ANAVEM
Languagefr
Active Directory security audit logs displayed in Windows Event Viewer on a professional monitoring workstation
Event ID 4749InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4749 – Microsoft-Windows-Security-Auditing: Security-Enabled Global Group Deleted

Event ID 4749 logs when a security-enabled global group is deleted from Active Directory. This audit event helps track group management changes and potential security risks.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 20269 min read 0
Event ID 4749Microsoft-Windows-Security-Auditing 5 methods 9 min
Event Reference

What This Event Means

Event ID 4749 represents a security audit event generated by the Microsoft-Windows-Security-Auditing provider when a security-enabled global group is permanently removed from Active Directory. This event is part of the Object Access audit category and specifically falls under the Account Management subcategory of Advanced Audit Policy Configuration.

The event contains comprehensive details including the deleted group's name, domain, and security identifier (SID), along with information about the security principal that initiated the deletion. The event also includes the logon ID and authentication package used by the account performing the deletion, providing a complete audit trail for forensic analysis.

Global groups in Active Directory serve as security principals that can contain user accounts, computer accounts, and other global groups from the same domain. When these groups are deleted, any permissions or rights previously assigned to them become orphaned, potentially affecting access control throughout the domain or forest. The 4749 event ensures administrators can track these critical changes and investigate any unauthorized group deletions that might indicate malicious activity or administrative errors.

This audit event is essential for compliance frameworks like SOX, HIPAA, and PCI-DSS that require detailed logging of security group changes. The event provides the necessary audit trail to demonstrate proper change management and detect potential security breaches involving group manipulation.

Applies to

Windows Server 2019Windows Server 2022Windows Server 2025Active Directory Domain Controllers
Analysis

Possible Causes

  • Administrator manually deletes a global group through Active Directory Users and Computers console
  • PowerShell cmdlets like Remove-ADGroup are used to delete security-enabled global groups
  • Automated scripts or applications programmatically delete groups through LDAP or Active Directory Web Services
  • Group cleanup processes remove obsolete or unused security groups
  • Domain migration or restructuring activities that involve removing old group structures
  • Malicious insider or compromised administrative account deleting groups to cover tracks or disrupt operations
  • Third-party identity management tools performing group lifecycle management operations
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of the 4749 event to understand what group was deleted and by whom.

  1. Open Event Viewer on the domain controller where the event occurred
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 4749 using the filter option
  4. Double-click the event to view detailed information including:
    • Subject: Account that deleted the group
    • Target Account: Details of the deleted group
    • Additional Information: Privileges used and process information
  5. Note the Logon ID to correlate with other security events
  6. Check the Process Name field to identify the tool used for deletion

Use PowerShell to query multiple domain controllers for the same event:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4749} -ComputerName DC01,DC02,DC03 | Select-Object TimeCreated,MachineName,Message | Format-Table -AutoSize
02

Correlate with Group Creation and Modification Events

Investigate the lifecycle of the deleted group by examining related audit events to understand the full context.

  1. Search for Event ID 4727 (global group created) with the same group name or SID
  2. Look for Event ID 4737 (global group changed) to see recent modifications
  3. Check Event ID 4728/4729 for member additions/removals before deletion

Use PowerShell to build a timeline of group-related events:

# Search for all events related to a specific group SID
$GroupSID = "S-1-5-21-1234567890-1234567890-1234567890-1234"
$Events = @(4727,4728,4729,4737,4749)
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=$Events} | Where-Object {$_.Message -like "*$GroupSID*"} | Sort-Object TimeCreated | Select-Object TimeCreated,Id,Message
  1. Examine the Process Name and Process ID fields across events to identify patterns
  2. Check if the same account performed multiple group operations in sequence
  3. Verify if the deletion was part of a planned maintenance window or unexpected
03

Analyze Account Permissions and Authentication

Investigate the account that performed the deletion to ensure it had legitimate reasons and proper authorization.

