Event ID 4726 represents one of the most significant account management events in Windows security auditing. When this event fires, it indicates that a user account has been permanently removed from the system's security database, whether that's the local SAM on a standalone machine or Active Directory in a domain environment.
The event contains comprehensive details including the subject who performed the deletion (with their SID, account name, and domain), the target account that was deleted (including its SID, name, and domain), and the logon ID of the session where the deletion occurred. The SID information is particularly valuable because it uniquely identifies accounts even after deletion, enabling forensic reconstruction of events.
Windows generates this event through the Local Security Authority Subsystem Service (LSASS) when account deletion operations complete successfully. The event fires for all user account types including regular users, service accounts, and computer accounts when deleted through standard Windows interfaces or APIs. It does not fire for accounts that are merely disabled or moved to different organizational units.
In Active Directory environments, this event appears on domain controllers where the deletion was processed. For local accounts, it appears on the specific machine where the account existed. The event timing is synchronous with the actual deletion operation, making it reliable for real-time monitoring and alerting systems.