Home > Event Id > Windows Event 4634

Windows Event 4634


Logon type 9:  NewCredentials. Event 4905 S: An attempt was made to unregister a security event source. Event 4952 F: Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. Event 6409: BranchCache: A service connection point object could not be parsed. have a peek here

read more... Event 6402: BranchCache: The message to the hosted cache offering it data is incorrectly formatted. Event 6145 F: One or more errors occurred while processing security policy in the group policy objects. Event 4934 S: Attributes of an Active Directory object were replicated. https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4624

Windows Event 4634

Workstation Name: the computer name of the computer where the user is physically present in most cases unless this logon was intitiated by a server application acting on behalf of the Event 4908 S: Special Groups Logon table modified. The network information field is blank could be caused by that Kerberos protocol doesn’t need the workstation information during the network access process.

Here are some related links below I suggest you refer to: Lots of "Special Logon" events for computer account? Event 4701 S: A scheduled task was disabled. Audit Filtering Platform Policy Change Audit MPSSVC Rule-Level Policy Change Event 4944 S: The following policy was active when the Windows Firewall started. Event Id 528 This is one of the trusted logon processes identified by 4611.

The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. Windows Event Id 4625 Event 4913 S: Central Access Policy on the object was changed. Event 4985 S: The state of a transaction has changed. Event 4698 S: A scheduled task was created.

Failed logons with logon type 7 indicate either a user entering the wrong password or a malicious user trying to unlock the computer by guessing the password. Logoff Event Id This topic at the Microsoft site is about logon events auditing for pre-Vista operating systems, but it looks like Logon Type constants are valid for all Windows operating systems. This will run Event Log Explorer even if you provided a wrong password. English: Request a translation of the event description in plain English.

Windows Event Id 4625

The domain controller was not contacted to verify the credentials. Look at these 3 events below, I know for sure that I was not logged on to the Hyper-V server at that time, yet it has timestamps with my user ID Windows Event 4634 Logon Type 2: Interactive. A user logged on to this computer. Windows 7 Logon Event Id Set the Startup Type to Automatic. 7.

Using the retrieved client-security information, the server can make access-validation decisions without being able to use other services that are using the client's security context.SecurityImpersonation (displayed as "Impersonation"): The server process navigate here The credentials do not traverse the network in plaintext (also called cleartext). Event 4767 S: A user account was unlocked. Event 4661 S, F: A handle to an object was requested. Event Id 4648

Audit Kerberos Authentication Service Event 4768 S, F: A Kerberos authentication ticket, TGT, was requested. About Advertising Privacy Terms Help Sitemap × Join millions of IT pros like you Log in to Spiceworks Reset community password Agree to Terms of Service Connect with Or Sign up Search for Windows Error Reporting Service in the list. 4. Check This Out Windows server doesn’t allow connection to shared file or printers with clear text authentication.The only situation I’m aware of are logons from within an ASP script using the ADVAPI or when

Event 5068 S, F: A cryptographic function provider operation was attempted. Event Id 4672 Microsoft provides more detailed description of logon types at https://technet.microsoft.com/en-us/library/cc787567(v=ws.10).aspx (Audit Logon Events). Event Log Explorer will try to open resource file with event descriptions.

The subject fields indicate the account on the local system which requested the logon.

Logon type 10: RemoteInteractive. scheduled task) 5 Service (Service startup) 7 Unlock (i.e. If this logon is initiated locally the IP address will sometimes be instead of the local computer's actual IP address. Windows Event Id 4776 Event 4648 S: A logon was attempted using explicit credentials.

TECHNOLOGY IN THIS DISCUSSION Join the Community! This is the most common type.SecurityDelegation (displayed as "Delegation"): The server process can impersonate the client's security context on remote systems.New Logon:Security ID [Type = SID]: SID of account for which Event 4794 S, F: An attempt was made to set the Directory Services Restore Mode administrator password. this contact form Audit DPAPI Activity Event 4692 S, F: Backup of data protection master key was attempted.

Audit System Integrity Event 4612 S: Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. Audit IPsec Extended Mode Audit IPsec Main Mode Audit IPsec Quick Mode Audit Logoff Event 4634 S: An account was logged off.