WDAGUtilityAccount Windows Security Log
The Windows Security Log event ID 4797 with a description of “An attempt was made to query the existence of a blank password for an account.” and Target Account Name WDAGUtilityAccount is related to Windows Defender Application Guard. It was found during digging through event logs because of separate issue.
An attempt was made to query the existence of a blank password for an account. Subject: Security ID: LOCAL SERVICE Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3E5 Additional Information: Caller Workstation: VISUALBLINDFX Target Account Name: WDAGUtilityAccount Target Account Domain: VISUALBLINDFX
The following was found here https://blogs.technet.microsoft.com/drew/2017/07/15/wdagutilityaccount/.
If you see an alert in your log solution for a new local account created for username: WDAGUtilityAccount (event id 4720 or 4722).
This account is part of Windows Defender Application Guard which is included with RS3 (aka windows 10 fall update). The account is disabled also WDAG is not enabled. Basically you have user enrolled in the Windows 10 insider program and their box was updated with a new build that includes the WDAG bits.