ANAVEM
Languagefr

#account-management

12 articles

Windows Events12

Security analyst monitoring Windows Event Viewer showing security audit logs on multiple displays
Event 4781
Security
Windows EventInformation

Windows Event ID 4781 – Security: Account Name Changed

Event ID 4781 records when a user account name is changed in Active Directory or local SAM database. Critical for security auditing and compliance tracking.

March 189 min
Windows Event Viewer Security log displaying Event ID 4700 user account creation events on a cybersecurity monitoring dashboard
Event 4700
Security
Windows EventInformation

Windows Event ID 4700 – Security: A User Account was Created

Event ID 4700 records when a new user account is created on a Windows system. This security audit event provides detailed information about who created the account, when it was created, and the account properties configured during creation.

March 1812 min
Windows security monitoring dashboard displaying Event ID 4767 account unlock events in Event Viewer
Event 4767
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4767 – Microsoft-Windows-Security-Auditing: User Account Unlocked

Event ID 4767 fires when a user account is unlocked by an administrator or automatically by the system after the lockout duration expires.

March 189 min
Windows Security Event Viewer displaying Event ID 4763 account deletion audit logs on a security monitoring dashboard
Event 4763
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4763 – Microsoft-Windows-Security-Auditing: User Account Deleted

Event ID 4763 fires when a user account is deleted from Active Directory or local computer. This security audit event tracks account deletion activities for compliance and security monitoring purposes.

March 1812 min
Windows Event Viewer displaying Security log with Event ID 4762 user account enabled events on a cybersecurity monitoring dashboard
Event 4762
Security
Windows EventInformation

Windows Event ID 4762 – Security: User Account Enabled

Event ID 4762 logs when a user account is enabled in Active Directory or local security database. This security audit event tracks account state changes for compliance and monitoring purposes.

March 189 min
Windows Security Event Viewer displaying Event ID 4760 user account deletion audit logs on a professional monitoring dashboard
Event 4760
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4760 – Microsoft-Windows-Security-Auditing: User Account Deleted

Event ID 4760 fires when a user account is deleted from Active Directory or local system. This security audit event tracks account deletion operations for compliance and security monitoring purposes.

March 1812 min
Windows Event Viewer displaying security audit logs with account deletion events on a monitoring dashboard
Event 4759
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4759 – Microsoft-Windows-Security-Auditing: User Account Deleted

Event ID 4759 fires when a user account is deleted from the local Security Accounts Manager (SAM) database, providing audit trail for account management activities.

March 1812 min
Windows security monitoring dashboard showing Event ID 4758 account management logs in a professional SOC environment
Event 4758
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4758 – Microsoft-Windows-Security-Auditing: User Account Enabled

Event ID 4758 fires when a user account is enabled in Active Directory or local SAM database. This security audit event tracks account state changes for compliance and security monitoring purposes.

March 1812 min
Windows security monitoring dashboard showing Event Viewer with security audit logs for account management events
Event 4755
Security
Windows EventInformation

Windows Event ID 4755 – Security: User Account Enabled

Event ID 4755 logs when a user account is enabled in Active Directory or local security database. This security audit event tracks account management activities for compliance and monitoring purposes.

March 1812 min
Security analyst monitoring Windows Event Viewer showing account deletion events in a modern SOC environment
Event 4726
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4726 – Microsoft-Windows-Security-Auditing: User Account Deleted

Event ID 4726 fires when a user account is deleted from Active Directory or local system. Critical security event for tracking account lifecycle and potential unauthorized deletions.

March 1812 min
Windows security monitoring dashboard showing Event ID 4725 user account disabled audit events
Event 4725
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4725 – Microsoft-Windows-Security-Auditing: User Account Disabled

Event ID 4725 fires when a user account is disabled in Active Directory or on a local Windows system, providing audit trail for account management activities.

March 189 min
Windows security monitoring dashboard displaying Event ID 4722 user account enabled audit logs
Event 4722
Microsoft-Windows-Security-Auditing
Windows EventInformation

Windows Event ID 4722 – Microsoft-Windows-Security-Auditing: User Account Enabled

Event ID 4722 fires when a user account is enabled in Active Directory or local SAM database. Critical for security auditing and tracking account state changes.

March 1812 min