Computer Account Created

Operating SystemsWindows Server 2000
Windows 2003 and XP

CategoryAccount Management
Type Success


Corresponding events
in Windows 2008
and Vista 4741

“Caller” user created a new computer account. Note that internally Windows appends a $ to all computer account names and this is reflected in other events where computer account names are listed.

Computer Account Created:
New Account Name:COMP1$
New Domain:ELMW2
New Account ID:comp1
Caller User Name:Administrator
Caller Domain:ELMW2
Caller Logon ID:(0x0,0x12D622)
Windows Server 2003 adds these fields
Sam Account Name:FILESERVER12$
Display Name:-
User Principal Name:-
Home Directory:-
Home Drive:-
Script Path:-
Profile Path:-
User Workstations:-
Password Last Set:

See Also: An application client context was deleted

Are you fascinated in stepping into personal computer stability work opportunities? If that's the case then here you'll find out all the things you need to know with regard to the career description and everything you may possibly find yourself accomplishing in addition since the skills required. What does Laptop Stability Require?

Computer safety is a department of data technology that relates specially to actions taken to safeguard the information on pcs from getting corrupted or misused. Personal computer protection arrives inside a myriad of various kinds relying on what level of safety is needed.

It can be incredibly essential for men and women making use of pcs to guard their personal computer from info loss, misuse, and abuse. By way of example, it is actually very important for companies to keep details they have safe to ensure that hackers can not obtain the knowledge. Home consumers also require to get usually means to make certain that their credit card figures are safe when they're collaborating in online transactions. Read about the threats and how to protect against them right here.

Phyllis Buckles
I'm an Information Security Engineers, also called Information Security Analysts, help to safeguard organization's computer networks and systems. Planning and carrying out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.