Windows Event ID 4753 is a security audit event generated by the Microsoft-Windows-Security-Auditing provider when a member is removed from a security-enabled global group in Active Directory. This event occurs exclusively on domain controllers and is logged to the Security event log as part of Windows advanced audit policy configuration.
The event contains detailed information about the group membership change, including the Security ID (SID) and account name of both the user performing the action and the user being removed from the group. It also records the target group's distinguished name, domain information, and precise timestamp of the modification.
This audit event is crucial for organizations implementing security monitoring, compliance frameworks like SOX or HIPAA, and forensic analysis capabilities. The event helps administrators track changes to security groups that may affect access permissions, identify unauthorized modifications to group memberships, and maintain comprehensive audit trails for regulatory requirements.
Event ID 4753 is generated through the Local Security Authority (LSA) subsystem when Active Directory processes group membership removal operations. The event fires regardless of whether the removal was performed through graphical tools, command-line utilities, or programmatic interfaces like LDAP or PowerShell Active Directory modules.