Windows Security Log Event ID 4724

Operating Systems Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Windows Server 2019 and 2022
 • Subcategory
Account Management
 • User Account Management
Type Success
Corresponding events
in Windows 2003
and before

4724: An attempt was made to reset an accounts password

On this page

The Subject attempted to reset the password of the Target:  

Don't confuse this event with 4723.

This event is logged as a failure if the new password fails to meet the password policy.

This event is logged both for local SAM accounts and domain accounts.

You will also see one or more event ID 4738s informing you of the same information.

Free Security Log Resources by Randy

Description Fields in 4724


The user and logon session that performed the action.

  • Security ID:  The SID of the account.
  • Account Name: The account logon name.
  • Account Domain: The domain or - in the case of local accounts - computer name.
  • Logon ID is a semi-unique (unique between reboots) number that identifies the logon session.  Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session.

Target Account: 

  • Security ID:  SID of the account
  • Account Name:  name of the account
  • Account Domain: domain of the account

Supercharger Enterprise

Load Balancing for Windows Event Collection


Examples of 4724

An attempt was made to reset an account's password.


   Security ID:  WIN-R9H529RIO4Y\Administrator
   Account Name:  Administrator
   Account Domain:  WIN-R9H529RIO4Y
   Logon ID:  0x1fd23

Target Account:

   Security ID:  WIN-R9H529RIO4Y\bob
   Account Name:  bob
   Account Domain:  WIN-R9H529RIO4Y

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection


Additional Resources