Windows Security Log Event ID 4707
Operating Systems |
Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Windows Server 2019 and 2022
|
Category • Subcategory | Policy Change • Authentication Policy Change |
Type
|
Success
|
Corresponding events
in Windows
2003 and before |
611
|
4707: A trust to a domain was removed
On this page
This event is logged for all deleted trust relationships that connected to this domain. While the description says "Trusted" this event applies to both trusted and trusting relationships as documented by Trust Information:.
Subject:
The ID and logon session of the user that excercised deleted the trust.
- Security ID: The SID of the account.
- Account Name: The account logon name.
- Account Domain: The domain or - in the case of local accounts - computer name.
- Logon ID is a semi-unique (unique between reboots) number that identifies the logon session. Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session.
Free Security Log Resources by Randy
Domain Information:
The other domain in this trust relationship.
- Domain Name: Usually the DNS name of the domain unless but in the case of "External" domains same as Domain ID
- Domain ID: the pre-Win2k (NetBIOS) name of the domain
Supercharger Free Edition
Your entire Windows Event Collection environment on a single pane of glass.
Free.
Example of an external trust being deleted
A trust to a domain was removed.
Subject:
Security ID: ACME-FR\administrator
Account Name: administrator
Account Domain: ACME-FR
Logon ID: 0x20f9d
Domain Information:
Domain Name: MTG
Domain ID: MTG\
Example of a forest trust being removed
A trust to a domain was removed.
Subject:
Security ID: ACME-FR\administrator
Account Name: administrator
Account Domain: ACME-FR
Logon ID: 0x20f9d
Domain Information:
Domain Name: MTG
Domain ID: MTG\
Top 10 Windows Security Events to Monitor
Free Tool for Windows Event Collection