Windows Event ID 4624 - Successful Logon
Records successful authentication events to Windows systems, including the logon type, authentication package, source IP, and elevated privileges. Essential for tracking user access, detecting lateral movement, and identifying anomalous authentication patterns
Quick Facts
N/A (Windows Event Forwarding to SIEM)Log Example
Default format: Windows Event Log Format
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 1/3/2026 10:15:32 AM
Event ID: 4624
Task Category: Logon
Level: Information
Keywords: Audit Success
User: N/A
Computer: DC01.corp.local
Description:
An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: DC01$
Account Domain: CORP
Logon ID: 0x3E7
Logon Information:
Logon Type: 3
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-21-1234567890-1234567890-1234567890-1001
Account Name: jsmith
Account Domain: CORP
Logon ID: 0x12345678
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: CLIENT01
Source Network Address: 192.168.1.100
Source Port: 49152
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V2
Key Length: 128Structure:
XML-based binary format with structured EventData fieldsPaths by Platform
Available Formats
Windows Event Log Format
Example:
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 1/3/2026 10:15:32 AM
Event ID: 4624
Task Category: Logon
Level: Information
Keywords: Audit Success
User: N/A
Computer: DC01.corp.local
Description:
An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: DC01$
Account Domain: CORP
Logon ID: 0x3E7
Logon Information:
Logon Type: 3
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-21-1234567890-1234567890-1234567890-1001
Account Name: jsmith
Account Domain: CORP
Logon ID: 0x12345678
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: CLIENT01
Source Network Address: 192.168.1.100
Source Port: 49152
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V2
Key Length: 128Structure:
XML-based binary format with structured EventData fieldsXML Format
Example:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}"/>
<EventID>4624</EventID>
<Version>2</Version>
<Level>0</Level>
<Task>12544</Task>
<Opcode>0</Opcode>
<Keywords>0x8020000000000000</Keywords>
<TimeCreated SystemTime="2026-01-03T10:15:32.123456789Z"/>
<EventRecordID>123456</EventRecordID>
<Computer>DC01.corp.local</Computer>
</System>
<EventData>
<Data Name="SubjectUserSid">S-1-5-18</Data>
<Data Name="SubjectUserName">DC01$</Data>
<Data Name="SubjectDomainName">CORP</Data>
<Data Name="SubjectLogonId">0x3e7</Data>
<Data Name="TargetUserSid">S-1-5-21-1234567890-1234567890-1234567890-1001</Data>
<Data Name="TargetUserName">jsmith</Data>
<Data Name="TargetDomainName">CORP</Data>
<Data Name="TargetLogonId">0x12345678</Data>
<Data Name="LogonType">3</Data>
<Data Name="LogonProcessName">NtLmSsp</Data>
<Data Name="AuthenticationPackageName">NTLM</Data>
<Data Name="WorkstationName">CLIENT01</Data>
<Data Name="LogonGuid">{00000000-0000-0000-0000-000000000000}</Data>
<Data Name="TransmittedServices">-</Data>
<Data Name="LmPackageName">NTLM V2</Data>
<Data Name="KeyLength">128</Data>
<Data Name="ProcessId">0x0</Data>
<Data Name="ProcessName">-</Data>
<Data Name="IpAddress">192.168.1.100</Data>
<Data Name="IpPort">49152</Data>
<Data Name="ImpersonationLevel">%%1833</Data>
<Data Name="ElevatedToken">%%1842</Data>
<Data Name="VirtualAccount">%%1843</Data>
</EventData>
</Event>Structure:
Native XML representation of the eventJSON (Winlogbeat/NXLog)
Example:
{
"event_id": 4624,
"log_name": "Security",
"source_name": "Microsoft-Windows-Security-Auditing",
"computer_name": "DC01.corp.local",
"time_created": "2026-01-03T10:15:32.123Z",
"keywords": ["Audit Success"],
"event_data": {
"SubjectUserSid": "S-1-5-18",
"SubjectUserName": "DC01$",
"SubjectDomainName": "CORP",
"TargetUserSid": "S-1-5-21-1234567890-1234567890-1234567890-1001",
"TargetUserName": "jsmith",
"TargetDomainName": "CORP",
"TargetLogonId": "0x12345678",
"LogonType": "3",
"LogonProcessName": "NtLmSsp",
