ANAVEM
Languagefr
Active Directory Users and Computers console showing computer account group membership management
Event ID 4751InformationSecurityWindows

Windows Event ID 4751 – Security: Computer Account Added to Security-Enabled Global Group

Event ID 4751 fires when a computer account is added to a security-enabled global group in Active Directory. This security audit event tracks group membership changes for computer objects.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 20269 min read 0
Event ID 4751Security 5 methods 9 min
Event Reference

What This Event Means

Windows Event ID 4751 represents a critical security audit event that tracks when computer accounts are added to security-enabled global groups within Active Directory. This event is generated by the Local Security Authority (LSA) subsystem and logged to the Security event log on domain controllers where the group membership change occurs.

The event provides comprehensive details including the security identifier (SID) of both the computer account being added and the target group, the logon session information of the user who performed the action, and timestamp data. This information is essential for maintaining security compliance and conducting forensic investigations when unauthorized changes occur.

Computer accounts in Active Directory represent domain-joined machines and their group memberships often determine access rights to network resources, Group Policy application, and security boundaries. Changes to these memberships can significantly impact system security and functionality. Event ID 4751 ensures administrators have visibility into these critical modifications.

The event structure includes fields for the subject (who made the change), the member (computer account added), and the group (target security group). Additional context includes the caller process name and ID, providing a complete audit trail for group membership modifications involving computer accounts.

Applies to

Windows Server 2019Windows Server 2022Windows Server 2025Windows 10Windows 11
Analysis

Possible Causes

  • Administrator manually adding a computer account to a security-enabled global group using Active Directory Users and Computers
  • PowerShell scripts or commands using Add-ADGroupMember cmdlet to modify group membership
  • Automated processes or Group Policy Preferences adding computers to groups
  • Third-party identity management tools modifying Active Directory group memberships
  • LDAP-based applications programmatically adding computer accounts to groups
  • Migration tools or scripts moving computer accounts between groups during infrastructure changes
  • Service accounts or applications with delegated permissions modifying group memberships
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of Event ID 4751 to understand what change occurred and who initiated it.

  1. Open Event Viewer on the domain controller where the event was logged
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 4751 or search for recent occurrences
  4. Double-click the event to view detailed information including:
    • Subject: User account that made the change
    • Member: Computer account that was added
    • Group: Target security group
    • Caller Process Name: Application that initiated the change
  5. Note the timestamp and correlate with any scheduled maintenance or known administrative activities
Pro tip: Check the Caller Process Name field to identify whether the change was made through standard tools like dsa.msc or programmatic methods.
02

Query Events Using PowerShell

Use PowerShell to efficiently search and analyze Event ID 4751 occurrences across your domain controllers.

  1. Open PowerShell as Administrator on a domain controller or management workstation
  2. Query recent Event ID 4751 entries:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4751} -MaxEvents 50 | Select-Object TimeCreated, Id, LevelDisplayName, Message
  3. For more detailed analysis, extract specific fields:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4751} -MaxEvents 20 | ForEach-Object {
        $xml = [xml]$_.ToXml()
        [PSCustomObject]@{
            TimeCreated = $_.TimeCreated
            SubjectUserName = $xml.Event.EventData.Data[1].'#text'
            MemberName = $xml.Event.EventData.Data[6].'#text'
            GroupName = $xml.Event.EventData.Data[8].'#text'
            CallerProcessName = $xml.Event.EventData.Data[11].'#text'
        }
    }
  4. Query events from multiple domain controllers:
    $DCs = Get-ADDomainController -Filter *
    foreach ($DC in $DCs) {
        Write-Host "Checking $($DC.Name)..."
        Invoke-Command -ComputerName $DC.Name -ScriptBlock {
            Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4751} -MaxEvents 10 -ErrorAction SilentlyContinue
        }
    }
03

Verify Group Membership Changes in Active Directory

Confirm the actual group membership changes and validate whether they were authorized.

  1. Open Active Directory Users and Computers (dsa.msc)
  2. Locate the computer account mentioned in the event:
    • Navigate to the appropriate OU or use the search function
    • Right-click the computer account and select Properties
    • Click the Member Of tab to view current group memberships
  3. Verify the group mentioned in the event is now listed in the computer's memberships
  4. Check the group's properties to see when the computer was added:
    • Navigate to the security group mentioned in the event
    • Right-click and select Properties
    • Click the Members tab to confirm the computer account is present
  5. Use PowerShell to get detailed membership information:
    Get-ADComputer "ComputerName" -Properties MemberOf | Select-Object Name, @{Name="Groups";Expression={$_.MemberOf -replace '^CN=([^,]+),.*','$1'}}
Warning: Unauthorized computer account additions to privileged groups like Domain Admins or Enterprise Admins require immediate investigation.
04

Investigate Using Advanced Audit Logs

Perform deeper forensic analysis by correlating Event ID 4751 with related security events.

