Active Directory Monitoring, Reporting & Auditing
Complete List of Windows Event IDs for Active Directory

Active Directory monitoring on Windows Domain Controllers involves tracking a wide range of events from the Security log (audit events such as logons and account management) and the Directory Service log (AD DS operational events like replication issues). Below, we provide tables of relevant Windows Event IDs, their provider/source, which Event Log they appear in, and a brief description of each event. These events can be forwarded from DCs and used to trigger alerts in the InfraSOS portal with our Active Directory Monitoring solution.

Security Log Events (Audit Events on Domain Controllers)

The Security log (Source Microsoft-Windows-Security-Auditing unless otherwise noted) records authentication attempts and AD changes when auditing is enabled. All events listed here are found in the Security event log on DCs, except where indicated. Each event’s description explains its significance for AD monitoring:

Event ID                               Provider Name                                                                                                                                                                                LogDescription
4608Microsoft-Windows-Security-AuditingSecurityWindows is starting up (system startup audit). Logged at boot on all systems (DCs, servers, workstations).
4609Microsoft-Windows-Security-AuditingSecurityWindows is shutting down (system shutdown audit). Logged when the OS is shutting down on DCs/servers/PCs.
4611Microsoft-Windows-Security-AuditingSecurityA trusted logon process was registered with the Local Security Authority (LSA). Indicates a logon process (e.g. Winlogon) was registered on the system.
4614Microsoft-Windows-Security-AuditingSecurityA notification package was loaded by the Security Account Manager (SAM). (Informational event about a SAM password filter/notification DLL being loaded into LSA).
4616Microsoft-Windows-Security-AuditingSecurityThe system time was changed on the computer. Monitors time changes, which can affect Kerberos and replication.
4622Microsoft-Windows-Security-AuditingSecurityA security package has been loaded by the LSA. Logged when an authentication package (e.g. Negotiate, Kerberos) is loaded on the system.
4624Microsoft-Windows-Security-AuditingSecurityAn account was successfully logged on. This is the successful logon event (credentials validated) on a DC or system. It includes logon type and account details.
4625Microsoft-Windows-Security-AuditingSecurityAn account failed to log on. This indicates a failed logon attempt (bad password or other logon failure) on a DC or computer. Includes failure reason codes.
4634Microsoft-Windows-Security-AuditingSecurityAn account was logged off. This event logs a user session logoff (and will have a corresponding Logon ID that logged off).
4647Microsoft-Windows-Security-AuditingSecurityUser-initiated logoff. This event is logged when a user actively logs off (initiates logoff) on a system.
4648Microsoft-Windows-Security-AuditingSecurityA logon was attempted using explicit credentials. This occurs when one process uses RunAs or similar to log on with another account’s credentials.
4672Microsoft-Windows-Security-AuditingSecuritySpecial privileges assigned to new logon. Logged whenever an account logs on with admin-equivalent rights (SeTCBPrivilege, etc.), indicating a privileged logon session.
4673Microsoft-Windows-Security-AuditingSecurityA privileged service was called. Indicates a process attempted to perform a privileged system operation (requiring advanced privileges).
4674Microsoft-Windows-Security-AuditingSecurityAn operation was attempted on a privileged object. This means a process tried to access an object in a way that requires higher privileges.
4688Microsoft-Windows-Security-AuditingSecurityA new process has been created. Logged when a process starts on the system. Monitoring this on DCs can detect unexpected software execution.
4689Microsoft-Windows-Security-AuditingSecurityA process has exited. Logged when a process terminates on the system. (Often paired with Event 4688 for process tracking.)
4697Microsoft-Windows-Security-AuditingSecurityA service was installed in the system. This means a new Windows service was added (which could indicate software installation or malware persistence).
4698Microsoft-Windows-Security-AuditingSecurityA scheduled task was created. Logged when a new scheduled task is created (via Task Scheduler) on the system.
4699Microsoft-Windows-Security-AuditingSecurityA scheduled task was deleted. Logged when a scheduled task is removed on the system.
