ItemBox

Audit account management

Audit account management

Determines whether to audit each event of account management on a device.

Examples of account management events include:

  • A user account or group is created, changed, or deleted.
  • A user account is renamed, disabled, or enabled.
  • A password is set or changed.

If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when any account management event succeeds. Failure audits generate an audit entry when any account management event fails. To set this value to No auditing, in the Properties dialog box for this policy setting, select the Define these policy settings check box and clear the Success and Failure check boxes.

Default:

  • Success on domain controllers.
  • No auditing on member servers.

Configure this audit setting

You can configure this security setting by opening the appropriate policy under Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy.

Account management eventsDescription
4720A user account was created.
4723A user password was changed.
4724A user password was set.
4726A user account was deleted.
4727A global group was created.
4728A member was added to a global group.
4729A member was removed from a global group.
4730A global group was deleted.
4731A new local group was created.
4732A member was added to a local group.
4733A member was removed from a local group.
4734A local group was deleted.
4735A local group account was changed.
4737A global group account was changed.
4738A user account was changed.
4739A domain policy was modified.
4740A user account was auto locked.
4741A computer account was created.
4742A computer account was changed.
4743A computer account was deleted.
4744A local security group with security disabled was created. Note: SECURITY_DISABLED in the formal name means that this group cannot be used to grant permissions in access checks
4745A local security group with security disabled was changed.
4746A member was added to a security-disabled local security group.
4747A member was removed from a security-disabled local security group.
4748A security-disabled local group was deleted.
4749A security-disabled global group was created.
4750A security-disabled global group was changed.
4751A member was added to a security-disabled global group.
4752A member was removed from a security-disabled global group.
4753A security-disabled global group was deleted.
4754A security-enabled universal group was created.
4755A security-enabled universal group was changed.
4756A member was added to a security-enabled universal group.
4757A member was removed from a security-enabled universal group.
4758A security-enabled universal group was deleted.
4759A security-disabled universal group was created.
4760A security-disabled universal group was changed.
4761A member was added to a security-disabled universal group.
4762A member was removed from a security-disabled universal group.
4763A security-disabled universal group was deleted.
4764A group type was changed.
4780Set the security descriptor of members of administrative groups.
685Set the security descriptor of members of administrative groups. Note: Every 60 minutes on a domain controller a background thread searches all members of administrative groups (such as domain, enterprise, and schema administrators) and applies a fixed security descriptor on them. This event is logged.