Windows Event ID 4745 is generated by the Microsoft-Windows-Security-Auditing provider when a computer account is successfully created in Active Directory. This event is part of the object access auditing category and requires the "Audit Computer Account Management" policy to be enabled in Group Policy or through Advanced Audit Policy Configuration.
The event contains comprehensive details including the subject who performed the action (user account and logon session), the target computer account being created, and the Active Directory attributes assigned during creation. Key fields include the computer account name, distinguished name (DN), security identifier (SID), and the organizational unit where the account was placed.
This audit event is essential for compliance frameworks like SOX, HIPAA, and PCI-DSS that require detailed logging of directory changes. Security teams use Event 4745 to detect unauthorized computer additions, track legitimate domain expansions, and investigate potential privilege escalation attempts through computer account manipulation.
The event fires on the domain controller that processes the computer account creation request, making it critical to monitor all domain controllers in multi-DC environments. Modern SIEM solutions parse this event to correlate computer account creation with subsequent authentication attempts and policy applications.