Event Details
User Activity->Logons->Successful Logons->Windows 2008->EventID 4627 - Group membership information.
EventID 4627 - Group membership information.
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/16/2016 4:12:03 PM
Event ID:      4627
Task Category: Group Membership
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      IIZHU2016.itss.wm.zhu.cn.qsft
Description:
Group membership information.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:			3

New Logon:
	Security ID:		SYSTEM
	Account Name:		IIZHU2016$
	Account Domain:		ITSS.WM.ZHU.CN.QSFT
	Logon ID:		0x1AF7F3ED

Event in sequence:		1 of 1

Group Membership:			
		BUILTIN\Administrators
		Everyone
		BUILTIN\Users
		BUILTIN\Pre-Windows 2000 Compatible Access
		BUILTIN\Windows Authorization Access Group
		NT AUTHORITY\NETWORK
		NT AUTHORITY\Authenticated Users
		NT AUTHORITY\This Organization
		ITSS\IIZHU2016$
		ITSS\Domain Controllers
		NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
		Authentication authority asserted identity
		ITSS\Denied RODC Password Replication Group
		Mandatory Label\System Mandatory Level

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

This event is generated when the Audit Group Membership subcategory is configured.  The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Logon/Logoff
Source Microsoft-Windows-Security-Auditing
TaskCategory Group Membership
EventId 4627
Field Matching
FieldDescriptionStored inSample Value
When At what date and time a user activity originated in the system. DateTime 10.10.2000 19:00:00
Who Account or user name under which the activity occured. New Logon: Account Name IIZHU2016$
What The type of activity occurred (e.g. Logon, Password Changed, etc.) "Logon" Logon
Where The name of the workstation/server where the activity was logged. Computer DC1
Where From The name of the workstation/server where the activity was initiated from. - 10.10.10.10
Severity Specify the seriousness of the event. "Medium" Medium
WhoDomain New Logon: Account Domain ITSS.WM.ZHU.CN.QSFT
WhereDomain -
Result Successful or Failed. "Successful" Successful
Failure Reason "Successful" Successful
Whom InsertionString6 IIZHU2016$
Comments
You must be logged in to comment