ANAVEM
Languagefr
Windows Security Event Viewer displaying Event ID 4760 user account deletion audit logs on a professional monitoring dashboard
Event ID 4760InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4760 – Microsoft-Windows-Security-Auditing: User Account Deleted

Event ID 4760 fires when a user account is deleted from Active Directory or local system. This security audit event tracks account deletion operations for compliance and security monitoring purposes.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 202612 min read 0
Event ID 4760Microsoft-Windows-Security-Auditing 5 methods 12 min
Event Reference

What This Event Means

Event ID 4760 represents a fundamental security audit mechanism in Windows environments, specifically designed to track user account deletion operations across both local systems and Active Directory domains. When this event fires, it indicates that a user account has been permanently removed from the security database, whether that's the local SAM database on a workstation or the Active Directory database on a domain controller.

The event structure includes critical forensic information such as the Subject fields (who performed the deletion), Target Account fields (which account was deleted), and Additional Information fields that provide context about the deletion operation. The Subject Security ID field contains the SID of the administrator or service account that initiated the deletion, while the Target Account Name and Target Domain fields identify the deleted user account.

In modern Windows environments running the 2026 feature updates, Event ID 4760 has been enhanced with additional metadata fields that capture more granular information about the deletion context. This includes process information, logon session details, and correlation identifiers that help security teams build comprehensive audit trails. The event integrates seamlessly with Microsoft Sentinel, Windows Event Forwarding, and third-party SIEM solutions for centralized security monitoring.

Organizations implementing zero-trust security models rely heavily on Event ID 4760 for detecting unauthorized account deletions, especially privileged accounts that could indicate insider threats or compromised administrator credentials. The event's timing and frequency patterns often reveal automation scripts, bulk deletion operations, or suspicious after-hours administrative activities that warrant further investigation.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • Administrator manually deleting a user account through Active Directory Users and Computers
  • PowerShell scripts executing Remove-ADUser or Remove-LocalUser cmdlets
  • Automated provisioning systems removing deprovisioned employee accounts
  • Group Policy-driven account cleanup processes
  • Third-party identity management tools performing account lifecycle operations
  • Exchange Server removing associated mailbox accounts during decommissioning
  • Local administrator removing local user accounts via Computer Management
  • Command-line operations using net user /delete or dsrm commands
  • Bulk import operations that include account deletion instructions
  • Service accounts being removed during application uninstallation
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific Event ID 4760 entry to understand the deletion context and identify the responsible party.

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSecurity
  3. Filter the log by clicking Filter Current Log in the Actions pane
  4. Enter 4760 in the Event IDs field and click OK
  5. Double-click on the Event ID 4760 entry to view detailed information
  6. Review the Subject section to identify who performed the deletion:
    • Security ID: SID of the account that deleted the user
    • Account Name: Username of the deleting account
    • Account Domain: Domain of the deleting account
    • Logon ID: Session identifier for correlation
  7. Examine the Target Account section:
    • Security ID: SID of the deleted user account
    • Account Name: Username that was deleted
    • Account Domain: Domain where the account existed
  8. Note the timestamp and correlate with any change management tickets or scheduled maintenance windows
Pro tip: Save the event details to XML format for forensic analysis by right-clicking the event and selecting Save Selected Events.
02

Query Security Events with PowerShell

Use PowerShell to search for Event ID 4760 across multiple systems and time ranges for comprehensive analysis.