4700Microsoft-Windows-Security-AuditingSecurityA scheduled task was enabled. Logged when a task’s status is set to enabled.
4701Microsoft-Windows-Security-AuditingSecurityA scheduled task was disabled. Logged when a scheduled task is disabled.
4702Microsoft-Windows-Security-AuditingSecurityA scheduled task was updated**.** Logged when an existing scheduled task is modified (properties change).
4704Microsoft-Windows-Security-AuditingSecurityA user right was assigned. This event logs when user privileges (user rights) are granted to an account (e.g. “Act as part of the OS”). Logged only on DCs for domain accounts.
4705Microsoft-Windows-Security-AuditingSecurityA user right was removed. Logged when a user privilege is revoked from an account (e.g. removal of a logon right).
4713Microsoft-Windows-Security-AuditingSecurityThe Kerberos policy was changed. Indicates changes to Kerberos settings (e.g. ticket lifetimes) in domain policy. Logged on DCs.
4714Microsoft-Windows-Security-AuditingSecurityThe EFS (Encrypted File System) data recovery policy was changed. Logged when the recovery agent policy for EFS is modified (via Group Policy or local security policy).
4717Microsoft-Windows-Security-AuditingSecuritySystem security access was granted to an account. A system-level access right (SeSecurityPrivilege, etc.) was granted to a user.
4718Microsoft-Windows-Security-AuditingSecuritySystem security access was removed from an account. A sensitive system privilege was removed from a user account.
4719Microsoft-Windows-Security-AuditingSecuritySystem audit policy was changed. This means the audit policy (what categories of events are audited) was modified on the system, which could affect security logging.
4720Microsoft-Windows-Security-AuditingSecurityA user account was created. Logged when a new AD user is created (on DCs for domain accounts).
4722Microsoft-Windows-Security-AuditingSecurityA user account was enabled. Logged when a disabled user or computer account is enabled. For users, appears on DCs (for domain accounts).
4723Microsoft-Windows-Security-AuditingSecurityAn attempt was made to change an account’s password. Logged when a user attempts to change their own password (password change initiated by the account owner).
4724Microsoft-Windows-Security-AuditingSecurityAn attempt was made to reset an account’s password. Logged when an administrator attempts to reset another user’s password.
4725Microsoft-Windows-Security-AuditingSecurityA user account was disabled. Logged when a user or computer account is disabled. (For a computer account, only logged on DCs).
4726Microsoft-Windows-Security-AuditingSecurityA user account was deleted. Logged when an AD user account is removed (on DCs for domain accounts).
4727Microsoft-Windows-Security-AuditingSecurityA security-enabled global group was created. A new global security group (domain scope) was created in AD (logged on DCs).
4728Microsoft-Windows-Security-AuditingSecurityA member was added to a security-enabled global group. Logged when a user/computer/group is added to a global security group such as ‘Domain Admins‘ (domain local groups use different IDs).
4729Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-enabled global group. Logged when an account is removed from a global security group (DC only).
4730Microsoft-Windows-Security-AuditingSecurityA security-enabled global group was deleted. Logged when a global security group is deleted in AD (DC only).
4731Microsoft-Windows-Security-AuditingSecurityA security-enabled local group was created. This means a new domain local security group was created (logged on DCs).
4732Microsoft-Windows-Security-AuditingSecurityA member was added to a security-enabled local group. Logged when an account is added to a domain local security group (DC only).
4733Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-enabled local group. An account was removed from a domain local security group (DC only).
4734Microsoft-Windows-Security-AuditingSecurityA security-enabled local group was deleted. Logged when a domain local security group is deleted (DC only).
4735Microsoft-Windows-Security-AuditingSecurityA security-enabled local group was changed. This event logs modifications to the properties (name, description, etc.) of a domain local security group (DC only).
4737Microsoft-Windows-Security-AuditingSecurityA security-enabled global group was changed. Logged when a global security group’s properties are modified (DC only).
4738Microsoft-Windows-Security-AuditingSecurityA user account was changed. Logged when an existing user account’s attributes are modified (on DC for domain user changes).
