Event ID 4780 — The ACL was set on accounts which are members of administrators groups.
Description
The ACL was set on accounts which are members of administrators groups.
Message #
Fields #
| Name | Description |
|---|---|
TargetUserName UnicodeString | [Target Account] Account Name |
TargetDomainName UnicodeString | [Target Account] Account Domain |
TargetSid SID | [Target Account] Security ID |
SubjectUserSid SID | [Subject] Security ID |
SubjectUserName UnicodeString | [Subject] Account Name |
SubjectDomainName UnicodeString | [Subject] Account Domain |
SubjectLogonId HexInt64 | [Subject] Logon ID |
PrivilegeList UnicodeString | [Additional Information] Privileges Privilege constants reference |
Account_Name UnicodeString | [Target Account] Account Name. |
Account_Domain UnicodeString | [Target Account] Account Domain. |
Security_ID SID | [Target Account] Security ID. |
Logon_ID HexInt64 | [Subject] Logon ID. |
Privileges UnicodeString | [Additional Information] Privileges. Privilege constants reference |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 4780,
"version": 0,
"level": 0,
"task": 13824,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2026-03-14T00:17:46.607238+00:00",
"event_record_id": 16777470,
"correlation": {},
"execution": {
"process_id": 940,
"thread_id": 1056
},
"channel": "Security",
"computer": "LAB-DC01.ludus.domain",
"security": {
"user_id": ""
}
},
"event_data": {
"TargetUserName": "Domain Admins",
"TargetDomainName": "DC=ludus,DC=domain",
"TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-512",
"SubjectUserSid": "S-1-5-7",
"SubjectUserName": "ANONYMOUS LOGON",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e6",
"PrivilegeList": "-"
},
"message": ""
}
Detection Patterns #
User Account
Security-Auditing Event ID 4720: A user account was created.ANDEvent ID 4722: A user account was enabled.ANDEvent ID 4723: An attempt was made to change an account's password.ANDEvent ID 4724: An attempt was made to reset an account's password.ANDEvent ID 4725: A user account was disabled.ANDEvent ID 4726: A user account was deleted.ANDEvent ID 4728: A member was added to a security-enabled global group.ANDEvent ID 4732: A member was added to a security-enabled local group.ANDEvent ID 4733: A member was removed from a security-enabled local group.ANDEvent ID 4738: A user account was changed.ANDEvent ID 4743: A computer account was deleted.ANDEvent ID 4780: The ACL was set on accounts which are members of administrators groups.
6 rules
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4780
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-user-account-management
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4780