Windows Logon

Overview#

Windows Logon is when an entity is involved Authentication or Impersonation event on Microsoft Windows (either Windows Client or Windows Server)This event is generated when a Windows Logon session is created. It is generated on the Hostname that was accessed.

The subject fields indicate the Digital Identity on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the Windows Logon Type that occurred. The most common types are 2 (Interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.!! Fields for Windows Logon Event 4624 and Event 4625 are the Events recorded as a Windows Security Log Event (Microsoft Windows Logging) for Windows Logon The fields below are within the event The user who just logged on is identified by the Account Name and Account Domain. You can determine whether the Digital Identity is local or domain by comparing the Account Domain to the computer name. If they match, the Digital Identity is a local Digital Identity on that system, otherwise a AD DOMAIN account.

Windows Client Authentication Architecture#

Windows Client Authentication Architecture describes the components in involved with Windows Logon!! More Information There might be more information for this subject on one of the following: