Event ID 4756 is generated by the Windows Security Auditing subsystem when Active Directory processes a request to add a member to a universal security group. Universal groups can contain members from any domain in the forest and can be granted permissions to resources in any domain, making their membership changes particularly significant from a security perspective.
The event contains several key fields including the target group's distinguished name and SID, the added member's SID and account name, and the subject who performed the action. The event also includes the logon ID and authentication package used, providing a complete audit trail for forensic analysis.
This event only fires when audit policy for Account Management is enabled on domain controllers. The event appears in real-time as group changes occur and is replicated across all domain controllers in the domain. Security teams use this event to detect unauthorized additions to sensitive groups, track administrative actions, and maintain compliance with regulatory requirements that mandate group membership auditing.
The event is particularly valuable for monitoring Enterprise Admins, Schema Admins, and custom universal groups that have been granted sensitive permissions across the forest. Automated monitoring systems often trigger alerts when members are added to these high-privilege groups outside of approved change windows.