4739Microsoft-Windows-Security-AuditingSecurityDomain Policy was changed. Indicates a change to the Domain Policies (such as Password Policy or Kerberos Policy) in Active Directory.
4740Microsoft-Windows-Security-AuditingSecurityA user account was locked out. Logged when AD locks a user due to too many failed logon attempts (account lockout). Important for tracking potential brute-force attacks.
4741Microsoft-Windows-Security-AuditingSecurityA computer account was created. Logged when a new computer account (machine account) is created in the domain (e.g. when a server/workstation is joined to the domain).
4742Microsoft-Windows-Security-AuditingSecurityA computer account was changed. Logged when a computer account’s properties (e.g. name reset or other attributes) are modified in AD.
4743Microsoft-Windows-Security-AuditingSecurityA computer account was deleted. Logged when a computer account object is removed from AD.
4744Microsoft-Windows-Security-AuditingSecurityA security-disabled local group was created. Logged when a new distribution group with domain local scope is created (DC only). (Security-disabled groups are distribution lists not used for permissions.)
4745Microsoft-Windows-Security-AuditingSecurityA security-disabled local group was changed. Logged when a domain local distribution group is modified (DC only).
4746Microsoft-Windows-Security-AuditingSecurityA member was added to a security-disabled local group. Logged when an account is added to a domain local distribution group (DC only).
4747Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-disabled local group. Logged when an account is removed from a domain local distribution group (DC only).
4748Microsoft-Windows-Security-AuditingSecurityA security-disabled local group was deleted. Logged when a domain local distribution group is deleted (DC only).
4749Microsoft-Windows-Security-AuditingSecurityA security-disabled global group was created. Logged when a new global distribution group is created (DC only).
4750Microsoft-Windows-Security-AuditingSecurityA security-disabled global group was changed. Logged when a global distribution (security-disabled) group’s properties are changed (DC only).
4751Microsoft-Windows-Security-AuditingSecurityA member was added to a security-disabled global group. Logged when an account is added to a global distribution group (DC only).
4752Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-disabled global group. Logged when an account is removed from a global distribution group (DC only).
4753Microsoft-Windows-Security-AuditingSecurityA security-disabled global group was deleted. Logged when a global distribution group is deleted (DC only).
4754Microsoft-Windows-Security-AuditingSecurityA security-enabled universal group was created. Logged when a new universal security group is created (DC only).
4755Microsoft-Windows-Security-AuditingSecurityA security-enabled universal group was changed. Logged when a universal security group’s properties are modified (DC only).
4756Microsoft-Windows-Security-AuditingSecurityA member was added to a security-enabled universal group. Indicates an account was added to a universal security group (DC only).
4757Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-enabled universal group. An account was removed from a universal security group (DC only).
4758Microsoft-Windows-Security-AuditingSecurityA security-enabled universal group was deleted. Logged when a universal security group is deleted (DC only).
4759Microsoft-Windows-Security-AuditingSecurityA security-disabled universal group was created. Logged when a new universal distribution group is created (DC only).
4760Microsoft-Windows-Security-AuditingSecurityA security-disabled universal group was changed. Logged when a universal distribution group’s properties are changed (DC only).
4761Microsoft-Windows-Security-AuditingSecurityA member was added to a security-disabled universal group. An account was added to a universal distribution group (DC only).
4762Microsoft-Windows-Security-AuditingSecurityA member was removed from a security-disabled universal group. An account was removed from a universal distribution group (DC only).
4763Microsoft-Windows-Security-AuditingSecurityA security-disabled universal group was deleted. Logged when a universal distribution group is deleted (DC only).
4764Microsoft-Windows-Security-AuditingSecurityA group’s type was changed. Logged when an existing group’s type or scope is changed (e.g. converting a security group to distribution, or global to universal).
