Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Account Management->Computer Account Management->EventID 4741 - A computer account was created.
EventID 4741 - A computer account was created.
Indicates a successful creation of a "New Computer Account" by "Subject" user.

Find more information about this event on ultimatewindowssecurity.com.

Corresponding events on other OS versions:

Windows 2000
Windows 2003
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/28/2009 8:29:33 PM
Event ID:      4741
Task Category: Computer Account Management
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      dcc1.Logistics.corp
Description:   
A computer account was created.
Subject:
	Security ID:		S-1-5-21-1135140816-2109348461-2107143693-500
	Account Name:		ALebovsky
	Account Domain:		LOGISTICS
	Logon ID:		0x2a88a
New Computer Account:
	Security ID:		S-1-5-21-1135140816-2109348461-2107143693-1147
	Account Name:		Editor$
	Account Domain:		LOGISTICS
Attributes:
	SAM Account Name:	Editor$
	Display Name:		-
	User Principal Name:	-
	Home Directory:		-
	Home Drive:		-
	Script Path:		-
	Profile Path:		-
	User Workstations:	-
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	515
	AllowedToDelegateTo:	-
	Old UAC Value:		0x0
	New UAC Value:		0x80
	User Account Control:	
		'Workstation Trust Account' - Enabled
	User Parameters:	-
	SID History:		-
	Logon Hours:		<value not set>
	DNS Host Name:		-
	Service Principal Names:	-
Additional Information:
	Privileges		-
===========================
Description template stored in adtschema.dll:
===========================
A computer account was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Computer Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	Display Name:		%10
	User Principal Name:	%11
	Home Directory:		%12
	Home Drive:		%13
	Script Path:		%14
	Profile Path:		%15
	User Workstations:	%16
	Password Last Set:	%17
	Account Expires:		%18
	Primary Group ID:	%19
	AllowedToDelegateTo:	%20
	Old UAC Value:		%21
	New UAC Value:		%22
	User Account Control:	%23
	User Parameters:	%24
	SID History:		%25
	Logon Hours:		%26
	DNS Host Name:		%27
	Service Principal Names:	%28

Additional Information:
	Privileges		%8
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Account Management
Source Microsoft-Windows-Security-Auditing
TaskCategory Computer Account Management
EventId 4741
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom -
Object Type -
Class Name -
Security ID -
Account Name -
Account Domain -
Subject: Account Name Name of the account that initiated the action. InsertionString5 ALebovsky
Subject: Account Domain Name of the domain that account initiating the action belongs to. InsertionString6 LOGISTICS
Subject: Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. InsertionString7 0x2a88a
Subject: Security ID Security ID of the account that performed the action. Usually resolved to Domain\Name in home environment. InsertionString4 S-1-5-21-1135140816-2109348461-2107143693-500
New Computer Account: Security ID InsertionString3 S-1-5-21-1135140816-2109348461-2107143693-1147
New Computer Account: Account Name InsertionString1 Editor$
New Computer Account: Account Domain InsertionString2 LOGISTICS
Attributes: SAM Account Name InsertionString9 Editor$
Attributes: Display Name InsertionString10 -
Attributes: User Principal Name InsertionString11 -
Attributes: Home Directory InsertionString12 -
Attributes: Home Drive InsertionString13 -
Attributes: Script Path InsertionString14 -
Attributes: Profile Path InsertionString15 -
Attributes: User Workstations InsertionString16 -
Attributes: Password Last Set InsertionString17 <never>
Attributes: Account Expires InsertionString18 <never>
Attributes: Primary Group ID InsertionString19 515
Attributes: AllowedToDelegateTo InsertionString20 -
Attributes: Old UAC Value InsertionString21 0x0
Attributes: New UAC Value InsertionString22 0x80
Attributes: User Account Control InsertionString23
Attributes: User Parameters InsertionString24 -
Attributes: SID History InsertionString25 -
Attributes: Logon Hours InsertionString26 <value not set>
Attributes: DNS Host Name InsertionString27 -
Attributes: Service Principal Names InsertionString28 -
Comments
You must be logged in to comment