  1. Open PowerShell as Administrator
  2. Query recent account deletion events on the local system:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760} -MaxEvents 50 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
  3. Search for specific user account deletions by filtering the message content:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760} | Where-Object {$_.Message -like "*username*"} | Select-Object TimeCreated, Message
  4. Query multiple domain controllers for comprehensive coverage:
    $DCs = Get-ADDomainController -Filter *
    foreach ($DC in $DCs) {
        Write-Host "Checking $($DC.Name)..."
        Invoke-Command -ComputerName $DC.Name -ScriptBlock {
            Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760; StartTime=(Get-Date).AddDays(-7)} -ErrorAction SilentlyContinue
        }
    }
  5. Export results to CSV for analysis:
    Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760; StartTime=(Get-Date).AddDays(-30)} | Select-Object TimeCreated, Id, LevelDisplayName, @{Name='DeletedUser';Expression={($_.Message -split '\n' | Where-Object {$_ -like '*Account Name:*'})[1] -replace '\s*Account Name:\s*',''}}, @{Name='DeletedBy';Expression={($_.Message -split '\n' | Where-Object {$_ -like '*Subject:*' -A 3})[1] -replace '\s*Account Name:\s*',''}} | Export-Csv -Path "C:\Temp\DeletedAccounts.csv" -NoTypeInformation
Warning: Querying large Security logs can impact system performance. Use time filters and run during maintenance windows when possible.
03

Correlate with Active Directory Changes

Cross-reference Event ID 4760 with Active Directory replication logs and change tracking to build a complete picture of account deletion activities.

  1. Check Active Directory replication logs on domain controllers:
    Get-WinEvent -FilterHashtable @{LogName='Directory Service'; Id=1566,1567} -MaxEvents 100 | Where-Object {$_.TimeCreated -gt (Get-Date).AddHours(-24)}
  2. Query the Active Directory Recycle Bin for recently deleted objects:
    Get-ADObject -Filter {Deleted -eq $true -and ObjectClass -eq "user"} -IncludeDeletedObjects -Properties whenChanged,whenCreated,DisplayName,DistinguishedName | Where-Object {$_.whenChanged -gt (Get-Date).AddDays(-7)} | Sort-Object whenChanged -Descending
  3. Review Directory Services logs for additional context:
    1. Open Event Viewer and navigate to Applications and Services LogsDirectory Service
    2. Look for Event IDs 1566 (object deleted) and 1567 (object moved to deleted objects container)
    3. Correlate timestamps with Event ID 4760 entries
  4. Check Group Policy logs for automated deletion policies:
    Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-GroupPolicy/Operational'; StartTime=(Get-Date).AddDays(-1)} | Where-Object {$_.Message -like "*user*" -and $_.Message -like "*delet*"}
  5. Examine the Security log for related events:
    • Event ID 4726: User account was deleted (legacy event)
    • Event ID 4738: User account was changed
    • Event ID 4781: Account name was changed
Pro tip: Enable Advanced Audit Policy Configuration under Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration for more detailed logging.
04

Investigate Suspicious Deletion Patterns

Analyze Event ID 4760 patterns to identify potential security incidents, unauthorized deletions, or compromised administrator accounts.

  1. Create a PowerShell script to analyze deletion patterns:
    # Analyze account deletion patterns
    $Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760; StartTime=(Get-Date).AddDays(-30)}
    $Analysis = $Events | ForEach-Object {
        $Message = $_.Message
        $SubjectAccount = ($Message -split '\n' | Where-Object {$_ -match 'Subject:' -A 4})[1] -replace '\s*Account Name:\s*',''
        $TargetAccount = ($Message -split '\n' | Where-Object {$_ -match 'Target Account:' -A 4})[1] -replace '\s*Account Name:\s*',''
        [PSCustomObject]@{
            TimeCreated = $_.TimeCreated
            DeletedBy = $SubjectAccount
            DeletedUser = $TargetAccount
            ComputerName = $_.MachineName
        }
    }
    $Analysis | Group-Object DeletedBy | Sort-Object Count -Descending
  2. Check for after-hours deletions that might indicate unauthorized access:
    $SuspiciousHours = $Analysis | Where-Object {$_.TimeCreated.Hour -lt 6 -or $_.TimeCreated.Hour -gt 22}
    $SuspiciousHours | Format-Table TimeCreated, DeletedBy, DeletedUser, ComputerName
  3. Identify bulk deletion operations:
    $BulkDeletions = $Analysis | Group-Object DeletedBy, @{Expression={$_.TimeCreated.ToString("yyyy-MM-dd HH:mm")}} | Where-Object {$_.Count -gt 5}
    $BulkDeletions | ForEach-Object {Write-Host "$($_.Name) deleted $($_.Count) accounts" -ForegroundColor Yellow}
  4. Cross-reference with failed logon attempts (Event ID 4625):
    $FailedLogons = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4625; StartTime=(Get-Date).AddDays(-1)}
    $SuspiciousAccounts = $Analysis.DeletedBy | Where-Object {$_ -in ($FailedLogons | ForEach-Object {($_.Message -split '\n' | Where-Object {$_ -like '*Account Name:*'})[0] -replace '\s*Account Name:\s*',''})}
  5. Generate a security report:
    $Report = @"
    Account Deletion Security Report - $(Get-Date)
    ================================================
    Total Deletions: $($Analysis.Count)
    Unique Administrators: $($Analysis.DeletedBy | Sort-Object -Unique | Measure-Object).Count
    After-Hours Deletions: $($SuspiciousHours.Count)
    Bulk Deletion Events: $($BulkDeletions.Count)
    