4765Microsoft-Windows-Security-AuditingSecuritySID History was added to an account. Logged when the SID History attribute is added to a user or group (typically during migrations). This could be a sign of privilege escalation if done unexpectedly.
4766Microsoft-Windows-Security-AuditingSecurityAn attempt to add SID History to an account failed. Logged when a SID History addition was attempted but did not succeed (possibly due to security settings).
4767Microsoft-Windows-Security-AuditingSecurityA user account was unlocked. Logged when an administrator unlocks a locked-out user account (or the account automatically unlocks after duration).
4768Microsoft-Windows-Security-AuditingSecurityA Kerberos authentication ticket-granting ticket (TGT) was requested. Logged on DCs every time a user tries to authenticate via Kerberos. A success indicates the DC issued a TGT (authentication succeeded). Failure will have an error code (pre-authentication failures generate event 4771).
4769Microsoft-Windows-Security-AuditingSecurityA Kerberos service ticket (TGS) was requested. Logged on DCs when a Kerberos ticket for a specific service/resource is requested. It indicates a user is attempting to access a service and a TGS ticket was issued (or attempted).
4770Microsoft-Windows-Security-AuditingSecurityA Kerberos service ticket was renewed. Logged when a TGS ticket is renewed by the user (reused without full re-authentication).
4771Microsoft-Windows-Security-AuditingSecurityKerberos pre-authentication failed. Logged on DCs when a Kerberos logon fails pre-auth (e.g., wrong password, expired password for a user). Contains error code specifying reason. This is a Kerberos login failure event.
4776Microsoft-Windows-Security-AuditingSecurityThe domain controller attempted to validate the credentials for an account (NTLM). This event is logged when a DC authenticates a user via NTLM instead of Kerberos (includes the account name and authentication result code). Both successful and failed NTLM authentications use event 4776 (with status codes).
4780Microsoft-Windows-Security-AuditingSecurityThe ACL was set on accounts which are members of administrators groups. This event indicates that the system applied AdminSDHolder protected permissions on administrative accounts (which happens periodically to secure admin accounts).
4781Microsoft-Windows-Security-AuditingSecurityThe name of an account was changed. Logged when the sAMAccountName (logon name) of a user or computer account is changed (on DCs for domain accounts).
4794Microsoft-Windows-Security-AuditingSecurityAn attempt was made to set the Directory Services Restore Mode (DSRM) administrator password. Logged when someone tries to set the DSRM local administrator password on a domain controller (which is a sensitive operation).
4897Microsoft-Windows-Security-AuditingSecurityRole separation was enabled. Indicates that AD DS “role separation” (delegating different admin roles) was enabled on a Certification Authority (CA) or another service. This is a high-security configuration event.
4964Microsoft-Windows-Security-AuditingSecuritySpecial groups have been assigned to a new logon. Logged when a user who is a member of certain “special groups” (configured in registry for auditing) logs on. It identifies if privileged group members log on.
4976Microsoft-Windows-Security-AuditingSecurityDuring DPI (Deep Packet Inspection), a packet was dropped because it failed an IPsec integrity check. (Example of an IPsec audit event; 4960-4976 series cover IPsec violations or policy changes).
4985Microsoft-Windows-Security-AuditingSecurityThe state of a transaction changed (Transactional NTFS). (This is a less common event related to file system transactions.)
5024Microsoft-Windows-Security-AuditingSecurityThe firewall service started successfully. (Beginning of a series of Windows Firewall audit events; these track changes or startup of the Windows Filtering Platform.)
5031Microsoft-Windows-Security-AuditingSecurityThe Windows Firewall service blocked an application. (Indicates a blocked connection by firewall rules.)
5038Microsoft-Windows-Security-AuditingSecurityCode integrity determined that an image (executable) hash is invalid and the file may have been tampered. This indicates potential malware (a system file failed signature check).
5140Microsoft-Windows-Security-AuditingSecurityA network share object was accessed. Logged when a network share (e.g. \server\share) is accessed; useful to monitor DC’s shared SYSVOL access.
5141Microsoft-Windows-Security-AuditingSecurityA directory service object was deleted. (Note: This is also listed under Directory Service Access category.) It means an AD object was deleted and was audited via DS Access auditing.

