Event ID 4705 represents a critical security audit event that Windows generates when the system locks out a user account due to policy violations. This event occurs as part of Windows' built-in security mechanisms designed to protect against brute force attacks and unauthorized access attempts.
The lockout mechanism activates when a user account exceeds the configured threshold for failed authentication attempts within the specified observation window. Windows tracks these failed attempts and automatically locks the account for the duration specified in the account lockout policy. During the lockout period, the account cannot authenticate even with correct credentials, effectively preventing further authentication attempts.
In Active Directory environments, domain controllers generate this event when domain account lockout policies trigger. The event includes detailed information about the locked account, including the user name, domain, and the computer system that caused the lockout. This data helps administrators identify the source of authentication failures and determine whether the lockout resulted from malicious activity or legitimate user error.
The event also captures the caller computer name and caller computer account, providing visibility into which system initiated the authentication attempts that led to the lockout. This information proves invaluable when investigating security incidents, as it allows administrators to trace the source of potential attacks and implement appropriate countermeasures.