"AuthenticationPackageName": "NTLM",
"WorkstationName": "CLIENT01",
"IpAddress": "192.168.1.100",
"IpPort": "49152",
"LmPackageName": "NTLM V2",
"KeyLength": "128",
"ElevatedToken": "%%1842",
"ImpersonationLevel": "%%1833"
}
}Structure:
Structured JSON from log forwardersFields Reference
| Field | Type | Description | Example |
|---|---|---|---|
EventID | integer | Event identifier (always 4624 for successful logon) | 4624 |
TimeCreated | datetime | Timestamp when the successful logon occurred | 2026-01-03T10:15:32.123Z |
Computer | string | Computer name where the logon occurred | DC01.corp.local |
SubjectUserSid | string | SID of the account that initiated the logon (machine account for network logons) | S-1-5-18 |
SubjectUserName | string | Account name that initiated the logon process | DC01$ |
SubjectDomainName | string | Domain of the subject account | CORP |
SubjectLogonId | string | Logon ID of the subject session (for correlation) | 0x3E7 |
TargetUserSid | string | SID of the account that logged on | S-1-5-21-1234567890-1234567890-1234567890-1001 |
TargetUserName | string | Account name that logged on - the actual user identity | jsmith |
TargetDomainName | string | Domain of the account that logged on | CORP |
TargetLogonId | string | Logon ID for the new session - use for correlating with other events | 0x12345678 |
LogonType | integer | Type of logon that was performed | 3 |
LogonProcessName | string | Name of the trusted logon process | NtLmSsp |
AuthenticationPackageName | string | Authentication package used for the logon | NTLM |
WorkstationName | string | NetBIOS name of the source workstation | CLIENT01 |
LogonGuid | string | GUID for Kerberos logons - can correlate with DC events | {F85484B2-7F9D-1234-ABCD-0123456789AB} |
TransmittedServices | string | List of SPNs for S4U (Service for User) delegation | HTTP/webserver.corp.local |
LmPackageName | string | NTLM version used (only for NTLM authentication) | NTLM V2 |
KeyLength | integer | Length of the session key in bits (0 for Kerberos) | 128 |
IpAddress | ip | Source IP address of the logon (for network logons) | 192.168.1.100 |
IpPort | integer | Source port of the logon connection | 49152 |
ImpersonationLevel | string | Impersonation level of the new logon session | %%1833 |
ElevatedToken | string | Whether the logon created an elevated token (admin privileges) | %%1842 |
VirtualAccount | string | Whether a virtual account was used (managed service accounts) | %%1843 |
RestrictedAdminMode | string | Whether Restricted Admin mode was used (RDP without credential caching) | - |
ProcessId | string | Process ID that initiated the logon (hex) | 0x4 |
ProcessName | string | Full path of the process that initiated the logon | C:\Windows\System32\svchost.exe |
LinkedLogonId | string | Logon ID of linked logon session (for UAC split token) | 0x12345670 |
Parsing Patterns
Grok Patterns
xml:
<Data Name="TargetUserName">%{DATA:target_username}</Data>.*<Data Name="TargetDomainName">%{DATA:target_domain}</Data>.*<Data Name="TargetLogonId">%{DATA:logon_id}</Data>.*<Data Name="LogonType">%{INT:logon_type}</Data>.*<Data Name="IpAddress">%{IP:src_ip}</Data>Regular Expressions
xml:
TargetUserName">(?P<target_username>[^<]+)</Data>.*TargetDomainName">(?P<target_domain>[^<]+)</Data>.*TargetLogonId">(?P<logon_id>[^<]+)</Data>.*LogonType">(?P<logon_type>\d+)</Data>.*IpAddress">(?P<src_ip>[^<]+)</Data>Collector Configurations
