Account Management Event: 643

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Management » Event ID 643 - Domain Policy Changed

Event ID 643 - Domain Policy Changed

Event ID 643
Category Account management
Sub category Audit Authentication Policy Change
Description Domain policy was changed

When a user account is deleted in Active Directory, event ID 643 gets logged. 

This log data gives the following information:

Changes made Min. Password Age
Max. Password Age
Force Logoff
Lockout Threshold
Lockout Observation Window
Lockout Duration
Password Properties
Min. Password Length
Password History Length
Machine Account Quota
Mixed Domain Mode
Domain Behavior Version
OEM Information
Additional Information Privileges

Why event ID 643 needs to be monitored?

  • Prevention of privilege abuse
  • Detection of potential malicious activity
  • Operational purposes like getting information on user activity like user attendance, peak logon times, etc.
  • Compliance mandates

Pro tip:

Real-time Group Policy change audit reports from ADAudit Plus audits all changes that happen to a Group Policy object over its lifetime and provides a clear insight on the history of changes made to the Group Policy object.

Event 643 applies to the following operating systems:

  • Windows Server 2000
  • Windows 2003 and XP

Corresponding event ID for 643 in Windows Server 2008 and Vista is 4739

year-end-offer-2021-banner