Directory Service Log Events (ActiveDirectory_DomainService)

Domain Controllers have an event log Directory Service (source Microsoft-Windows-ActiveDirectory_DomainService) which records AD-specific operational events. These are crucial for monitoring AD health, replication, and configuration.

Event ID                               Provider Name                                                                                                                                                                                                                                                                        LogDescription
1084Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe Active Directory Domain Services database has been restored/recovered (or an operation regarding the AD database such as defragmentation occurred). (This event indicates AD startup and recovery status.)
1311Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceReplication topology problem: The Knowledge Consistency Checker (KCC) has detected that the replication topology is incomplete or broken. This often means not all DCs/sites are connected or a DC is unreachable, causing replication failures across sites.
1388Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceA lingering object was introduced via replication. This indicates a destination DC (with loose replication consistency) accepted an object that had been deleted elsewhere (a lingering object). The object was re-created on the DC. This typically occurs if a DC was offline past tombstone lifetime and then replicates.
1864Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceNo recent replication (Time Skew): This DC has not received replication from a partner DC for an extended period. Event 1864 often indicates that a domain controller hasn’t replicated recently and may be out of sync (possible time mismatch or connectivity issue).
1925Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceReplication failed – partner unreachable: The DC could not contact a replication partner. This often means a DC attempted to replicate but the target could not be reached (due to network or DNS issues). (Event 1925 is logged with extended error info when a replication connection fails.)
1988Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceA lingering object was detected and replication was blocked. This occurs on a destination DC with strict replication consistency when a source DC has an object that this DC considers deleted – replication is halted to prevent reintroducing a lingering object. Admin action is needed to remove lingering objects.
2042Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceTombstone lifetime exceeded – replication stopped: It has been too long since this machine replicated with a partner (longer than tombstone lifetime). AD replication is halted with that partner to prevent possible lingering objects. This often means one DC was offline for too long (e.g. >60 or 180 days). User action: decommission or force sync with lingering object removal if necessary.
2087Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceDNS lookup failure for replication: The DC could not resolve the DNS host name of its replication partner. This prevents AD changes from replicating between certain DCs. Until resolved, you may have inconsistent AD data. (Event 2087 is logged when all DNS lookup attempts to locate the partner fail).
2088Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceReplication failed after DNS found partner: Logged if the partner was found (DNS resolved) but replication still fails (e.g. RPC issue or partial connectivity). Often paired with 2087 – 2088 indicates the partner was contacted but replication attempt failed after initial contact. This usually signals communication or authentication issues between DCs.
2089Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceAD Database Backup Alert: The directory partition has not been backed up within the backup latency interval. Event 2089 is a warning that you haven’t taken an AD backup for a while (half of tombstone lifetime). It lists partitions and the days since last backup. Ensuring regular system state backups will prevent this warning.
2091Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceA partial replication topology was created. (Indicates the KCC could only partially build connections, often due to incomplete site link configuration.)
2102Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceDatabase inconsistency / patch: The AD database might have been modified or an attempt to change it failed. (Often related to AD database recovery events.)
2886Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceInsecure LDAP binds allowed: This DC is configured to not require LDAP signing or sealing. It’s a periodic reminder (logged every 24 hours) that “LDAP signing is not being enforced,” which is a security vulnerability. In other words, Event 2886 means the domain controller permits unsigned LDAP bind requests. Administrators should consider enabling LDAP signing requirements.
2887Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceCount of unsigned LDAP binds: Logged every 24 hours on DCs that allow unsigned binds and have had at least one such bind in the last day. The event indicates how many plaintext or unsigned LDAP binds occurred (so you can identify legacy applications using insecure binds). If this event appears, it provides the number of insecure bind attempts.
