Microsoft-Windows-Security-Auditing › Event 4731

Event ID 4731 — A security-enabled local group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A security-enabled local group was created.

Message #

A security-enabled local group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[New Group] Group Name.
TargetDomainName UnicodeString[New Group] Group Domain.
TargetSid SID[New Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name.
SidHistory UnicodeString[Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4731,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-07T16:44:41.241162+00:00",
    "event_record_id": 49,
    "correlation": {
      "ActivityID": "C1DC836A-4A9E-0000-8485-DCC19E4AD801"
    },
    "execution": {
      "process_id": 648,
      "thread_id": 652
    },
    "channel": "Security",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Remote Management Users",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-580",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "MINWINPC$",
    "SubjectDomainName": "",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "Remote Management Users",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #