Event ID 4765 - SID History was added to an account
Event ID | 4765 |
Category | Account Management |
Sub category | User account management |
Description | SID History was added to an account |
When SID history is added to an account in Active Directory, event ID 4765 gets logged.
This log data gives the following information:
Subject: User who performed the action | Security ID Account Name Account Domain Logon ID |
Target Account | Security ID Account Name Account Domain |
Source Account | Security ID Account Name |
Additional Information | Privilges SID List |
Why event ID 4765 needs to be monitored?
- Prevention of privilege abuse
- Detection of potential malicious activity
- Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
- Compliance mandates
Pro tip:
Real-time Group Policy change audit reports from ADAudit Plus audits all changes that happen to a Group Policy object over its lifetime and provides a clear insight on the history of changes made to the Group Policy object.
Event 4765 applies to the following operating systems:
- Windows Server 2008 R2 and Windows 7
- Windows Server 2012 R2 and Windows 8.1
- Windows Server 2016 and Windows 10
Explore Active Directory auditing and reporting with ADAudit Plus.
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Self-Service Password Management
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools