Introducing ADAudit Plus' Attack Surface Analyzer—Detect 25+ AD attacks and identify risky Azure configurations. Learn more×
 
Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

Windows security event log library

Gain quick insights into all the Windows security log events audited and analyzed by ADAudit Plus.

EVENT ID

Audit Categories:

S.No Event ID Description
  4720 A user account was created.
This event is generated every time a new user account is created. It is logged on domain controllers, member servers, and workstations.   
  4722 A user account was enabled.
This event is generated every time a user or computer account is enabled. For user objects, it is logged on domain controllers, member servers, and workstations. For computers, it is logged only on domain controllers.   
  4723 An attempt was made to change an account's password.
This event is generated every time a user tries to change their own password. For user objects, it is logged on domain controllers, member servers, and workstations.   
  4724 An attempt was made to reset an account's password.
This event is generated every time a user tries to change the password on another account. For user objects, it is logged on domain controllers, member servers, and workstations.   
  4725 A user account was disabled.
This event is generated every time a user or computer account is disabled. For user objects, it is logged on domain controllers, member servers, and workstations. For computers, it is logged only on domain controllers.   
  4726 A user account was deleted.
This event is generated every time a user object is deleted. It is logged on domain controllers, member servers, and workstations  
  4727 A security-enabled global group was created.
This event is generated every time a user creates a security group with global scope. It is logged only on domain controllers.   
  4728 A member was added to a security-enabled global group.
This event is generated every time a user, computer, or group is added to a security group with global scope. It is logged only on domain controllers.    
  4744 A security-disabled local group was created.
This event is generated every time a user creates a distribution group with domain local scope. It is logged only on domain controllers.  
  4745 A security-disabled local group was changed.
This event is generated every time a user modifies a distribution group with domain local scope. It is logged only on domain controllers.   
  4746 A member was added to a security-disabled local group.
This event is generated every time a user, computer, or group is added to a distribution group with domain local scope. It is logged only on domain controllers.   
  4747 A member was removed from a security-disabled local group.
This event is generated every time a user, computer, or group is removed from a distribution group with domain local scope. It is logged only on domain controllers.  
  4748 A security-disabled local group was deleted.
This event is generated every time a distribution group with domain local scope is deleted. It is logged only on domain controllers.  
  4749 A security-disabled global group was created.
This event is generated every time a user creates a distribution group with global scope. It is logged only on domain controllers.  
  4750 A security-disabled global group was changed.
This event is generated every time a user modifies a distribution group with global scope. It is logged only on domain controllers.  
  4751 A member was added to a security-disabled global group.
This event is generated every time a user, computer, or group is added to a distribution group with global scope. It is logged only on domain controllers.  
  4752 A member was removed from a security-disabled global group.
This event is generated every time a user, computer, or group is removed from a distribution group with global scope. It is logged only on domain controllers.   
  4753 A security-disabled global group was deleted.
This event is generated every time a distribution group with global scope is deleted. It is logged only on domain controllers.  
  4729 A member was removed from a security-enabled global group.
This event is generated when a user, group, or computer is removed from a security-enabled global group. It is logged only on domain controllers.   
  4730 A security-enabled global group was deleted.
This event is generated when a security-enabled global group is deleted. It is logged only on domain controllers.   
  4731 A security-enabled local group was created.
This event is generated when a security-enabled local group is created. It is logged on domain controllers for domain local groups, or on member computers for local SAM groups.   
  4732 A member was added to a security-enabled local group.
This event is generated when users, groups, or computers are added to a security-enabled local group. It is logged on domain controllers for domain local groups, or on member computers for local SAM groups.   
  4733 A member was removed from a security-enabled local group.
This event is generated when users, groups, or computers are removed from a security-enabled local group. It is logged on domain controllers for domain local groups, or on member computers for local SAM groups.   
  4734 A security-enabled local group was deleted.
This event is generated when a security-enabled local group is deleted. It is logged on domain controllers for domain local groups, or on member computers for local SAM groups.   
  4735 A security-enabled local group was changed.
This event is generated when a security-enabled local group is modified. It is logged on domain controllers for domain local groups, or on member computers for local SAM groups.   
  4737 A security-enabled global group was changed.
This event is generated when a security-enabled global group is changed. It is logged only on domain controllers.  
  4738 A user account was changed.
This event is generated when the attributes of a user object are modified. It is logged on domain controllers for domain accounts, and on member computers for local accounts.  
  4739 Domain Policy was changed.
This event is generated when an Active Directory Domain Policy is changed. It is logged on domain controllers and member computers.   
  4759 A security-disabled universal group was created.
This event is generated when a universal distribution group is created. It is logged only on domain controllers.   
  4760 A security-disabled universal group account was changed.
This event is generated when a universal distribution group is changed. It is logged only on domain controllers.  
  4761 A member was added to a security-disabled universal group.
This event is generated when Active Directory objects, such as users, groups, or computers, are added to a universal distribution group. It is logged only on domain controllers.  
  4762 A member was removed from a security-disabled universal group.
This event is generated when Active Directory objects, such as users, groups, or computers, are removed from a universal distribution group. It is logged only on domain controllers.   
  4763 A security-disabled universal group was deleted.
This event is generated when a universal distribution group is deleted. It is logged only on domain controllers.   
  4764 A group type was changed.
This event is generated when a group type or scope is changed. It is logged only on domain controllers.   
  4781 The name of an account was changed.
This event is generated when the name of a user or computer account (sAMAccountName attribute) is changed. It is logged only on domain controllers for computer accounts, and on domain controllers and member computers for user accounts.   
  4765 SID History was added to an account.
This event is generated when SID History is added to an account in Active Directory. It is logged on domain controllers and member computers.   
  4766 An attempt to add SID History to an account failed.
This event is generated when there is an attempt to add SID History to an account. It is logged on domain controllers and member computers.   
  4799 A security-enabled local group membership was enumerated.
This event is generated when a process enumerates a user's local security groups on a computer or device. It is logged on domain controllers and member computers.   
  4740 A user account was locked out.
This event is generated when a user account gets locked out. It is logged on domain controllers, member servers, and workstations.   
  4741 A computer account was created.
This event is generated when a new computer object is created. It is logged only on domain controllers.   
  4742 A computer account was changed
This event is generated when a computer object is changed. It is logged only on domain controllers.   
  4743 A computer account was deleted.
This event is generated when a computer object is deleted. It is logged only on domain controllers.   
  4754 A security-enabled universal group was created.
This event is generated when a universal security group is created. It is logged only on domain controllers.   
  4755 A security-enabled universal group was changed.
This event is generated when a universal security group is changed. It is logged only on domain controllers.   
  4756 A member was added to a security-enabled universal group.
This event is generated when a member is added to a universal security group. It is logged only on domain controllers.   
  4757 A member was removed from a security-enabled universal group.
This event is generated when a member is removed from a universal security group. It is logged only on domain controllers.   
  4758 A security-enabled universal group was deleted.
This event is generated when a universal security group is deleted. It is logged only on domain controllers.  
  4767 A user account was unlocked.
This event is generated when a user account gets unlocked (when the Unlock Account checkbox on the user's account tab is selected). It is logged on domain controllers, member servers, and workstations.   
  4794 An attempt was made to set the Directory Services Restore Mode administrator password.
This event is generated when the Directory Services Restore Mode (DSRM) administrator password is changed. It is logged only on domain controllers.  

ADAudit Plus Trusted By

Back to Top