Event ID 4738 - A user account was changed
Event ID | 4738 |
Category | Account management |
Sub category | User Account Management |
Description | A user account was changed |
When a user account is changed in Active Directory, event ID 4738 gets logged.
This log data gives the following information:
Subject: User who performed the action | Security ID Account Name Account Domain Logon ID |
New Account: Changed user account | Security ID Account Name Account Domain |
Attributes (of the changed account): | SAM Account Name Display Name User Principal Name Home Directory Home Drive Script Path Profile Path User Workstations Password Last Set Account Expires Primary Group ID Allowed To Delegate To Old UAC Value New UAC Value User Account Control:
SID History Logon Hours |
Additional Information | Privileges |
Why event ID 4738 needs to be monitored?
- Prevention of privilege abuse
- Detection of potential malicious activity
- Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
- Compliance mandates
Pro tip:
ADAudit Plus makes Active Directory auditing very easy by tracking User Status Changes like user enabled or disabled in a selected period of time in real-time with the help of pre-defined reports and instant alerts
Event 4738 applies to the following operating systems:
- Windows Server 2008 R2 and Windows 7
- Windows Server 2012 R2 and Windows 8.1
- Windows Server 2016 and Windows 10
Corresponding event ID for 4738 in Windows Server 2003 and older is 642
Explore Active Directory auditing and reporting with ADAudit Plus.
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Self-Service Password Management
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools