Windows Event ID 4751 represents a critical security audit event that tracks when computer accounts are added to security-enabled global groups within Active Directory. This event is generated by the Local Security Authority (LSA) subsystem and logged to the Security event log on domain controllers where the group membership change occurs.
The event provides comprehensive details including the security identifier (SID) of both the computer account being added and the target group, the logon session information of the user who performed the action, and timestamp data. This information is essential for maintaining security compliance and conducting forensic investigations when unauthorized changes occur.
Computer accounts in Active Directory represent domain-joined machines and their group memberships often determine access rights to network resources, Group Policy application, and security boundaries. Changes to these memberships can significantly impact system security and functionality. Event ID 4751 ensures administrators have visibility into these critical modifications.
The event structure includes fields for the subject (who made the change), the member (computer account added), and the group (target security group). Additional context includes the caller process name and ID, providing a complete audit trail for group membership modifications involving computer accounts.