1# Splunk search for Event ID 46242index=wineventlog EventCode=46243| stats count by TargetUserName, IpAddress, LogonType, AuthenticationPackageName4| sort -count56# Exclude noisy machine account logons7index=wineventlog EventCode=4624 NOT TargetUserName="*$"8| stats count by TargetUserName, Computer, LogonType910# RDP logons (LogonType 10)11index=wineventlog EventCode=4624 LogonType=1012| table _time, Computer, TargetUserName, IpAddress, AuthenticationPackageName1314# Detect pass-the-hash (NTLM network logon without prior interactive)15index=wineventlog EventCode=4624 LogonType=3 AuthenticationPackageName=NTLM16| search NOT [search index=wineventlog EventCode=4624 LogonType=2 | dedup TargetUserName | fields TargetUserName]17| stats count by TargetUserName, IpAddress, Computer1819# Logons with elevated tokens (admin sessions)20index=wineventlog EventCode=4624 ElevatedToken="%%1842"21| stats count by TargetUserName, Computer, LogonType2223# Track lateral movement (network logons from internal IPs)24index=wineventlog EventCode=4624 LogonType=325| where cidrmatch("10.0.0.0/8", IpAddress) OR cidrmatch("192.168.0.0/16", IpAddress)26| stats dc(Computer) as systems_accessed by TargetUserName, IpAddress27| where systems_accessed > 32829# props.conf for Windows Security Events30[WinEventLog:Security]31TIME_FORMAT = %Y-%m-%dT%H:%M:%S32TIME_PREFIX = TimeCreated SystemTime='33SHOULD_LINEMERGE = false34KV_MODE = xmlConfiguration
Enable Logging
Enable auditing for successful logon events via Group Policy or auditpol
# Enable via auditpol (run as Administrator)
auditpol /set /subcategory:"Logon" /success:enable
# Verify current settings
auditpol /get /subcategory:"Logon"
# Enable via Group Policy
# Computer Configuration > Windows Settings > Security Settings >
# Advanced Audit Policy Configuration > Logon/Logoff > Audit Logon
# Enable "Success"
# Note: Enabling success auditing can generate high volume of events
# Consider filtering at collection time for high-traffic systems
# Enable related subcategories for complete visibility
auditpol /set /subcategory:"Special Logon" /success:enable
auditpol /set /subcategory:"Other Logon/Logoff Events" /success:enable
auditpol /set /subcategory:"Network Policy Server" /success:enableSuccess logon auditing generates high volume - filter machine accounts and service logons at collection
Log To Syslog
Forward events to SIEM using Windows Event Forwarding or agents
# Windows Event Forwarding (WEF) subscription for 4624 events
# Filtering to reduce volume - only collect network and RDP logons
<?xml version="1.0" encoding="UTF-8"?>
<Subscription xmlns="http://schemas.microsoft.com/2006/03/windows/events/subscription">
<SubscriptionId>Successful-Logons-4624</SubscriptionId>
<SubscriptionType>SourceInitiated</SubscriptionType>
<Description>Collect network and RDP logon events (4624)</Description>
<Enabled>true</Enabled>
<Uri>http://schemas.microsoft.com/wbem/wsman/1/windows/EventLog</Uri>
<Query>
<![CDATA[
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
*[System[(EventID=4624)]]
and
*[EventData[Data[@Name='LogonType']='3' or Data[@Name='LogonType']='10']]
</Select>
<Suppress Path="Security">
*[EventData[Data[@Name='TargetUserName'] and (Data[@Name='TargetUserName']='SYSTEM' or Data[@Name='TargetUserName']='ANONYMOUS LOGON')]]
</Suppress>
</Query>
</QueryList>
]]>
</Query>
<ReadExistingEvents>false</ReadExistingEvents>
<TransportName>HTTP</TransportName>
<ContentFormat>Events</ContentFormat>
<Locale Language="en-US"/>
<LogFile>ForwardedEvents</LogFile>
<AllowedSourceNonDomainComputers></AllowedSourceNonDomainComputers>
<AllowedSourceDomainComputers>O:NSG:NSD:(A;;GA;;;DC)(A;;GA;;;NS)</AllowedSourceDomainComputers>
</Subscription>
# Apply subscription
wecutil cs 4624-subscription.xmlUse Cases
User activity monitoring
Track when and where users log in across the environment
EventID=4624 AND TargetUserName!='*$' | stats count by TargetUserName, ComputerRDP session tracking
Monitor Remote Desktop connections for capacity and security
EventID=4624 AND LogonType=10 | stats count by TargetUserName, Computer, IpAddressService account usage
Track service account logons to ensure proper usage
EventID=4624 AND LogonType IN (4, 5) | stats count by TargetUserName, ComputerAuthentication method analysis
Understand which authentication protocols are in use
EventID=4624 | stats count by AuthenticationPackageName, LmPackageNameTroubleshooting
Tested On
Community Discussions
Help improve this documentation
Found an error or want to add more examples? Contributions are welcome!