The Windows Security Log Revealed

Chapter 8
Account Management Events

The Account Management security log category is particularly valuable. You can use these events to track maintenance of user, group, and computer objects in AD as well as to track local users and groups in member server and workstation SAMs. This category is also very easy to use: Windows uses a different event ID for each type of object and operation.

You can use Account Management events to track things such as new user accounts, password resets, and new members being added to groups. Monitoring the maintenance of domain users and groups can be a key aspect of compliance with legislation such as the Sarbanes-Oxley (SOX) Act and Health Insurance Portability and Accountability Act (HIPAA); access to private or financially significant information is controlled largely through group membership and based on user-account authentication. When you enable this category on DCs, each DC will begin recording maintenance events that are executed against users, group, and computer objects on that DC. To get a complete record of all Account Management events for AD objects, you’ll need to combine this category’s activity from all your DC Security logs. The table below shows all the subcategories that are associated with Account Management.

Account Management Subcategories

Comment

User Account Management

Track changes to server local user and AD user accounts

Computer Account Management

Track changes to AD computer accounts

Security Group Management

Track changes to AD security groups and local server groups

Distribution Group Management

Changes to mail accounts for exchange

Application Group Management

Role-based authorization groups for applications

Other Account Management Events

Policy change events

Account Management Events

The description fields of Account Management events are, for the most part, self-explanatory or similar to description fields from the categories that I've already discussed. Windows uses the Target field to identify the user, group, or computer that is the object of the event and identifies the object’s name and domain. Windows uses the Subject field to identify the user who performed the action.

User Account Management

The User Account Management subcategory tracks changes to local user accounts on member servers and to AD domain user accounts on DCs. The subcategory uses several event IDs shown below to track user account changes.

Note event ID 4738 (A user account was changed). User Account Management logs this event for any type of change. No list exists of the descriptions of all possible changes, so to filter instances of event ID 4738 for a certain type of change you’ll need to execute that change on a sample user account, find the event ID 4738 instance, and capture the text description that is in the Changed Attributes field. Before going to that trouble, look at the other events in this subcategory to determine whether any of them match the specified change. User Account Management provides additional, change-specific event IDs that make it easier to identify certain types of user-account changes. The first description field of these events usually provides a brief text description of what about the account was changed. For example, when you reset a user’s password, the first description string might say “password reset.” Note the difference between password changes (event ID 4723) and password resets (event ID 4724). Password changes occur when a user changes his or her password. Password resets indicate that an administrator or other support person reset the password for a user.

Event ID

Title

4720

A user account was created.

4722

A user account was enabled.

4723

An attempt was made to change an account's password.

4724

An attempt was made to reset an accounts password.

4725

A user account was disabled.

4726

A user account was deleted.

4738

A user account was changed.

4740

A user account was locked out.

4767

A user account was unlocked.

4780

The ACL was set on accounts which are members of administrators groups.

4781

The name of an account was changed:

4794

An attempt was made to set the Directory Services Restore Mode administrator password.

5376

Credential Manager credentials were backed up.

5377

Credential Manager credentials were restored from a backup.

User Account Management’s coverage of user account maintenance is well laid out, but be aware of one significant caveat. When you create a user account, you'll find an expected instance of event ID 4720 (User account created). But because of the way that the MMC Active Directory Users and Creators snap-in interacts with AD, you’ll also see a series of event ID 4738 instances interspersed with an instance of event ID 4722 (User account enabled) and event ID 4724 (An attempt was made to reset an accounts password). Unless your event-log management solution can perform multi-event correlations, these “extra” instances of event ID 4738, event ID 4722, and event ID 4724 can throw off reports or alerts that you’ve set up. If possible, filter out instances of these three event IDs when they are preceded within a couple seconds by an instance of event ID 4720 that shares the same target user name.

One more word about Event ID 4738: Windows provides granular information about which user account attributes were changed, including the options and restrictions that are found on the Account tab of the user account's Properties dialog box in the MMC Active Directory Users and Computers snap-in.

Computer Account Management

Events in the Computer Account Management category are logged only on DCs and indicates changes to AD computer accounts.

Event ID

Title

4741

A computer account was created.

4742

A computer account was changed.

4743

A computer account was deleted.

Security Group Management

Group management is one of the most important actions that you can monitor with the Security log. The events in the Security Group Management subcategory are logged on both member servers and DCs. Keep in mind that if you are monitoring group changes for AD, you must monitor all DCs because the Security log does not replicate between DCs.

Event ID

Title

4727

A security-enabled global group was created.

4728

A member was added to a security-enabled global group.

4729

A member was removed from a security-enabled global group.

4730

A security-enabled global group was deleted.

4731

A security-enabled local group was created.

4732

A member was added to a security-enabled local group.

4733

A member was removed from a security-enabled local group.

4734

A security-enabled local group was deleted.

4735

A security-enabled local group was changed.

4737

A security-enabled global group was changed.

4754

A security-enabled universal group was created.

4755

A security-enabled universal group was changed.

4756

A member was added to a security-enabled universal group.

4757

A member was removed from a security-enabled universal group.

4758

A security-enabled universal group was deleted.

4764

A groups type was changed.

Windows logs different event IDs for each type and scope of group. You select the group’s scope and type when you create the group.

AD supports two types of groups: distribution and security. Distribution groups serve as distribution lists (DLs) for Microsoft Outlook and Microsoft Exchange Server users. These groups are irrelevant to security; you can’t grant permissions or rights to distribution groups or use them for any security-related purpose. Security groups, as the name indicates, are used to grant or deny access; for what it’s worth, security groups can also be used as distribution groups.

