ANAVEM
Languagefr
Security analyst reviewing Windows Event ID 4732 group membership changes on monitoring dashboard
Event ID 4732InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4732 – Microsoft-Windows-Security-Auditing: A Member Was Added to a Security-Enabled Local Group

Event ID 4732 fires when a user or computer account is added to a security-enabled local group. This security audit event helps administrators track group membership changes for compliance and security monitoring.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 20269 min read 0
Event ID 4732Microsoft-Windows-Security-Auditing 5 methods 9 min
Event Reference

What This Event Means

Event ID 4732 represents one of the most important security audit events for tracking privilege changes in Windows environments. When Windows adds a member to a security-enabled local group, the system generates this event to create an audit trail of group membership modifications.

The event structure includes several key fields: Subject information identifies who performed the action, including their Security ID (SID), account name, domain, and logon ID. The Group information section specifies the target group's name, domain, and SID. The Member section details the account being added, including its SID and distinguished name for domain accounts.

This event fires for various scenarios including administrative actions through Computer Management, PowerShell commands like Add-LocalGroupMember, net localgroup commands, and programmatic changes through Windows APIs. The event captures both successful additions and provides context about the requesting process and logon session.

Security implications are significant since local group membership directly affects user privileges and system access. Adding users to groups like Administrators, Backup Operators, or Remote Desktop Users can grant extensive system access. Monitoring these events helps detect unauthorized privilege escalation, insider threats, and compliance violations.

The event integrates with Security Information and Event Management (SIEM) systems for automated alerting and correlation with other security events. Organizations typically configure alerts for additions to high-privilege groups and maintain historical records for compliance auditing.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • Administrator manually adding users to local groups through Computer Management console
  • PowerShell commands like Add-LocalGroupMember or Add-ADGroupMember executing
  • Command-line tools such as net localgroup adding members
  • Group Policy preferences automatically adding users to groups
  • Software installations adding service accounts to required groups
  • Domain controller replication updating local group memberships
  • Automated scripts or configuration management tools modifying group membership
  • Active Directory Users and Computers console operations on domain controllers
  • Third-party applications programmatically adding accounts to groups
  • System restore operations that include group membership changes
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific event details to understand what happened:

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 4732 by right-clicking the Security log and selecting Filter Current Log
  4. Enter 4732 in the Event IDs field and click OK
  5. Double-click the event to view detailed information including:
    • Subject: Who performed the action
    • Group: Which group was modified
    • Member: Which account was added
    • Process Information: What tool was used
  6. Note the timestamp and correlate with other administrative activities
  7. Check if the change was authorized by reviewing change management records
Pro tip: Look for patterns in the Process Name field to identify automated tools or scripts making bulk changes.
02

Query Events with PowerShell

Use PowerShell to efficiently search and analyze Event ID 4732 occurrences:

  1. Open PowerShell as Administrator
  2. Query recent events with basic filtering:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4732} -MaxEvents 50 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
  3. Search for specific group additions in the last 24 hours:
    $StartTime = (Get-Date).AddDays(-1)
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4732; StartTime=$StartTime} | ForEach-Object {
        $Event = [xml]$_.ToXml()
        [PSCustomObject]@{
            TimeCreated = $_.TimeCreated
            Subject = $Event.Event.EventData.Data[1].'#text'
            Group = $Event.Event.EventData.Data[5].'#text'
            Member = $Event.Event.EventData.Data[8].'#text'
        }
    }
  4. Filter for high-privilege group additions:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4732} | Where-Object {
        $_.Message -match "Administrators|Domain Admins|Enterprise Admins|Backup Operators"
    } | Select-Object TimeCreated, Message
  5. Export results for further analysis:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4732} -MaxEvents 100 | Export-Csv -Path "C:\Temp\GroupAdditions.csv" -NoTypeInformation
Warning: Large Security logs can impact performance. Use -MaxEvents parameter to limit results.
03

Verify Current Group Membership

Confirm the current state of group memberships to validate the changes:

  1. Check local group membership using PowerShell:
    Get-LocalGroupMember -Group "Administrators" | Format-Table Name, ObjectClass, PrincipalSource
  2. For domain environments, verify domain group membership:
    Get-ADGroupMember -Identity "Domain Admins" | Select-Object Name, SamAccountName, ObjectClass
  3. List all local groups and their members:
    Get-LocalGroup | ForEach-Object {
        Write-Host "Group: $($_.Name)" -ForegroundColor Yellow
        Get-LocalGroupMember -Group $_.Name | Format-Table Name, ObjectClass -AutoSize
    }
  4. Compare with baseline group membership if available
  5. Use Computer Management console for GUI verification:
    • Open compmgmt.msc
    • Navigate to Local Users and GroupsGroups
    • Double-click the relevant group to view current members
  6. Document any unauthorized additions for security review
Pro tip: Maintain baseline group membership documentation to quickly identify unauthorized changes.
04

Configure Advanced Audit Monitoring

Set up comprehensive monitoring for future group membership changes:

