Windows Event ID 4688 - Process Creation
Records the creation of every new process, including executable path, command line arguments (when enabled), parent process, and security context. Critical for detecting malware execution, suspicious commands, and living-off-the-land attacks
Quick Facts
Default Path (Linux)
N/A (Windows Event Forwarding to SIEM)Default Format
Windows Event Log (EVTX)
JSON Native
No
Rotation
Windows Event Log settings (recommend 1GB+ for process auditing)
Log Example
Default format: Windows Event Log Format
Example Log Entrylog
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 1/29/2026 10:30:45 AM
Event ID: 4688
Task Category: Process Creation
Keywords: Audit Success
Computer: WORKSTATION01.corp.local
Description:
A new process has been created.
Creator Subject:
Account Name: jsmith
Account Domain: CORP
Logon ID: 0x12345678
Process Information:
New Process ID: 0x1234
New Process Name: C:\Windows\System32\cmd.exe
Creator Process ID: 0x5678
Creator Process Name: C:\Windows\explorer.exe
Process Command Line: cmd.exe /c whoami /allStructure:
XML-based binary formatPaths by Platform
Available Formats
Windows Event Log Format
Default
Example:
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 1/29/2026 10:30:45 AM
Event ID: 4688
Task Category: Process Creation
Keywords: Audit Success
Computer: WORKSTATION01.corp.local
Description:
A new process has been created.
Creator Subject:
Account Name: jsmith
Account Domain: CORP
Logon ID: 0x12345678
Process Information:
New Process ID: 0x1234
New Process Name: C:\Windows\System32\cmd.exe
Creator Process ID: 0x5678
Creator Process Name: C:\Windows\explorer.exe
Process Command Line: cmd.exe /c whoami /allStructure:
XML-based binary formatXML Format
Example:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Security-Auditing"/>
<EventID>4688</EventID>
<Computer>WORKSTATION01.corp.local</Computer>
</System>
<EventData>
<Data Name="SubjectUserName">jsmith</Data>
<Data Name="NewProcessName">C:\Windows\System32\cmd.exe</Data>
<Data Name="CommandLine">cmd.exe /c whoami /all</Data>
<Data Name="ParentProcessName">C:\Windows\explorer.exe</Data>
</EventData>
</Event>Structure:
Native XML representationFields Reference
| Field | Type | Description | Example |
|---|---|---|---|
EventID | integer | Event identifier (always 4688) | 4688 |
TimeCreated | datetime | Timestamp when process was created | 2026-01-29T10:30:45.123Z |
Computer | string | Computer where process was created | WORKSTATION01.corp.local |
SubjectUserName | string | Account that created the process | jsmith |
SubjectDomainName | string | Domain of the creator account | CORP |
NewProcessId | string | Process ID of new process (hex) | 0x1234 |
NewProcessName | string | Full path of the executable | C:\Windows\System32\cmd.exe |
CommandLine | string | Full command line (requires GPO to enable) | cmd.exe /c whoami /all |
ProcessId | string | Parent process ID (hex) | 0x5678 |
ParentProcessName | string | Full path of parent process | C:\Windows\explorer.exe |
TokenElevationType | string | Token elevation type | %%1936 |
Parsing Patterns
Grok Patterns
xml:
<Data Name="NewProcessName">%{DATA:process_name}</Data>.*<Data Name="CommandLine">%{DATA:command_line}</Data>Regular Expressions
xml:
NewProcessName">(?P<process_name>[^<]+)</Data>.*CommandLine">(?P<command_line>[^<]*)</Data>Collector Configurations
splunkyaml
1# Suspicious processes (LOLBins)2index=wineventlog EventCode=46883 (NewProcessName="*\\powershell.exe" OR NewProcessName="*\\cmd.exe" OR4 NewProcessName="*\\mshta.exe" OR NewProcessName="*\\certutil.exe")5| table _time, Computer, SubjectUserName, NewProcessName, CommandLine, ParentProcessName67# Encoded PowerShell commands8index=wineventlog EventCode=4688 NewProcessName="*\\powershell.exe"9 (CommandLine="*-enc*" OR CommandLine="*-EncodedCommand*")10| table _time, Computer, SubjectUserName, CommandLine1112# Office spawning command shells13index=wineventlog EventCode=468814 ParentProcessName IN ("*\\WINWORD.EXE", "*\\EXCEL.EXE")15 NewProcessName IN ("*\\cmd.exe", "*\\powershell.exe")16| table _time, Computer, ParentProcessName, NewProcessName, CommandLineConfiguration
Enable Logging
Enable process creation auditing and command line logging
# Enable Process Creation auditing
auditpol /set /subcategory:"Process Creation" /success:enable
# CRITICAL: Enable command line logging
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /fCommand line logging is disabled by default but essential
Log To Syslog
Forward via WEF (high volume)
# Consider filtering noisy processes like conhost.exeUse Cases
Process inventory
Track applications run across environment
NewProcessName
SubjectUserName
Computer
Troubleshooting
Tested On
vWindows Server 2022 on Windows Server 2022
admin - 2026-01-29
Last updated: 2026-01-29 by admin
1 contributor
Community Discussions
Help improve this documentation
Found an error or want to add more examples? Contributions are welcome!