In the descriptions of Account Management events, Windows describes security groups as Security Enabled and distribution groups as Security Disabled. The group type can be changed after a group is created. No matter which type a group is (or was), a group-change event is always logged as the Security Group Management subcategory event 4764.

A group is also configured to be one of four scopes. A group’s scope determines the computers on which the group can be used to control access and the types of users and groups that can be members of the group. Changing a group’s scope (even a distribution group) will produce event 4764 in the Security Group Management subcategory.

Scope

Potential Members

Permissions Granted

Where Defined

Where Logged

Universal

Users and global or universal groups from any domain in the forest

Anywhere in the forest

AD

DCs

Global

Users and other global groups from same the domain

Anywhere in the forest

AD

DCs

Domain Local

Users and global or universal groups from any domain in the forest and domain local groups from the same domain

Within the same domain

AD

DCs

Machine Local

Global or universal groups and users from any domain in the forest

Within the same system

Local SAM

Member servers and workstations

Account Management events also provide important information for member servers. Because of the maintenance and weak-authentication issues that arise from using local accounts, the use of local SAM users and groups on member servers should be avoided if domain accounts could be used instead. Local user accounts are the first target of intruders, who know that these accounts are less likely than domain accounts to be secure. A successful intruder often creates a legitimate local user account to avoid detection during future intrusions.

Given the risks of local accounts, you need to know when any activity that is associated with the creation or modification of local users and groups occurs. This is especially true when you have a policy against using local accounts. Enabling the Audit account management policy on member servers provides exactly such information. Because the local SAM contains no distribution, global, or universal groups, event IDs that are associated with these domain-only groups are not logged on member servers.

Distribution Group Management

As previously mentioned, distributions groups are used only in AD. These groups are used for integration with Exchange Server and cannot be assigned permissions or rights. However, a distribution group can be changed to a security group, so you might want to monitor additions to distribution groups. An alternative would be to monitor for event 4764 (group type change) and then to check the membership in AD if such a change occurs.

Event ID

Title

4744

A security-disabled local group was created.

4745

A security-disabled local group was changed.

4746

A member was added to a security-disabled local group.

4747

A member was removed from a security-disabled local group.

4748

A security-disabled local group was deleted.

4749

A security-disabled global group was created.

4750

A security-disabled global group was changed.

4751

A member was added to a security-disabled global group.

4752

A member was removed from a security-disabled global group.

4753

A security-disabled global group was deleted.

4759

A security-disabled universal group was created.

4760

A security-disabled universal group was changed.

4761

A member was added to a security-disabled universal group.

4762

A member was removed from a security-disabled universal group.

4763

A security-disabled universal group was deleted.

Application Group Management

Application groups are part of Windows' role-based access control for applications. These groups are maintained in the MMC Authorization Manager snap-in. We have noted a problem with the events in the Application Group Management subcategory: These events do not report the common name (cn) of the group. You probably are accustomed to seeing the cn in Authorization Manager, where application groups are maintained. This oversight is serious because it means that the account name that Application Group Management events report isn't displayed anywhere in Authorization Manager. To determine the cn of a group, look for Directory Service Changes subcategory events (which fall under the Directory Service Access audit category and which do report the cn) immediately following an application group management event. We’ll talk more about Directory Service Changes events in Chapter 9.

Event ID

Title

4783

A basic application group was created.

4784

A basic application group was changed.

4785

A member was added to a basic application group.

4786

A member was removed from a basic application group.

4787

A non-member was added to a basic application group.

4788

A non-member was removed from a basic application group.

4789

A basic application group was deleted.

4790

An LDAP query group was created.

4791

A basic application group was changed.

4792

An LDAP query group was deleted.

Other Account Management Events

Account Management logs just two other events, both under the Other Account Management Events subcategory. Event ID 4739 (Domain Policy was changed) is a little misleading. This event means that the computer's effective Account Policy or Account Lockout Policy (under Security Settings) was modified through either Local Security Policy or Group Policy/Domain Policy in AD.

Such a change on a DC affects domain accounts, and you can expect to see the same event logged on other DCs as the modified GPO replicates around the domain. This event on a member server affects only the local accounts on that server. In the case of local servers, the domain is the name of the local server.

A few other operations can generate this event, including the following:

  • Raising the domain functional level
  • Changing the Network security: Force logoff when logon hours expire security option

Unfortunately, this event’s Subject field doesn’t identify who actually changed the policy. The policy isn't directly configured by administrators but is instead edited in a GPO, which is then applied to the computer. Because the computer is the security principal under which gpupdate runs, this event always shows the local computer as the entity that changed the policy. GPOs such as Domain Policy are better monitored through the Directory Service Access category, which is discussed in Chapter 9.

Don’t completely ignore event ID 4739. Just use it for local server policy changes.

Event ID

Title

4739

Domain Policy was changed.

4793

The Password Policy Checking API was called.

The other subcategory event, event ID 4793, can be ignored as noise. According to Microsoft, the behavior that this event logs is typical behavior.

Bottom Line

Account Management is one of the best-designed Security log categories. You can use this category to track important maintenance to user accounts and groups. The category's use of many distinct event IDs simplifies the filtering process. (Don’t forget about the “extra” events that Windows logs in connection with user-account creations.)

Account Management does a good job of auditing changes to users, groups, and computers, but what about important AD objects such as OUs, GPOs, and domains? The Directory Service Access category provides granular tracking of any class of object in AD, even down to the attribute level.

Next Chapter

Back to top

Supercharger Free Edition


Your entire Windows Event Collection environment on a single pane of glass.

Free.

 

 

Upcoming Webinars
    Additional Resources