Hi,
Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. For more information about SIDs, please see Security identifiers.
I noticed that you are using Graylog. It’s recommended to check event viewer logs.
- Open Event Viewer
- Go to Windows Logs-->System
- Click on Filter Current Log
- Check all Event level options and replace <All EventIDs> with 4733.
- Click on OK
If you see same results like what you saw in Graylog, we could continue.
Remember that there are some situations that Some SIDs do not resolve into friendly names. You can follow the link to check that whether the SID is a capability SID. If it’s a capability SID, you can let it go and it’s not a risk.
But if it’s not a capability SID, you can use PsGetSid to resolve the SID to a user name. But this tool may doesn’t run on your PC because of compatibility issue. You can try find user name from a SID.
As to the reason why this issue appears, sorry that we do not support root cause analysis. But you can call Global Customer Service for help or go to Support for business.
Please note: Information posted in the given link is hosted by a third party. Microsoft does not guarantee the accuracy and effectiveness of information.
----------
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.
HI, I was able to figure out the SID and the associated AD Group using our IT-inventarisation Tool (called Docusnap). It supports an AD Scan option, there are all SID listened and I got lucky and found the SID of the Member.
Have you tried to check all AD Group SIDs?