Windows Event ID 4734 represents a fundamental security auditing mechanism that tracks the removal of members from security-enabled local groups. When this event fires, it indicates that the group membership database has been modified, specifically that a security principal (user account, computer account, or another group) has been removed from a local group's membership list.
The event provides comprehensive details including the subject who performed the action (with their Security ID, account name, and domain), the target group that was modified (including its Security ID, name, and domain), and the member that was removed (with complete identification details). This granular logging enables administrators to maintain detailed audit trails of privilege changes and group modifications.
In Active Directory environments, this event fires on domain controllers when domain local groups are modified. On standalone systems or member servers, it fires when local groups are changed. The event is generated regardless of whether the removal was performed through GUI tools like Computer Management, command-line utilities like net localgroup, or programmatic methods through Windows APIs.
The timing and frequency of these events can indicate normal administrative activities, automated processes, or potentially suspicious behavior. Mass removals or removals performed by unexpected accounts may warrant investigation, making this event valuable for security monitoring and incident response activities.