Windows Privilege Constants Reference

Privilege constants appear in the Privileges field of Microsoft-Windows-Security-Auditing events: primarily 4672 (special privileges assigned to new logon), 4673 (privileged service called), and 4674 (operation attempted on privileged object). The %%NNNN tokens in raw XML resolve to the descriptions below.

Privilege Constants#

35 privileges

ConstantDescriptionmsobjs Code
SeAssignPrimaryTokenPrivilegeReplace a process-level token%%1603
SeLockMemoryPrivilegeLock pages in memory%%1604
SeIncreaseQuotaPrivilegeAdjust memory quotas for a process%%1605
SeTcbPrivilegeAct as part of the operating system%%1607
SeSecurityPrivilegeManage auditing and security log%%1608
SeTakeOwnershipPrivilegeTake ownership of files or other objects%%1609
SeLoadDriverPrivilegeLoad and unload device drivers%%1610
SeSystemProfilePrivilegeProfile system performance%%1611
SeSystemtimePrivilegeChange the system time%%1612
SeProfileSingleProcessPrivilegeProfile single process%%1613
SeIncreaseBasePriorityPrivilegeIncrease scheduling priority%%1614
SeCreatePagefilePrivilegeCreate a pagefile%%1615
SeCreatePermanentPrivilegeCreate permanent shared objects%%1616
SeBackupPrivilegeBack up files and directories%%1617
SeRestorePrivilegeRestore files and directories%%1618
SeShutdownPrivilegeShut down the system%%1619
SeDebugPrivilegeDebug programs%%1620
SeAuditPrivilegeGenerate security audits%%1621
SeSystemEnvironmentPrivilegeModify firmware environment values%%1622
SeChangeNotifyPrivilegeBypass traverse checking%%1623
SeRemoteShutdownPrivilegeForce shutdown from a remote system%%1624
SeCreateTokenPrivilegeCreate a token object
SeImpersonatePrivilegeImpersonate a client after authentication
SeCreateGlobalPrivilegeCreate global objects
SeMachineAccountPrivilegeAdd workstations to domain
SeManageVolumePrivilegePerform volume maintenance tasks
SeRelabelPrivilegeModify an object label
SeIncreaseWorkingSetPrivilegeIncrease a process working set
SeTimeZonePrivilegeChange the time zone
SeUndockPrivilegeRemove computer from docking station
SeEnableDelegationPrivilegeEnable computer and user accounts to be trusted for delegation
SeTrustedCredManAccessPrivilegeAccess Credential Manager as a trusted caller
SeSyncAgentPrivilegeSynchronize directory service data
SeCreateSymbolicLinkPrivilegeCreate symbolic links
SeDelegateSessionUserImpersonatePrivilegeObtain an impersonation token for another user in the same session

Privileges Commonly Monitored#

The following privileges are frequently flagged in detection rules because they grant powerful capabilities:

ConstantRiskCommon Detection
SeDebugPrivilegeProcess injection, credential dumping (e.g. Mimikatz)Event 4672 with this privilege on non-admin accounts
SeTcbPrivilegeFull OS-level trust: token manipulationEvent 4672 on non-SYSTEM accounts
SeLoadDriverPrivilegeLoad kernel drivers: rootkit installationEvent 4672 on standard user accounts
SeBackupPrivilegeRead any file regardless of ACL: SAM/NTDS extractionEvent 4672 or 4674 on non-backup accounts
SeRestorePrivilegeWrite any file regardless of ACLEvent 4672 on non-backup accounts
SeImpersonatePrivilegeToken impersonation attacks (Potato exploits)Event 4672 on service accounts
SeTakeOwnershipPrivilegeTake ownership to bypass ACLsEvent 4674 usage by non-admin
SeAssignPrimaryTokenPrivilegeProcess token replacementEvent 4672 on non-service accounts

Source: Windows SDK, msobjs.dll message table (Windows 11 25H2, build 26100)