    Top Account Deleters:
    $($Analysis | Group-Object DeletedBy | Sort-Object Count -Descending | Select-Object -First 5 | Format-Table Name, Count | Out-String)
    "@
    $Report | Out-File -FilePath "C:\Temp\AccountDeletionReport.txt"
Warning: Investigate any account deletions performed by service accounts or during unusual hours, as these may indicate compromised credentials or insider threats.
05

Configure Advanced Monitoring and Alerting

Set up proactive monitoring for Event ID 4760 to detect unauthorized account deletions in real-time and establish proper audit trails.

  1. Configure Windows Event Forwarding to centralize Event ID 4760 collection:
    1. On the collector server, run:
      wecutil qc
    2. Create a custom subscription XML file:
      <Subscription xmlns="http://schemas.microsoft.com/2006/03/windows/events/subscription">
          <SubscriptionId>AccountDeletions</SubscriptionId>
          <SubscriptionType>SourceInitiated</SubscriptionType>
          <Description>Account Deletion Events</Description>
          <Enabled>true</Enabled>
          <Uri>http://schemas.microsoft.com/wbem/wsman/1/windows/EventLog</Uri>
          <ConfigurationMode>Normal</ConfigurationMode>
          <Query><![CDATA[
              <QueryList>
                  <Query Id="0">
                      <Select Path="Security">*[System[EventID=4760]]</Select>
                  </Query>
              </QueryList>
          ]]></Query>
      </Subscription>
    3. Import the subscription:
      wecutil cs AccountDeletions.xml
  2. Create a PowerShell scheduled task for real-time alerting:
    $Action = New-ScheduledTaskAction -Execute "PowerShell.exe" -Argument "-File C:\Scripts\MonitorAccountDeletions.ps1"
    $Trigger = New-ScheduledTaskTrigger -Once -At (Get-Date) -RepetitionInterval (New-TimeSpan -Minutes 5) -RepetitionDuration (New-TimeSpan -Days 365)
    $Principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -LogonType ServiceAccount
    $Settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable
    Register-ScheduledTask -TaskName "MonitorAccountDeletions" -Action $Action -Trigger $Trigger -Principal $Principal -Settings $Settings
  3. Configure audit policy for comprehensive logging:
    auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
    auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
  4. Set up Event Log size and retention policies:
    wevtutil sl Security /ms:1073741824  # Set Security log to 1GB
    wevtutil sl Security /rt:false        # Disable log overwrite
  5. Create a monitoring script (C:\Scripts\MonitorAccountDeletions.ps1):
    # Monitor for new Event ID 4760 entries
    $LastCheck = Get-Content "C:\Scripts\LastCheck.txt" -ErrorAction SilentlyContinue
    if (-not $LastCheck) { $LastCheck = (Get-Date).AddMinutes(-5) }
    else { $LastCheck = [DateTime]$LastCheck }
    
    $NewEvents = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760; StartTime=$LastCheck} -ErrorAction SilentlyContinue
    
    if ($NewEvents) {
        $AlertMessage = "ALERT: $($NewEvents.Count) user account(s) deleted since $LastCheck"
        Write-EventLog -LogName Application -Source "AccountMonitor" -EventId 1001 -EntryType Warning -Message $AlertMessage
        # Add email notification or SIEM integration here
    }
    
    Get-Date | Out-File "C:\Scripts\LastCheck.txt"
Pro tip: Integrate with Microsoft Sentinel or your SIEM solution using the Windows Security Events connector for advanced analytics and automated response capabilities.