2888Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceRejected unsigned LDAP bind (enforcement mode): Logged every 24 hours if the DC is set to require signing and it rejected at least one unsigned bind request. This means the DC refused an insecure LDAP connection from a client.
2889Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceClient attempted unsigned LDAP (detailed): Logged when a client binds without signing on port 389 and Logging Level 2 is enabled. It provides details on the client that attempted the insecure bind (for troubleshooting which client is using insecure LDAP).
2920Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe internal snapshot of the Active Directory database has completed. (Can be logged during certain operations like AD diagnostic or backup tasks.)
2923Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceGlobal Catalog promotion complete. (Logged when a DC has finished being promoted to a Global Catalog server.)
2924Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceGlobal Catalog demotion complete. (Logged when a DC is unflagged as a Global Catalog server.)
2944Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe Active Directory Web Services service started successfully. (Indicates that the AD Web Services (ADWS) on the DC is running, which is required for PowerShell ActiveDirectory module and AD Administrative Center.)
2945Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceActive Directory Web Services encountered an error and could not start. (If ADWS fails, features that rely on it will not function – this event gives error details.)
3039Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceLDAP Channel Binding failure: A client’s LDAP over SSL/TLS connection failed channel binding token (CBT) validation. This is logged when CBT is required/supported and a client either doesn’t send it or sends an invalid token. It helps identify clients not compliant with LDAP channel binding.
3040Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceLDAP bind with channel binding not required. (Part of channel binding events; may indicate a client connected without CBT when policy is set to “When Supported.”)
3041Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceLDAP channel binding not configured. (This might log if no channel binding is attempted and policy is none – essentially indicating default behavior. Often not seen unless auditing at higher levels.)
3686Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe DC’s replication queue is overloaded. (For example, this event can indicate that a large number of updates are queued for replication – sometimes logged as a warning if the queue length exceeds a threshold.)
3687Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceA peak in replication latency was observed. (Used to notify if replication is taking unusually long.)
4033Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThis domain controller has been denied replication due to an Outdated OS version. (For example, if an OS version compatibility issue arises in the domain/forest functional level.)
5005Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe Active Directory Domain Services is shutting down. Logged during normal shutdown of AD DS service (for example, when a DC is shutting down or demoted).
5008Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe Active Directory Domain Services has been restored from backup. (Indicates an AD restore operation was detected, which could lead to USN rollback if not done properly.)
5120Microsoft-Windows-ActiveDirectory_DomainServiceDirectory ServiceThe directory services restore mode password was set. (This might be logged when the DSRM administrator password is configured/reset on a DC outside of normal install.)
5136Microsoft-Windows-Security-AuditingSecurity (Directory Service Access)A directory service object was modified. This is audited when an AD object’s attributes are changed (and auditing for DS Access is enabled on that object). It provides the object, attributes changed, and the user who made the change. (This security event is generated under category “Directory Service Access.”)
5137Microsoft-Windows-Security-AuditingSecurity (Directory Service Access)A directory service object was created. Audited when a new AD object (user, group, OU, etc.) is created and the SACL on the parent OU/domain is configured to audit creates. Contains the object name that was created.
5138Microsoft-Windows-Security-AuditingSecurity (Directory Service Access)A directory service object was undeleted. Logged when an AD object is restored from tombstone (recycled) if auditing is enabled. (For example, an object reanimated or restored from AD Recycle Bin).
5139Microsoft-Windows-Security-AuditingSecurity (Directory Service Access)A directory service object was moved. Logged when an object is moved from one OU/container to another (with DS Access auditing on the object’s containers). It includes the old and new locations.
5141Microsoft-Windows-Security-AuditingSecurity (Directory Service Access)A directory service object was deleted. Audited when an AD object is deleted and the object’s SACL requests audit of deletions. (Often accompanies the Directory Service event 2089 if object is tombstoned for a while.)

