Event ID 4767 represents a fundamental component of Windows security auditing, specifically tracking user account unlock operations. When Windows generates this event, it indicates that a previously locked user account has been restored to an active state, either through administrative intervention or automatic system processes.
The event structure includes several key fields that provide comprehensive context about the unlock operation. The Subject fields identify who performed the unlock action, including the Security ID, Account Name, Account Domain, and Logon ID of the administrator or system process. The Target Account section specifies which account was unlocked, providing the Security ID and Account Name of the affected user. Additional fields capture the workstation name from which the unlock operation originated.
In Active Directory environments, this event typically appears on domain controllers when domain user accounts are unlocked. For standalone systems or workgroup computers, the event logs locally when local user accounts are unlocked. The timing of this event correlates directly with account lockout policies configured in Group Policy or local security settings.
From a security perspective, Event ID 4767 serves as a critical audit point for monitoring account management activities. Unusual patterns in account unlocks, such as frequent unlocks of the same account or unlocks performed outside normal business hours, may indicate security incidents requiring investigation. Conversely, legitimate unlock operations provide valuable audit trails for compliance reporting and administrative accountability.