Account Management Event: 4735

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Management » Event ID 4735 - A security-enabled local group was changed

Event ID 4735 - A security-enabled local group was changed

Event ID 4735
Category Account management
Sub category Security group management
Description A security-enabled local group was changed

When a security local group is changed in Active Directory, event ID 4735 gets logged.

This log data gives the following information:

Subject: User who performed the action Security ID
Account Name
Account Domain
Logon ID
Group: Changed security local group Security ID
Group Name
Group Domain
Attributes SAM Account Name
SID History
Additional Information Privileges

Why event ID 4735 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

ADAudit Plus audits, reports, and alerts group management actions performed on distribution and security groups making Active Directory auditing much easier.

Event 4735 applies to the following operating systems: 

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10

Corresponding event ID for 4735 in Windows Server 2003 and older is 639

 

year-end-offer-2021-banner