Pricing  Get Quote
 
 
 

Windows Event ID 4720 - A user account was created

Event ID 4720
Category Account management
Sub category User account management
Description Password Policy Checking API is called

When a user account is created in Active Directory, event ID 4720 is logged.

This log data gives the following information:

Subject: User who performed the action

Security ID

Account Name

Account Domain

Logon ID

Member: Object added to the security group Security ID Account Name
Group: Security group to which the object was added Security ID Group Name Group Domain
New Account: Created user account 

Security ID

Account Name

Account Domain

Attributes (of the new account): 

SAM Account Name

Display Name

User Principal Name

Home Directory

Home Drive

Script Path

Profile Path

User Workstations

Password Last Set

Account Expires

Primary Group ID

Allowed To Delegate To

Old UAC Value

New UAC Value

User Account Control:

  • Account Disabled
  • 'Password Not Required'
  • 'Normal Account'

User Parameters

SID History

Logon Hours

Additional Information: Privileges

Why event ID 4720 needs to be monitored?

Pro tip:

ADAudit Plus alerts and tracks User Lifecycle Changes like creation, deletion, and modification of user accounts in real-time which makes Active Directory auditing much easier.

Event 4270 applies to the following operating systems:

  • Windows Server 2008 R2 and Windows 7
  • Windows Server 2012 R2 and Windows 8.1
  • Windows Server 2016 and Windows 10

Corresponding event ID for 4720 in Windows Server 2003 and older is 624

Track Event ID 4720 user account creation and prevent unauthorized provisioning with ADAudit Plus.

Download Now