Account Management Event: 4720

Introducing ADAudit Plus' Attack Surface Analyzer—Detect 25+ AD attacks and identify risky Azure configurations. Learn more×
Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Event ID 4720 - A user account was created

Event ID 4720
Category Account management
Sub category User account management
Description Password Policy Checking API is called

When a user account is created in Active Directory, event ID 4720 is logged.

This log data gives the following information:

 

Subject: User who performed the action Security ID
Account Name
Account Domain
Logon ID
New Account: Created user account  Security ID
Account Name 
Account Domain
Attributes (of the new account):  SAM Account Name
Display Name
User Principal Name
Home Directory
Home Drive
Script Path
Profile Path
User Workstations
Password Last Set
Account Expires
Primary Group ID
Allowed To Delegate To
Old UAC Value
New UAC Value
User Account Control:
  • Account Disabled
  • 'Password Not Required' 
  • 'Normal Account' 
User Parameters
SID History
Logon Hours
Additional Information: Privileges

Why event ID 4720 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

ADAudit Plus alerts and tracks User Lifecycle Changes like creation, deletion, and modification of user accounts in real-time which makes Active Directory auditing much easier.

Event 4270 applies to the following operating systems: 

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10

Corresponding event ID for 4720 in Windows Server 2003 and older is 624

The 8 most critical Windows security events you must monitor.

 

Thank you for your interest!

We’ve sent the guide to your inbox.

Thanks for visiting.

Before you leave, check out our guide on the 8 most critical Windows security events you must monitor.

Please enter business email address
  •  
  • By clicking 'Get the free guide', you agree to processing of personal data according to the Privacy Policy.