  1. Enable detailed audit policy using Group Policy or local policy:
    auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
  2. Configure audit policy through Group Policy Management:
    • Open gpmc.msc and edit the appropriate GPO
    • Navigate to Computer ConfigurationPoliciesWindows SettingsSecurity SettingsAdvanced Audit Policy Configuration
    • Enable Audit Security Group Management for Success and Failure
  3. Set up PowerShell monitoring script for real-time alerts:
    Register-WmiEvent -Query "SELECT * FROM Win32_NTLogEvent WHERE LogFile='Security' AND EventCode=4732" -Action {
        $Event = $Event.SourceEventArgs.NewEvent
        Write-Host "Group membership change detected at $($Event.TimeGenerated)" -ForegroundColor Red
        # Add email notification or SIEM integration here
    }
  4. Configure Windows Event Forwarding (WEF) for centralized logging:
    • Create custom views in Event Viewer for Event ID 4732
    • Set up subscriptions to forward events to central collector
  5. Implement SIEM integration for automated alerting and correlation
Warning: High-volume environments may generate excessive audit events. Configure filtering appropriately.
05

Forensic Analysis and Incident Response

Perform detailed forensic analysis when unauthorized group changes are suspected:

  1. Collect comprehensive event data with timeline analysis:
    $StartTime = (Get-Date).AddDays(-7)
    $Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4732,4733,4728,4729; StartTime=$StartTime}
    $Events | Sort-Object TimeCreated | Export-Csv -Path "C:\Forensics\GroupChanges.csv" -NoTypeInformation
  2. Correlate with logon events (4624, 4625) to identify the source:
    $LogonEvents = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4624; StartTime=$StartTime}
    # Cross-reference logon IDs with group change events
  3. Examine process creation events (4688) for command-line details:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4688; StartTime=$StartTime} | Where-Object {
        $_.Message -match "net.exe|powershell.exe|Add-LocalGroupMember"
    }
  4. Check registry changes related to group membership:
    • Review HKLM\SAM\SAM\Domains\Builtin\Aliases for local group modifications
    • Use tools like RegRipper for detailed registry analysis
  5. Analyze network connections and file access patterns:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=5156} | Where-Object {
        $_.TimeCreated -gt $SuspiciousTime -and $_.TimeCreated -lt $SuspiciousTime.AddMinutes(10)
    }
  6. Document findings and create incident response timeline
  7. Implement remediation steps including password resets and privilege reviews
Pro tip: Use Windows Timeline feature and PowerShell transcription logs for additional context during investigations.

Overview

Event ID 4732 is a security audit event that fires whenever a member is added to a security-enabled local group on a Windows system. This event is part of the Object Access audit category and provides detailed information about who added which account to what group, along with timestamps and the requesting process.

This event fires on domain controllers when local groups are modified, and on member servers and workstations when their local groups change. The event captures both user accounts and computer accounts being added to groups like Administrators, Remote Desktop Users, or custom security groups.

Security teams rely on this event for compliance reporting, privilege escalation detection, and forensic investigations. The event provides granular details including the subject who made the change, the target group, and the member that was added. Windows generates this event regardless of whether the addition was performed through GUI tools, PowerShell, or command-line utilities.

The event appears in the Security log and requires audit policy configuration to generate. Without proper auditing enabled, these critical security changes go unlogged, creating blind spots in security monitoring.

Frequently Asked Questions

What does Event ID 4732 mean and why is it important?+
Event ID 4732 indicates that a member was added to a security-enabled local group on a Windows system. This event is crucial for security monitoring because it tracks privilege escalation and group membership changes. When users are added to groups like Administrators, Remote Desktop Users, or Backup Operators, they gain additional system privileges. Security teams use this event to detect unauthorized privilege escalation, maintain compliance with access control policies, and investigate potential insider threats or compromised accounts.
How can I tell who added a member to a group from Event ID 4732?+
The Event ID 4732 details include a 'Subject' section that identifies who performed the action. This section contains the Security ID (SID), Account Name, Account Domain, and Logon ID of the person who added the member. You can find this information in Event Viewer by double-clicking the event, or extract it using PowerShell by parsing the event XML. The Logon ID can be correlated with logon events (4624) to determine the source computer and authentication method used.
Why am I not seeing Event ID 4732 in my Security log?+
Event ID 4732 requires specific audit policies to be enabled. You need to configure 'Audit Security Group Management' under Advanced Audit Policy Configuration. Use the command 'auditpol /set /subcategory:"Security Group Management" /success:enable' to enable it via command line, or configure it through Group Policy under Computer Configuration → Windows Settings → Security Settings → Advanced Audit Policy Configuration. Without this policy enabled, Windows won't generate these security audit events, creating blind spots in your security monitoring.
Can Event ID 4732 help detect malicious activity?+
Yes, Event ID 4732 is valuable for detecting malicious activity, particularly privilege escalation attacks. Attackers often add compromised accounts to high-privilege groups like Administrators or Domain Admins to maintain persistence and expand access. Monitor for unexpected additions to sensitive groups, especially outside business hours or from unusual source accounts. Correlate these events with other security events like failed logons (4625), process creation (4688), and network logons (4624) to identify attack patterns. Automated alerting on additions to critical groups can provide early warning of potential breaches.
How long should I retain Event ID 4732 logs for compliance?+
Retention requirements for Event ID 4732 logs depend on your industry regulations and organizational policies. Common compliance frameworks require different retention periods: SOX typically requires 7 years, HIPAA suggests 6 years, and PCI DSS mandates 1 year minimum. Many organizations retain security audit logs for 1-3 years for forensic purposes. Configure Windows Event Log size limits appropriately and consider forwarding events to a centralized SIEM or log management system for long-term storage. Archive older logs to meet compliance requirements while maintaining system performance.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...