Overview

Event ID 4760 is a security audit event that fires whenever a user account gets deleted from the system. This event appears in the Security log and provides critical information about who deleted the account, when it happened, and which account was removed. The event fires on domain controllers when Active Directory accounts are deleted, and on local systems when local user accounts are removed.

This event is part of Windows advanced audit policy configuration and only appears when object access auditing is enabled. The event captures essential details including the security identifier (SID) of the deleted account, the administrator who performed the deletion, and the timestamp of the operation. For organizations running Windows Server 2025 and the latest 2026 security updates, this event provides enhanced logging capabilities with additional context fields.

Understanding Event ID 4760 is crucial for security teams monitoring unauthorized account deletions, compliance auditors tracking user lifecycle management, and administrators investigating suspicious account management activities. The event works in conjunction with other account management events like 4726 (user account deleted) to provide comprehensive audit trails.

Frequently Asked Questions

What does Event ID 4760 mean and when does it appear?+
Event ID 4760 is a security audit event that fires whenever a user account is deleted from Windows systems. It appears in the Security log when an administrator removes a user account through Active Directory Users and Computers, PowerShell cmdlets like Remove-ADUser, or command-line tools. The event captures who performed the deletion, which account was deleted, and when the operation occurred. This event is essential for security monitoring, compliance auditing, and forensic investigations involving unauthorized account deletions.
How can I tell who deleted a user account from Event ID 4760?+
Event ID 4760 contains detailed information about both the person who performed the deletion and the account that was deleted. In the event details, look for the 'Subject' section which shows the Security ID, Account Name, Account Domain, and Logon ID of the administrator who deleted the account. The 'Target Account' section shows details of the deleted user. You can also use PowerShell to extract this information: Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4760} | ForEach-Object {$_.Message} to see the full event message with all relevant details.
Why am I not seeing Event ID 4760 in my Security log?+
Event ID 4760 only appears when audit policies are properly configured for user account management. You need to enable 'Audit User Account Management' under Advanced Audit Policy Configuration. Run 'auditpol /get /subcategory:"User Account Management"' to check current settings, then enable it with 'auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable'. Additionally, ensure the Security log has sufficient space and isn't being overwritten. The event also only fires when actual account deletions occur, not when accounts are disabled or moved.
Can Event ID 4760 help me recover deleted user accounts?+
Event ID 4760 itself doesn't recover deleted accounts, but it provides crucial information for recovery efforts. The event shows exactly when the account was deleted and by whom, which helps with recovery timing. For Active Directory environments, you can use the AD Recycle Bin feature to restore deleted accounts if enabled. Use Get-ADObject -Filter {Deleted -eq $true -and ObjectClass -eq 'user'} -IncludeDeletedObjects to find deleted accounts, then Restore-ADObject to recover them. The Event ID 4760 timestamp helps identify which accounts to restore and correlate with backup restoration points if AD Recycle Bin isn't available.
How do I set up alerts for suspicious account deletions using Event ID 4760?+
Set up automated monitoring by creating a PowerShell script that queries for new Event ID 4760 events and triggers alerts based on suspicious patterns. Use Get-WinEvent with time filters to check for recent deletions, then analyze patterns like after-hours deletions, bulk deletions by single accounts, or deletions by service accounts. Create a scheduled task to run this script every few minutes. For enterprise environments, configure Windows Event Forwarding to centralize Event ID 4760 collection, then integrate with SIEM solutions like Microsoft Sentinel. You can also use Event Viewer's Attach Task to This Event feature to trigger immediate notifications when Event ID 4760 occurs.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...