Account Management Event: 4799

Introducing ADAudit Plus' Attack Surface Analyzer—Detect 25+ AD attacks and identify risky Azure configurations. Learn more×
Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Management » Event ID 4799 - A security-enabled local group membership was enumerated

Event ID 4799 - A security-enabled local group membership was enumerated

Event ID 4799
Category Account management
Sub category Security group management 
Description A user's local group membership was enumerated.

In Active Directory, event ID 4799 is logged when a process enumerates a user's local security groups on a computer or device.

Subject: User who performed the action Security ID
Account Name
Account Domain
Logon ID
User Security ID
Account Name
Account Domain
Process Information Process ID
Process Name

Why event ID 4799 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

ADAudit Plus offers 'User management activity' reports that lists all the management actions done by any selected user or technician on Users, Computers and Groups in the Domain. It comprehensively displays actions executed by users in the form of easily understandable graphical charts and reports. Actions like user/computer account or groups changed, deleted, disabled, enabled, password set and account unlocked are audited, reported and highlighted through in these reports.

Event 4799 applies to the following operating systems:

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10
year-end-offer-2021-banner