This logon event indicates an account has failed to authenticate to the endpoint. It is logged on the destination endpoint. It closely mirrors the information logged for the event 4624: An account was successfully logged on.
Note
This event is a Logon Event, meaning it is logged on the system that is being authenticated to.
- Behavioral - Lateral Movement (TA0008)
- Account - Login History
- Account - Security Identifier (SID)
- Network Activity - Source Identification
- Windows 11
- Windows 10
- Windows 8
- Windows 7
- Windows Vista
- Windows XP
%SystemRoot%\System32\Winevt\Logs\Security.evtx
The following fields may be interpreted from this artifact:
Field Name | Interpretation |
---|---|
Logon Type | Logon type. See Logon Types |
Account For Which Logon Failed / Security ID | SID of account that authenticated |
Account For Which Logon Failed / Account Name | Name of account that authenticated |
Network Information / Source Network Address | IP address of source endpoint |
Note
The SID may be translated by event viewer. To view the raw SID, look at the event's XML data, which has the following fields available:
XML Field Name | Interpretation |
---|---|
EventData/LogonType | Logon type. See Logon Types |
EventData/TargetUserSid | SID of account that authenticated |
EventData/TargetUserName | Name of account that authenticated |
EventData/IpAddress | IP address of source endpoint |
The following logon types are commonly seen:
Logon Type | Description |
---|---|
2 | Interactive (user loggong on through screen or virtual console) |
3 | Network (RDP with NLA enabled) |
7 | Unlock (RDP reconnects or interactive unlocking) |
9 | Explicit credentials (runas ) |
10 | Remote Interactive (RDP with NLA diasbled) |