Event ID 4698 — Scheduled Task Created
Event ID 4698 is logged when a new scheduled task is created on a Windows system. Scheduled tasks are a common persistence mechanism used by attackers to ensure their malicious code runs automatically after reboots or at specific times.
MITRE ATT&CK
T1053 · Scheduled Task
Persistence
Security Relevance
Attackers create scheduled tasks to maintain persistence after gaining access. The task may execute a reverse shell, download additional malware, or run a script that re-establishes the attacker's foothold if their other access is removed. This technique is used widely across ransomware, APT groups, and commodity malware.
Example Log Entry
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Event ID: 4698
Level: Information
A scheduled task was created.
Subject:
Security ID: CORP\j.smith
Account Name: j.smith
Task Information:
Task Name: \Microsoft\Windows\UpdateCheck
Task Content: <?xml version="1.0"?>
<Task>
<Actions>
<Exec>
<Command>powershell.exe</Command>
<Arguments>-enc SGVsbG8gV29ybGQ=</Arguments>
</Exec>
</Actions>
</Task>Investigation Steps
- 1.Review the task name — attackers often use names that blend in with Windows (e.g. 'WindowsUpdate', 'MicrosoftEdge').
- 2.Examine the task command — PowerShell with -enc (encoded command) or unusual executables are red flags.
- 3.Check who created the task and from what session — cross-reference with recent logon events.
- 4.Look at the task schedule — tasks running at boot, every few minutes, or at odd hours are suspicious.
- 5.Check whether the task binary or script exists on disk and review its contents.
- 6.Compare against a known-good baseline of scheduled tasks for this system.
Check your logs for event id 4698 — scheduled task created — upload an EVTX file for instant detection, no account required.
Remediation
- ✓Delete any unauthorized scheduled tasks immediately.
- ✓Audit all scheduled tasks on affected systems using: schtasks /query /fo LIST /v
- ✓Restrict scheduled task creation to administrators only via Group Policy.
- ✓Enable monitoring and alerting on Event ID 4698 in your SIEM.
- ✓Investigate the account that created the task for signs of compromise.
- ✓Scan the system for additional persistence mechanisms (services, registry autoruns, startup folders).
Related Event IDs
Related Detection Guides
Detect Event ID 4698 — Scheduled Task Created in your logs
Upload an .evtx file from servers, domain controllers, or endpoints — EventPeeker automatically detects event id 4698 — scheduled task created patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Scan for Event ID 4698 — Scheduled Task Created →