Event ID 4780 represents a fundamental security audit event in Windows Active Directory environments. When a computer account password changes, either through automatic renewal or administrative action, domain controllers log this event to maintain an audit trail of machine account modifications.
Computer accounts in Active Directory maintain trust relationships with the domain through shared secrets (passwords). These passwords automatically rotate every 30 days by default, controlled by the MaximumPasswordAge registry value. The password change process involves the client computer initiating a secure channel with the domain controller and requesting a new password.
The event contains structured data including the Security ID (SID) of the computer account, the account name, domain information, and details about who or what initiated the change. When automatic password changes occur, the computer account itself appears as the subject performing the action. Administrative password resets show the administrator's account as the subject.
This event plays a crucial role in security monitoring and compliance. Organizations use 4780 events to detect anomalous computer account activity, validate automated password rotation schedules, and investigate potential security breaches involving compromised machine accounts. The event also helps troubleshoot domain trust issues when computers lose their secure channel relationships.