiong
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.
From the above reference website ,
Someone said that
One of these events is logged for each local account when one of these two things happens:
Windows shouldn't need to do that check until the user clicks on one of the other users on the logon screen or in the switch list, but it does.
I tried to simulate issues again with the above condition. However, there is not any 4797 actions logged in the event log.
I am doubt that is there any other condition can trigger the 4797 action.
I have another server that also enabled User account management, but it rare / not ever trigger 4797 action. Are there any Microsoft information page that explain how can trigger this event - 4797?
Another guys said that
The Level of Auditing is Informational and not a Warning or Error. This event can be safely ignored as it is only for informational purpose and to check if by any chance user is set for Blank password. You only see this event if only auditing is enabled and this event does not imply any breach in the system
Will this event /action reveal any security issues of the server or we can safely ignore it ?
Thanks.
Hello @Peter Fong ,
Thank you so much for your feedback.
I have done lots of research about this action, but so sorry that there is no Microsoft information page that explain how can trigger this event. Below is the Microsoft information page about this event.
As per my research, It may be an effect of automated default password matching software making queries. Reference:
https://social.technet.microsoft.com/Forums/ie/en-US/925fbef3-db0c-4b97-8174-b54c6a551f3c/windows-81-an-attempt-was-made-to-query-the-existence-of-a-blank-password-for-an-account?forum=w8itprosecurity
According to the below article, "
There is a lot of confusion about this event and no good explanation. If you see this event for many different target account names I would investigate. Or if you see this event on many different systems where caller workstation name is the same. Otherwise ignore.
More: This event is worthless. I just set up a new Windows 10 VM, installed one very safe piece of software on it, and logged on as a non-admin user. After logon, that user, according to the security log, queried the existence of a blank password for every local account on the system. I'm certain the system is clean of malware. If this event at least included the process that made the request we'd have a chance of tracking down what is causing it but all you get is the target account and who did it."
Reference: https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4797
So sorry that more useful information could not be provided. Thank you so much for your understanding and support.
Please note: Information posted in the given link is hosted by a third party. Microsoft does not guarantee the accuracy and effectiveness of information.
Best regards,
Hannah Xiong
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.
@Anonymous
After multiple scanning, there do not have any spyware in the server.
Any other suggestion?
Also, anyone can explain more about how this event will be triggered?
Thank you very much!!