Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2000-2003->Security Log->Account Management->EventID 648 - Security Disabled Local Group Created [Win 2000]
EventID 648 - Security Disabled Local Group Created [Win 2000]
Indicates that distribution local group was successfully created by "caller" user.

This event occurs only on domain controllers.

Find more information about this event on ultimatewindowssecurity.com.

Corresponding events on other OS versions:
Windows 2003 Windows 2008
        Event Type:     Success Audit
        Event Source:   Security
        Event Category: Account Management
        Event ID:       648
        Date:           11/13/2009
        Time:           11:36:12
        User:           LOGISTICS\ALebovsky
        Computer:       DCCC1
        Security Disabled Local Group Created:
        Target Account Name:	Employees_distrib
        Target Domain:	LOGISTICS
        Target Account ID:	%{S-1-5-21-746137067-343818398-839522115-1155}
        Caller User Name:	ALebovsky
        Caller Domain:	LOGISTICS
        Caller Logon ID:	(0x0,0x416355)
        Privileges:	-
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows 2000
Category Account Management
Source Security
EventId 648
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Category A name for a subclass of events within the same Event Source. Category Logon/Logoff
Caller User Name Account initiating action InsertionString4 Alebovsky
Caller Domain Domain of the account initiating action InsertionString5 RESEARCH
Caller Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. InsertionString6 (0x0,0x59DF36)
Target Account Name Name of the account on which the action is performed InsertionString1 Employees_distrib
Target Domain Domain name of the Target Account InsertionString2 LOGISTICS
Target Account ID Target Account Name in the following format: Target Domain\Target Account Name InsertionString3 %{S-1-5-21-746137067-343818398-839522115-1155}
Privileges Contains the list of privileges. The purpose of this field is unknown. In most cases it is empty. InsertionString7 -
You must be logged in to comment