Event ID 4748 represents a fundamental security audit mechanism in Windows Active Directory environments. When a computer account is deleted from the domain, Windows generates this event to maintain an audit trail of machine account lifecycle changes. The event fires exclusively on domain controllers that process the deletion request, making it essential for centralized security monitoring.
The event structure includes several critical fields: the target computer account name, its security identifier, the domain name, and detailed information about who initiated the deletion. The Subject fields identify the user account that performed the deletion, including their logon ID and authentication details. This information proves invaluable during security investigations or compliance audits.
Computer account deletions can occur through various methods including Active Directory Users and Computers console, PowerShell cmdlets, LDAP operations, or automated scripts. Regardless of the deletion method, Event ID 4748 captures the action consistently. The event timing corresponds to the actual deletion from the Active Directory database, not when the deletion request was initiated.
In enterprise environments, this event helps track decommissioning workflows, identify orphaned computer accounts, and detect unauthorized administrative actions. Security teams rely on 4748 events to correlate computer account deletions with change management processes and identify potential security incidents involving rogue account management.