  1. Identify the deleting account from the Subject section of the 4749 event
  2. Check the account's group memberships and assigned privileges:
# Check group memberships for the account
$Username = "DOMAIN\AdminUser"
Get-ADUser -Identity $Username -Properties MemberOf | Select-Object -ExpandProperty MemberOf | Get-ADGroup | Select-Object Name,GroupScope
  1. Review recent logon events (4624) for the account to establish access patterns
  2. Check for any privilege escalation events (4672) around the same timeframe
  3. Examine the Logon Type and Authentication Package used
  4. Verify if the account accessed the system from expected locations:
# Find recent logons for the account
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4624} | Where-Object {$_.Message -like "*AdminUser*"} | Select-Object TimeCreated,@{Name='SourceIP';Expression={([xml]$_.ToXml()).Event.EventData.Data | Where-Object {$_.Name -eq 'IpAddress'} | Select-Object -ExpandProperty '#text'}} | Sort-Object TimeCreated -Descending | Select-Object -First 10
04

Investigate Impact and Recovery Options

Assess the impact of the group deletion and determine if recovery is necessary.

  1. Check if the deleted group had any assigned permissions by searching Group Policy and file system ACLs
  2. Use PowerShell to scan for orphaned SIDs in the environment:
# Search for orphaned SIDs in Group Policy
Get-GPO -All | ForEach-Object {
    $GPOReport = Get-GPOReport -Guid $_.Id -ReportType Xml
    if ($GPOReport -match "S-1-5-21-.*-.*-.*-.*") {
        Write-Output "Potential orphaned SID found in GPO: $($_.DisplayName)"
    }
}
  1. Check the Active Directory Recycle Bin if enabled (Windows Server 2008 R2 and later):
# Check if AD Recycle Bin is enabled
Get-ADOptionalFeature -Filter 'Name -like "Recycle Bin Feature"'

# If enabled, search for the deleted group
Get-ADObject -Filter {isDeleted -eq $true -and ObjectClass -eq "group"} -IncludeDeletedObjects | Where-Object {$_.Name -like "*DeletedGroupName*"}
  1. If recovery is needed and Recycle Bin is enabled, restore the group:
# Restore deleted group (replace with actual distinguished name)
Restore-ADObject -Identity "CN=DeletedGroup\0ADEL:12345678-1234-1234-1234-123456789012,CN=Deleted Objects,DC=domain,DC=com"
  1. Document the incident and implement additional monitoring if necessary
05

Implement Advanced Monitoring and Prevention

Set up enhanced monitoring and controls to prevent unauthorized group deletions in the future.

  1. Configure Advanced Audit Policy to ensure comprehensive logging:
# Enable detailed account management auditing
auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
  1. Create a PowerShell monitoring script that alerts on group deletions:
# Monitor for Event ID 4749 and send alerts
Register-WmiEvent -Query "SELECT * FROM __InstanceCreationEvent WITHIN 10 WHERE TargetInstance ISA 'Win32_NTLogEvent' AND TargetInstance.LogFile = 'Security' AND TargetInstance.EventCode = 4749" -Action {
    $Event = $Event.SourceEventArgs.NewEvent.TargetInstance
    $Message = "ALERT: Security group deleted - Event ID 4749 detected on $($Event.ComputerName) at $($Event.TimeGenerated)"
    # Add your notification logic here (email, SIEM, etc.)
    Write-EventLog -LogName Application -Source "GroupDeletionMonitor" -EventId 1001 -Message $Message
}
  1. Implement Administrative Units or Privileged Access Management (PAM) to control group management permissions
  2. Configure Security Information and Event Management (SIEM) rules to correlate group deletion events with other suspicious activities
  3. Set up regular reviews of critical security groups and their memberships
  4. Consider implementing approval workflows for group deletions using tools like Microsoft Identity Manager or third-party solutions
Warning: Always test monitoring scripts in a non-production environment first and ensure proper error handling to prevent system performance impact.

Overview

Event ID 4749 fires whenever a security-enabled global group gets deleted from Active Directory. This security audit event appears in the Security log on domain controllers and provides detailed information about who deleted the group, when it happened, and which group was removed. The event is part of Windows Advanced Audit Policy Configuration under Account Management auditing.

This event becomes critical during security investigations, compliance audits, and when tracking unauthorized changes to Active Directory group structure. Since global groups can contain users from any domain in the forest and can be used to assign permissions across domain boundaries, their deletion represents a significant security event that administrators must monitor closely.

