Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Account Management->User Account Management->EventID 4830 - SID History was removed from an account.
EventID 4830 - SID History was removed from an account.

Find more information about this event on 
ultimatewindowssecurity.com.

Set-ADUser UserName -remove @{sidhistory="S-1-5-21-xxxxxxxxx-xxxxxxxxx-xxxxxxxxxx-xxxx"}
 Sample:
SID History was removed from an account.

Subject:
	Security ID:		ITSS\igor.ilyin
	Account Name:		igor.ilyin
	Account Domain:		ITSS
	Logon ID:		0x6BD4B1CB

Target Account:
	Security ID:		ITSS\AlanBell
	Account Name:		AlanBell
	Account Domain:		ITSS

Additional Information:
	Privileges:		-
	SID List:			-
===========================
Description template stored in adtschema.dll:
===========================
SID History was removed from an account.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Target Account:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Additional Information:
	Privileges:		%10
	SID List:			%11
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Account Management
Source Microsoft-Windows-Security-Auditing
TaskCategory User Account Management
EventId 4830
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom InsertionString5
Object Type "SID History" SID History
Class Name "SID History" SID History
Security ID -
Account Name -
Account Domain -
Subject: Account Name Name of the account that initiated the action. InsertionString7 igor.ilyin
Subject: Account Domain Name of the domain that account initiating the action belongs to. InsertionString8 ITSS
Subject: Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. InsertionString9 0x6BD4B1CB
Subject: Security ID InsertionString6 ITSS\igor.ilyin
Target Account: Security ID InsertionString5 ITSS\AlanBell
Target Account: Account Name InsertionString3 AlanBell
Target Account: Account Domain InsertionString4 ITSS
Additional Information: Privileges InsertionString10 -
Additional Information: SID List InsertionString11 -
Comments
You must be logged in to comment