Windows Event ID 4747 is generated by the Microsoft-Windows-Security-Auditing provider when a computer account password is successfully changed in Active Directory. This event is part of the Object Access audit category and requires appropriate audit policies to be enabled on domain controllers.
The event provides comprehensive details about the password change operation, including the Security ID (SID) and name of the computer account that was modified, the account that initiated the change, and the logon session information. The event also includes the domain name and additional security context that helps administrators understand the scope and legitimacy of the change.
Computer accounts in Active Directory domains automatically initiate password changes every 30 days as part of the Kerberos security protocol. This automatic process helps maintain security by regularly rotating machine account credentials. However, password changes can also occur during administrative operations such as resetting computer accounts, rejoining machines to the domain, or during certain Group Policy operations.
The event is crucial for security monitoring because unauthorized computer account password changes could indicate compromise attempts, privilege escalation, or administrative errors. Security teams often monitor this event alongside related events like 4742 (computer account changed) and 4743 (computer account deleted) to maintain comprehensive visibility into computer account management activities within their Active Directory infrastructure.