The event fires immediately when the deletion occurs through Active Directory Users and Computers, PowerShell cmdlets, or programmatic interfaces. It captures the security identifier (SID) of the deleted group, the account that performed the deletion, and the domain controller that processed the request. Understanding this event helps maintain proper audit trails and detect potential insider threats or compromised administrative accounts.

Frequently Asked Questions

What does Event ID 4749 mean and when does it occur?+
Event ID 4749 indicates that a security-enabled global group has been deleted from Active Directory. This audit event occurs immediately when an administrator or automated process removes a global group through any interface including Active Directory Users and Computers, PowerShell cmdlets like Remove-ADGroup, or programmatic deletion via LDAP. The event is logged on the domain controller that processed the deletion request and provides detailed information about who deleted the group, when it happened, and the specific group that was removed. This event is crucial for security auditing and compliance as it tracks changes to security principals that could affect access control throughout the domain.
How can I determine if a group deletion was authorized or malicious?+
To determine if a group deletion was authorized, examine several factors from the 4749 event and related logs. First, verify the account that performed the deletion has legitimate administrative privileges and check if the deletion occurred during planned maintenance windows. Review the Process Name field to see if standard administrative tools were used versus suspicious processes. Correlate the event with logon events (4624) to verify the administrator accessed the system from expected locations and times. Check for any recent privilege escalation events (4672) that might indicate account compromise. Additionally, examine the group's recent activity through events 4728/4729 (member changes) and 4737 (group modifications) to understand if the group was actively used before deletion. Unauthorized deletions often show patterns like off-hours access, unusual source locations, or deletion of multiple groups in quick succession.
Can I recover a deleted global group and how?+
Recovery of deleted global groups depends on your Active Directory configuration. If the Active Directory Recycle Bin feature is enabled (available in Windows Server 2008 R2 and later), you can restore deleted groups using PowerShell. First, check if the feature is enabled with 'Get-ADOptionalFeature -Filter "Name -like 'Recycle Bin Feature'"'. If enabled, search for deleted groups using 'Get-ADObject -Filter {isDeleted -eq $true -and ObjectClass -eq "group"} -IncludeDeletedObjects' and restore with 'Restore-ADObject'. If the Recycle Bin is not enabled, recovery becomes more complex and may require restoring from a system state backup or authoritative restore of Active Directory. However, this approach requires careful planning as it affects the entire directory. The restored group will maintain its original SID, preserving existing permissions and group memberships, but any changes made after the backup will be lost.
What security implications should I consider when Event ID 4749 occurs?+
Event ID 4749 has significant security implications that require immediate attention. When a global group is deleted, any permissions or rights assigned to that group become orphaned, potentially creating security gaps or preventing legitimate access. The deletion might indicate an insider threat, compromised administrative account, or attempt to cover tracks after unauthorized access. Malicious actors might delete groups to disrupt operations, remove audit trails, or eliminate security controls. From a compliance perspective, unauthorized group deletions can violate regulatory requirements for access control documentation and change management. You should immediately verify the legitimacy of the deletion, assess impact on current permissions and access rights, check for other suspicious activities by the same account, and ensure proper incident documentation. Consider implementing additional monitoring for accounts with group management privileges and review your change management processes to prevent unauthorized modifications.
How do I set up monitoring and alerts for Event ID 4749?+
Setting up effective monitoring for Event ID 4749 requires multiple approaches. First, ensure Advanced Audit Policy is properly configured using 'auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable' to capture all group management events. Implement real-time monitoring using PowerShell with Register-WmiEvent to watch for new 4749 events and trigger immediate alerts. Configure your SIEM solution to collect and correlate these events with other security logs, creating rules that flag unusual patterns like multiple group deletions, deletions by non-administrative accounts, or deletions outside business hours. Set up email or SMS notifications for critical group deletions, especially for high-privilege groups. Consider using Windows Event Forwarding (WEF) to centralize collection from all domain controllers. For enterprise environments, implement custom PowerShell scripts that query Event ID 4749 across all domain controllers and generate reports showing group deletion trends, which can help identify both legitimate cleanup activities and potential security incidents.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...