Windows Security Log Event ID 4740

Operating Systems Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Windows Server 2019 and 2022
 • Subcategory
Account Management
 • User Account Management
Type Success
Corresponding events
in Windows 2003
and before

4740: A user account was locked out

On this page

The indicated user account was locked out after repeated logon failures due to a bad password. 

See event ID 4767 for account unlocked.

This event is logged both for local SAM accounts and domain accounts.

Free Security Log Resources by Randy

Description Fields in 4740


The user and logon session that performed the action.  This will always be the system account. 

  • Security ID:  The SID of the account.
  • Account Name: The account logon name.
  • Account Domain: The domain or - in the case of local accounts - computer name.
  • Logon ID is a semi-unique (unique between reboots) number that identifies the logon session.  Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session. 

Account That Was Locked Out: 

  • Security ID:  SID of the account
  • Account Name:  name of the account
  • Account Domain: domain of the account

Additional Information:

  • Caller Computer Name: Is this the computer where the logon attempts were occuring?  If you have information to share start a discussion!

Setup PowerShell Audit Log Forwarding in 4 Minutes


Examples of 4740

A user account was locked out.


   Security ID:  SYSTEM
   Account Name:  WIN-R9H529RIO4Y$
   Account Domain:  WORKGROUP
   Logon ID:  0x3e7

Account That Was Locked Out:

   Security ID:  WIN-R9H529RIO4Y\John
   Account Name:  John

Additional Information:

   Caller Computer Name: WIN-R9H529RIO4Y

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection


Additional Resources