  1. Enable advanced auditing if not already configured:
    auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
  2. Search for related events that occurred around the same time:
    $StartTime = (Get-Date).AddHours(-2)
    $EndTime = Get-Date
    Get-WinEvent -FilterHashtable @{
        LogName='Security'
        Id=4624,4625,4648,4672,4751,4752,4756,4757
        StartTime=$StartTime
        EndTime=$EndTime
    } | Sort-Object TimeCreated
  3. Check for logon events (4624) from the subject user around the time of the group change
  4. Look for privilege use events (4672) that might indicate elevated permissions were used
  5. Review any failed attempts (4625) that might indicate unauthorized access attempts
  6. Export findings for further analysis:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4751} -MaxEvents 100 | Export-Csv -Path "C:\Temp\Event4751_Analysis.csv" -NoTypeInformation
05

Implement Monitoring and Alerting

Set up proactive monitoring to detect and alert on future Event ID 4751 occurrences, especially for sensitive groups.

  1. Create a scheduled task to monitor for Event ID 4751:
    $Action = New-ScheduledTaskAction -Execute "PowerShell.exe" -Argument "-File C:\Scripts\Monitor-Event4751.ps1"
    $Trigger = New-ScheduledTaskTrigger -Once -At (Get-Date) -RepetitionInterval (New-TimeSpan -Minutes 15) -RepetitionDuration (New-TimeSpan -Days 365)
    $Settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable
    Register-ScheduledTask -TaskName "Monitor-Event4751" -Action $Action -Trigger $Trigger -Settings $Settings -User "SYSTEM"
  2. Create the monitoring script (C:\Scripts\Monitor-Event4751.ps1):
    # Monitor-Event4751.ps1
    $LastCheck = (Get-Date).AddMinutes(-15)
    $Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4751; StartTime=$LastCheck} -ErrorAction SilentlyContinue
    
    if ($Events) {
        foreach ($Event in $Events) {
            $xml = [xml]$Event.ToXml()
            $GroupName = $xml.Event.EventData.Data[8].'#text'
            $ComputerName = $xml.Event.EventData.Data[6].'#text'
            
            # Alert for sensitive groups
            $SensitiveGroups = @("Domain Admins", "Enterprise Admins", "Schema Admins")
            if ($GroupName -in $SensitiveGroups) {
                Send-MailMessage -To "admin@company.com" -From "security@company.com" -Subject "ALERT: Computer added to privileged group" -Body "Computer $ComputerName was added to $GroupName at $($Event.TimeCreated)" -SmtpServer "mail.company.com"
            }
        }
    }
  3. Configure Windows Event Forwarding (WEF) to centralize Event ID 4751 from all domain controllers
  4. Set up SIEM integration to correlate Event ID 4751 with other security events
Pro tip: Consider implementing just-in-time (JIT) access for computer account group modifications to reduce the attack surface.

Overview

Event ID 4751 is a security audit event that fires whenever a computer account is added to a security-enabled global group in Active Directory. This event is part of the account management audit category and provides detailed tracking of group membership changes for computer objects. The event captures who made the change, which computer account was added, and to which group it was added.

This event only fires when advanced audit policy subcategory 'Audit Security Group Management' is enabled. The event appears in the Security log on domain controllers and provides crucial information for security monitoring and compliance requirements. Unlike user account group changes, computer account group modifications are less frequent but equally important for security tracking.

The event includes detailed information about the subject who performed the action, the target computer account, and the group that was modified. This makes it valuable for forensic analysis and understanding changes to computer security group memberships in your Active Directory environment.

Frequently Asked Questions

What does Event ID 4751 mean and why is it important?+
Event ID 4751 indicates that a computer account has been added to a security-enabled global group in Active Directory. This event is important because computer group memberships determine access rights, Group Policy application, and security boundaries. Unauthorized changes to computer group memberships can lead to privilege escalation, security policy bypass, or unauthorized access to network resources. Monitoring this event helps maintain security compliance and detect potential insider threats or compromised accounts.
How can I tell if an Event ID 4751 represents a legitimate or suspicious activity?+
To determine legitimacy, examine the event details including the subject user who made the change, the time of occurrence, and the caller process name. Legitimate activities typically occur during business hours by authorized administrators using standard tools like Active Directory Users and Computers (dsa.msc) or PowerShell. Suspicious indicators include changes made outside business hours, by non-administrative accounts, using unusual processes, or additions to highly privileged groups. Cross-reference the timing with change management records and verify with the responsible administrator.
Why am I not seeing Event ID 4751 in my Security log?+
Event ID 4751 only appears when the 'Audit Security Group Management' subcategory is enabled in your audit policy. Check your current audit settings using 'auditpol /get /subcategory:"Security Group Management"'. If it shows 'No Auditing', enable it with 'auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable'. Additionally, this event only fires for security-enabled global groups, not distribution groups or other group types. The event is logged on the domain controller where the group membership change occurs.
Can Event ID 4751 help me track who added a computer to a specific group?+
Yes, Event ID 4751 provides detailed information about who made the group membership change. The event includes the Subject fields showing the Security ID, Account Name, Account Domain, and Logon ID of the user who performed the action. It also includes the Caller Process Name and Process ID, which helps identify the tool or application used to make the change. This information creates a complete audit trail for forensic analysis and accountability purposes.
How should I respond to Event ID 4751 for sensitive computer groups?+
For sensitive groups like those with administrative privileges, immediately verify the change was authorized by checking with the responsible administrator and reviewing change management records. If unauthorized, remove the computer from the group immediately and investigate how the change occurred. Review related security events around the same timeframe, check for signs of account compromise, and consider resetting passwords for involved accounts. Implement additional monitoring and approval workflows for future changes to sensitive computer groups. Document the incident and update security procedures if necessary.
Documentation

References (1)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...