Windows Event ID 1102 - Security Log Cleared
Records when the Security event log is cleared. Critical indicator of potential anti-forensics activity, as attackers often clear logs to hide their tracks after compromising a system
Quick Facts
Default Path (Linux)
N/A (Windows Event Forwarding to SIEM)Default Format
Windows Event Log (EVTX)
JSON Native
No
Rotation
Windows Event Log settings (default 20MB)
Log Example
Default format: Windows Event Log Format
Example Log Entrylog
Log Name: Security
Source: Microsoft-Windows-Eventlog
Date: 2/1/2026 03:15:45 AM
Event ID: 1102
Task Category: Log clear
Level: Information
Keywords: Audit Success
User: CORP\attacker
Computer: WORKSTATION01.corp.local
Description:
The audit log was cleared.
Subject:
Security ID: S-1-5-21-1234567890-1234567890-1234567890-1234
Account Name: attacker
Domain Name: CORP
Logon ID: 0x87654321Structure:
XML-based binary formatPaths by Platform
Available Formats
Windows Event Log Format
Default
Example:
Log Name: Security
Source: Microsoft-Windows-Eventlog
Date: 2/1/2026 03:15:45 AM
Event ID: 1102
Task Category: Log clear
Level: Information
Keywords: Audit Success
User: CORP\attacker
Computer: WORKSTATION01.corp.local
Description:
The audit log was cleared.
Subject:
Security ID: S-1-5-21-1234567890-1234567890-1234567890-1234
Account Name: attacker
Domain Name: CORP
Logon ID: 0x87654321Structure:
XML-based binary formatXML Format
Example:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Eventlog" Guid="{fc65ddd8-d6ef-4962-83d5-6e5cfe9ce148}"/>
<EventID>1102</EventID>
<TimeCreated SystemTime="2026-02-01T03:15:45.123456789Z"/>
<EventRecordID>1</EventRecordID>
<Computer>WORKSTATION01.corp.local</Computer>
</System>
<UserData>
<LogFileCleared xmlns="http://manifests.microsoft.com/win/2004/08/windows/eventlog">
<SubjectUserSid>S-1-5-21-1234567890-1234567890-1234567890-1234</SubjectUserSid>
<SubjectUserName>attacker</SubjectUserName>
<SubjectDomainName>CORP</SubjectDomainName>
<SubjectLogonId>0x87654321</SubjectLogonId>
</LogFileCleared>
</UserData>
</Event>Structure:
Native XML representation of the eventJSON (Winlogbeat/NXLog)
Example:
{
"event_id": 1102,
"log_name": "Security",
"source_name": "Microsoft-Windows-Eventlog",
"computer_name": "WORKSTATION01.corp.local",
"time_created": "2026-02-01T03:15:45.123Z",
"user_data": {
"SubjectUserName": "attacker",
"SubjectDomainName": "CORP",
"SubjectLogonId": "0x87654321"
}
}Structure:
Structured JSON from log forwardersFields Reference
| Field | Type | Description | Example |
|---|---|---|---|
EventID | integer | Event identifier (always 1102 for security log cleared) | 1102 |
TimeCreated | datetime | Timestamp when the log was cleared | 2026-02-01T03:15:45.123Z |
Computer | string | Computer where the log was cleared | WORKSTATION01.corp.local |
SubjectUserName | string | Account that cleared the log | attacker |
SubjectDomainName | string | Domain of the account | CORP |
SubjectLogonId | string | Logon session ID for correlation | 0x87654321 |
Parsing Patterns
Grok Patterns
xml:
<SubjectUserName>%{DATA:subject_user}</SubjectUserName>.*<SubjectDomainName>%{DATA:subject_domain}</SubjectDomainName>Regular Expressions
xml:
SubjectUserName>(?P<subject_user>[^<]+)</SubjectUserName>.*SubjectDomainName>(?P<subject_domain>[^<]+)</SubjectDomainName>Collector Configurations
splunkyaml
1# Security log cleared events - HIGH PRIORITY2index=wineventlog EventCode=11023| table _time, Computer, SubjectUserName, SubjectDomainNameConfiguration
Enable Logging
Log clearing events are always recorded when the Security log is cleared
# This event is automatically generated and cannot be disabledLog To Syslog
Forward via Windows Event Forwarding (WEF) - CRITICAL to capture before local deletion
# Include in WEF subscription with high priorityUse Cases
Track log maintenance
Document legitimate log clearing for compliance
TimeCreated
SubjectUserName
Computer
Troubleshooting
Tested On
vWindows Server 2022 on Windows Server 2022
admin - 2026-02-01
Last updated: 2026-02-01 by admin
1 contributor
Community Discussions
Help improve this documentation
Found an error or want to add more examples? Contributions are welcome!