Event ID 4746 represents a critical security audit event that documents computer account deletions within Active Directory environments. When a domain administrator or authorized user removes a computer account from the directory, Windows generates this event to maintain an audit trail of the administrative action.
The event fires on the domain controller that processes the deletion request and contains comprehensive details about the operation. Key information includes the target computer account's distinguished name, security identifier (SID), SAM account name, and the security context of the user who initiated the deletion. This data proves invaluable for security investigations, compliance auditing, and tracking unauthorized administrative activities.
Computer account deletions typically occur during planned decommissioning activities, domain cleanup operations, or when removing systems that no longer exist in the network. However, unexpected instances of this event might indicate unauthorized administrative access, malicious activity, or accidental deletions that could impact domain operations.
The event integrates with Windows advanced audit policies and requires proper configuration of object access auditing for computer accounts. Organizations implementing comprehensive security monitoring rely on Event ID 4746 to track changes to their Active Directory computer account inventory and maintain detailed records of administrative actions for regulatory compliance and security analysis purposes.