Windows Event ID 4113 is generated by the kernel-level time management subsystem whenever the system clock is adjusted. The event captures comprehensive details including the old timestamp, new timestamp, and the process ID responsible for initiating the change. This granular logging ensures complete visibility into all time modifications on the system.
The event typically occurs during normal operations when the Windows Time service synchronizes with configured NTP servers, but it also triggers when users manually adjust the clock through Control Panel or Settings app. In domain environments, time synchronization is critical for Kerberos ticket validation, which requires all systems to maintain time within a 5-minute tolerance window by default.
Security teams rely on Event ID 4113 to detect potential tampering with system clocks, which could be used to evade log correlation or extend the validity of stolen authentication tokens. The event also helps identify systems with failing CMOS batteries or misconfigured time sources that could impact domain authentication and certificate validation.
Modern Windows systems in 2026 include enhanced time synchronization features with improved accuracy and security, making this event even more valuable for monitoring time-related security controls and compliance requirements in regulated industries.