Event ID 4700 represents a fundamental security audit event that Windows generates each time a user account is successfully created on the system. This event serves as a permanent record in the Security event log, providing forensic-quality information about account creation activities that security teams and auditors frequently review.
The event structure includes detailed fields such as the Subject (who created the account), Target Account (the new account details), and Additional Information sections. The Subject section identifies the user or process that initiated the account creation, including their SID, account name, domain, and logon ID. The Target Account section provides comprehensive details about the newly created account, including its SID, name, domain, and various account attributes.
Windows generates this event regardless of the method used to create the account - whether through Computer Management, Active Directory Users and Computers, PowerShell cmdlets like New-LocalUser or New-ADUser, or command-line tools such as net user. The event timing occurs immediately after successful account creation but before any additional configuration changes are applied.
In domain environments, this event appears on domain controllers when domain accounts are created, while local account creation generates the event on the specific machine where the account was created. The event's presence indicates that the system's audit policy for User Account Management is properly configured and functioning, making it a reliable indicator for security monitoring systems and SIEM solutions.