DNS Server Log Events

If your DCs also run DNS, the DNS Server log is crucial for tracking name resolution issues, zone transfers, and integration with AD.

Event ID               Provider                                                                                                       LogDescription
4000Microsoft-Windows-DNSServerDNS ServerDNS Server started successfully.
4001Microsoft-Windows-DNSServerDNS ServerDNS Server shutting down.
4010Microsoft-Windows-DNSServerDNS ServerThe DNS server was unable to create a resource record. Often indicates a misconfigured dynamic registration or stale DNS zone data.
4013Microsoft-Windows-DNSServerDNS ServerDNS server is waiting for Active Directory Domain Services (AD DS) to signal readiness. Common during DC reboot — if persistent, it indicates issues with AD replication or DNS integration.
4015Microsoft-Windows-DNSServerDNS ServerDNS server encountered a critical error from Active Directory. Often caused by AD replication or database corruption.
4521Microsoft-Windows-DNSServerDNS ServerDNS server detected that it is not enlisted in the replication scope of the AD-integrated zone. Typically indicates misconfigured DNS replication.
6001Microsoft-Windows-DNSServerDNS ServerDNS zone transfer failed. Often due to replication or trust relationship issues between DNS servers.
6702Microsoft-Windows-DNSServerDNS ServerDNS server has updated its Active Directory infrastructure. Often seen during reboot or after changes to the DNS zone configuration.
7504Microsoft-Windows-DNSServerDNS ServerThe DNS server has encountered a critical error while attempting to load, initialize, or create the zone. Could be corrupted zone files.

Netlogon Service Events

To provide a comprehensive view of DC health, consider monitoring these additional logs and categories:

  • Log: System

  • Provider: NETLOGON

  • Important for authentication and trust issues.

Event IDProvider NameLogDescription
5719NETLOGONSystemNo domain controller available — client unable to contact DC.
5781NETLOGONSystemDynamic DNS update failed — Netlogon failed to register DC in DNS.

Time Synchronization (W32Time):

Ensures Kerberos time sync (crucial for trust and logon)

Event IDProvider NameLogDescription
36Microsoft-Windows-Time-ServiceSystemTime service synchronized with a time source.
47Microsoft-Windows-Time-ServiceSystemTime service failed to synchronize.
50Microsoft-Windows-Time-ServiceSystemTime service detected a change and resync.
134Microsoft-Windows-Time-ServiceSystemTime service has detected a large time jump.

System-Level Errors:

Track disk, service startup failures, memory issues.

Event IDProvider NameLogDescription
55Microsoft-Windows-NtfsSystemFile system corruption detected.
1001BugCheckSystemServer crash (BSOD) occurred.
7001Service Control ManagerSystemNetlogon or DNS service failed to start.

NTDS Diagnostics

Very detailed — often used by enterprise environments for diagnosing deep replication issues.

Event IDProvider NameLogDescription
2089Microsoft-Windows-ActiveDirectory_DomainServiceNTDS ReplicationAD database has not been backed up within tombstone lifetime.
2108Microsoft-Windows-ActiveDirectory_DomainServiceNTDS ReplicationInternal consistency check failed during replication.

In summary, the above tables enumerate the key Windows Event IDs relevant to Active Directory monitoring. By forwarding these events from Domain Controller logs (Security and Directory Service logs) into InfraSOS, administrators can set up alerts for important conditions – such as account lockouts, group membership changes, replication failures, and other signs of potential issues or attacks in the AD environment. This comprehensive monitoring covers both security-related events (audit logs) and operational AD health events, providing a broad view of AD status and security.

Picture of Andrew Fitzgerald

Andrew Fitzgerald

Cloud Solution Architect. Helping customers transform their IT Infrastructure, Cloud deployments and Security. 20 years experience working in complex infrastructure environments and a Microsoft Certified Solutions Expert on everything Cloud and Active Directory.