The Windows Security Log event ID 4797 with a description of “An attempt was made to query the existence of a blank password for an account.” and Target Account Name WDAGUtilityAccount is related to Windows Defender Application Guard. It was found during digging through event logs because of separate issue.

An attempt was made to query the existence of a blank password for an account.

Subject:
 Security ID: LOCAL SERVICE
 Account Name: LOCAL SERVICE
 Account Domain: NT AUTHORITY
 Logon ID: 0x3E5

Additional Information:
 Caller Workstation: VISUALBLINDFX
 Target Account Name: WDAGUtilityAccount
 Target Account Domain: VISUALBLINDFX

The following was found on this page:

If you see an alert in your log solution for a new local account created for username: WDAGUtilityAccount (event id 4720 or 4722).

This account is part of Windows Defender Application Guard which is included with RS3 (aka windows 10 fall update). The account is disabled also WDAG is not enabled.

Basically you have user enrolled in the Windows 10 insider program and their box was updated with a new build that includes the WDAG bits.

    Advertisment ad adsense adlogger