Windows Security Log Event ID 4798
4798: A user's local group membership was enumerated.
On this page
Windows logs this event when a process enumerates the local groups to which a the specified user belongs on that computer.
In the example below RandyFranklinSmith (an Azure AD account) used Computer Management (mmc.exe) to open the local user Administrator and click on his Member of Tab. That triggered the event. But the same event is logged by other methods such as the "net user" command.
This event is valuable for catching so-called APT actors who are scoping out the local accounts on a system they have compromised so that they extend their horizontal kill chain. Of course false positives are possible. Pay attention to the Subject, quantity of events and type of system where logged.
This event has not yet been tested on a domain controller or on a domain joined PC and specifying a domain user instead of a local user. But MS says "This event doesn't generate when group members were enumerated using Active Directory Users and Computers snap-in."
Free Security Log Resources by Randy
Subject:
This is who performed the enumeration.
- Security ID
- Account Name
- Account Domain
- Logon ID as logged in 4624
User:
This is who's group membership was enumerated.
- Security ID
- Account Name
- Account Domain
Process Information:
- Process ID is the process ID specified when the executable started as logged in 4688.
- Process Name: identifies the program executable that performed the enumeration.
Supercharger Free Edition
Centrally manage WEC subscriptions.
Free.
A user's local group membership was enumerated.
Subject:
Security ID: AzureAD\RandyFranklinSmith
Account Name: RandyFranklinSmith
Account Domain: AzureAD
Logon ID: 0x7A1EA
User:
Security ID: DESKTOP-TMO9MI9\Administrator
Account Name: Administrator
Account Domain: DESKTOP-TMO9MI9
Process Information:
Process ID: 0x106c
Process Name: C:\Windows\System32\mmc.exe
Top 10 Windows Security Events to Monitor
Free Tool for Windows Event Collection