Windows Event 1102 — Security Audit Log Cleared

WindowsEvents Windows Security Anti-Forensics / Evidence Tampering

What This Means

Investigate Windows Event 1102, logged when the Security event log is cleared. This is a critical indicator of anti-forensic activity and evidence tampering by attackers or insiders.

Example Log

The audit log was cleared.

Subject:
  Security ID:    S-1-5-21-3398...-500
  Account Name:   Administrator
  Account Domain: CONTOSO
  Logon ID:       0x3E7

Indicators of Suspicious Activity

How to Investigate

  1. Immediately identify the Subject account that cleared the log
  2. Check SIEM or centralized log storage for events that occurred before the clearing
  3. Review Event 4624 for the logon session (Logon ID) that performed the clear
  4. Investigate what activity occurred on the system in the hour before the clear
  5. Check other servers for similar log clearing activity (coordinated attack)
  6. Preserve any remaining forensic artifacts (memory, prefetch, shimcache)

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

Why is Event 1102 so important?
Event 1102 is one of the strongest indicators of malicious activity because attackers clear security logs to destroy evidence of their actions. It is one of the few events that should trigger an immediate investigation every time it occurs.
Can I prevent the Security log from being cleared?
You cannot fully prevent it if the attacker has admin privileges, but you can mitigate it by forwarding events to a SIEM in real-time. The 1102 event itself is written before the log is cleared, so it will be captured.
What information is lost when the Security log is cleared?
All Security events prior to the clear are destroyed from the local log. This includes logon events, privilege use, process creation, and policy changes. Only events forwarded to a central system before the clear will survive.