Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2000-2003->Security Log->Account Management->EventID 684 - Set ACLs of members in administrators groups [Win 2003]
EventID 684 - Set ACLs of members in administrators groups [Win 2003]
According to Microsoft: "Set the security descriptor of members of administrative groups." Every 60 minutes on a domain controller a background thread searches all members of administrative groups (such as domain, enterprise, and schema administrators) and applies a fixed security descriptor on them. This event is logged.

More information about this event can be found in this Microsoft Support KB article.

Note:
This event is not logged on Windows 2000 systems.

Find more information about this event on ultimatewindowssecurity.com.


Corresponding events on other OS versions:
Windows 2008
 Sample:
        Event Type:	Success Audit
        Event Source:	Security
        Event Category:	Account Management
        Event ID:	684
        Date:		05/05/2009
        Time:		07:57:55
        User:		NT AUTHORITY\ANONYMOUS LOGON
        Computer:	DC1
        Description:
        Set ACLs of members in administrators groups:
        Target Account Name:	Paul
        Target Domain:	DC=research,DC=corp
        Target Account ID:	RESEARCH\Paul
        Caller User Name:	DC1$
        Caller Domain:	RESEARCH
        Caller Logon ID:	(0x0,0x3E7)
        Privileges:	-
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows 2003
Category Account Management
Source Security
EventId 684
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Category A name for a subclass of events within the same Event Source. Category Logon/Logoff
Caller User Name Account initiating action InsertionString4 Alebovsky
Caller Domain Domain of the account initiating action InsertionString5 RESEARCH
Caller Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. InsertionString6 (0x0,0x59DF36)
Target Account Name Name of the account on which the action is performed InsertionString1 Paul
Target Domain Domain name of the Target Account InsertionString2 DC=research,DC=corp
Target Account ID Target Account Name in the following format: Target Domain\Target Account Name InsertionString3 RESEARCH\Paul
Privileges Contains the list of privileges. The purpose of this field is unknown. In most cases it is empty. InsertionString7 -
Comments
You must be logged in to comment