Event ID 4760 represents a fundamental security audit mechanism in Windows environments, specifically designed to track user account deletion operations across both local systems and Active Directory domains. When this event fires, it indicates that a user account has been permanently removed from the security database, whether that's the local SAM database on a workstation or the Active Directory database on a domain controller.
The event structure includes critical forensic information such as the Subject fields (who performed the deletion), Target Account fields (which account was deleted), and Additional Information fields that provide context about the deletion operation. The Subject Security ID field contains the SID of the administrator or service account that initiated the deletion, while the Target Account Name and Target Domain fields identify the deleted user account.
In modern Windows environments running the 2026 feature updates, Event ID 4760 has been enhanced with additional metadata fields that capture more granular information about the deletion context. This includes process information, logon session details, and correlation identifiers that help security teams build comprehensive audit trails. The event integrates seamlessly with Microsoft Sentinel, Windows Event Forwarding, and third-party SIEM solutions for centralized security monitoring.
Organizations implementing zero-trust security models rely heavily on Event ID 4760 for detecting unauthorized account deletions, especially privileged accounts that could indicate insider threats or compromised administrator credentials. The event's timing and frequency patterns often reveal automation scripts, bulk deletion operations, or suspicious after-hours administrative activities that warrant further investigation.