Windows Event ID 1102

Windows Event ID 1102

One-liner: A Windows Security Event indicating the Security audit log was clearedβ€”a strong indicator of attacker anti-forensics activity.

🎯 What Is It?

Windows Event ID 1102 is generated whenever the Security event log is cleared. This is a critical detection opportunity because:

Channel: Security
MITRE ATT&CK: T1070.001 - Indicator Removal on Host: Clear Windows Event Logs

πŸ”¬ How It Works

Event Details

<Event>
  <System>
    <EventID>1102</EventID>
    <Channel>Security</Channel>
    <Computer>WKSTN-1.domain.local</Computer>
  </System>
  <UserData>
    <LogFileCleared>
      <SubjectUserName>attacker</SubjectUserName>
      <SubjectDomainName>DOMAIN</SubjectDomainName>
      <SubjectLogonId>0x3e7</SubjectLogonId>
    </LogFileCleared>
  </UserData>
</Event>

Key Fields

Field Description
SubjectUserName Account that cleared the logs
SubjectDomainName Domain of the account
SubjectLogonId Logon session ID (correlate with Event ID 4624)

Common Methods Attackers Use

# Windows Command Prompt
wevtutil cl Security
wevtutil cl System
wevtutil cl Application

# PowerShell
Clear-EventLog -LogName Security
[System.Diagnostics.Eventing.Reader.EventLogSession]::GlobalSession.ClearLog("Security")

# Clear all logs
for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"

πŸ•΅οΈ Detection & Hunting

KQL Query (from THM Threat Hunting Foothold)

host.name: WKSTN-* AND winlog.event_id: 1102

Investigation Steps

  1. Identify who cleared the logs (SubjectUserName)
  2. Correlate with preceding events using Logon ID
  3. Check other log sources (Sysmon, PowerShell, network)
  4. Use "View Surrounding Documents" in Kibana to see what happened before

Correlating with Command Execution

Look for the command that cleared the logs:

# Find wevtutil or Clear-EventLog execution
host.name: WKSTN-* AND (process.name: wevtutil.exe OR *Clear-EventLog*)
Event ID Log Description
1102 Security Security log cleared
104 System System log cleared
1100 Security Event logging service shutdown
4719 Security System audit policy changed

🎀 Interview Angles

Common Questions

STAR Story

Situation: During incident response, we noticed gaps in Security event logs on a compromised workstation.
Task: Determine if logs were intentionally cleared and recover what happened.
Action: Found Event ID 1102 showing Security log was cleared by a local admin account. Used the SubjectLogonId to correlate with Sysmon logs (which weren't cleared) and found the attacker's commands. Also pulled logs from the SIEM where they had been forwarded before deletion.
Result: Recovered full attack timeline despite local log deletion. Implemented real-time log forwarding and alerting on Event ID 1102.

βœ… Best Practices

❌ Common Misconceptions

πŸ“š References