4634(S) An account was logged off. - Windows 10 (2024)

  • Article

4634(S) An account was logged off. - Windows 10 (1)

Subcategory:Audit Logoff

Event Description:

This event shows that logon session was terminated and no longer exists.

The main difference between “4647: User initiated logoff.” and 4634 event is that 4647 event is generated when logoff procedure was initiated by specific account using logoff function, and 4634 event shows that session was terminated and no longer exists.

4647 is more typical for Interactive and RemoteInteractive logon types when user was logged off using standard methods. You will typically see both 4647 and 4634 events when logoff procedure was initiated by user.

It may be positively correlated with a “4624: An account was successfully logged on.” event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.

NoteFor recommendations, see Security Monitoring Recommendations for this event.


Event XML:

- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">- <System> <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /> <EventID>4634</EventID> <Version>0</Version> <Level>0</Level> <Task>12545</Task> <Opcode>0</Opcode> <Keywords>0x8020000000000000</Keywords> <TimeCreated SystemTime="2015-09-09T02:27:57.877205900Z" /> <EventRecordID>230019</EventRecordID> <Correlation /> <Execution ProcessID="516" ThreadID="832" /> <Channel>Security</Channel> <Computer>DC01.contoso.local</Computer> <Security /> </System>- <EventData> <Data Name="TargetUserSid">S-1-5-90-1</Data> <Data Name="TargetUserName">DWM-1</Data> <Data Name="TargetDomainName">Window Manager</Data> <Data Name="TargetLogonId">0x1a0992</Data> <Data Name="LogonType">2</Data> </EventData> </Event>

Required Server Roles: None.

Minimum OS Version: Windows Server 2008, Windows Vista.

Event Versions: 0.

Field Descriptions:

Subject:

  • Security ID [Type = SID]: SID of account that was logged off. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.

NoteA security identifier (SID) is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see Security identifiers.

  • Account Name [Type = UnicodeString]: the name of the account that was logged off.

  • Account Domain [Type = UnicodeString]: subject’s domain or computer name. Formats vary, and include the following:

    • Domain NETBIOS name example: CONTOSO

    • Lowercase full domain name: contoso.local

    • Uppercase full domain name: CONTOSO.LOCAL

    • For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.

    • For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.

  • Logon ID [Type = HexInt64]: hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “4624: An account was successfully logged on.”

Logon Type [Type = UInt32]: the type of logon which was used. The table below contains the list of possible values for this field:

Logon TypeLogon TitleDescription
2InteractiveA user logged on to this computer.
3NetworkA user or computer logged on to this computer from the network.
4BatchBatch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention.
5ServiceA service was started by the Service Control Manager.
7UnlockThis workstation was unlocked.
8NetworkCleartextA user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
9NewCredentialsA caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections.
10RemoteInteractiveA user logged on to this computer remotely using Terminal Services or Remote Desktop.
11CachedInteractiveA user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials.

Security Monitoring Recommendations

For 4634(S): An account was logged off.

ImportantFor this event, also see Appendix A: Security monitoring recommendations for many audit events.

  • If a particular Logon Type should not be used by a particular account (for example if Logon Type 4-Batch or 5-Service is used by a member of a domain administrative group), monitor this event for such actions.
4634(S) An account was logged off. - Windows 10 (2024)

FAQs

4634(S) An account was logged off. - Windows 10? ›

When a logon session is terminated, event 4634 is generated. This is not to be confused with event 4647, where a user initiates the logoff (i.e., a specific account uses the logoff function). Here, it is simply recorded that a session no longer exists as it was terminated.

What is error code 4634? ›

An account was logged off. This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value.

What is 4624 an account was successfully logged on? ›

Event ID 4624 (viewed in Windows Event Viewer) documents every successful attempt at logging on to a local computer. This event is generated on the computer that was accessed, in other words, where the logon session was created. A related event, Event ID 4625 documents failed logon attempts.

What is logon type 3 event 4634? ›

Thank you for reaching out to the community, Event Id 4634 logon type 3 means that the user or computer logged on to this computer from the network. If a post solves your question please use the 'Verify Answer' button.

What is the event ID 4624 and 4634 at the same time? ›

A pair of 4624 and 4634 are tied to one unique logonId. It appears that in the background multiple logon sessions are being created and terminated within seconds which results in these logon/logoff events.

What is error code 240000? ›

Error Code 240000

This indicates a compatibility issue with your computer's operating system (OS) and browser.

What is error code 9324? ›

The STRING() function returns error 9324 when used against a LONGCHAR variable that contains more than 32KB of data. The STRING() function fails when used against a LONGCHAR variable that contains more than 32KB of data. Run the following code: DEFINE VARIABLE lcSample AS LONGCHAR NO-UNDO.

What is the impersonation level in Windows? ›

The varying degrees of impersonation are called impersonation levels, and they indicate how much authority is given to the server when it is impersonating the client. Currently, there are four impersonation levels: anonymous, identify, impersonate, and delegate.

How to detect who enabled a user account in Active Directory? ›

Start “Event Viewer” and search for the event ID 4722 in the Security Logs. This ID identifies a user account that was enabled. The above image displays the user who enabled a user account.

What is the event ID for user logoff? ›

Event ID 4647

What is the difference between 4647 and 4634? ›

The main difference between “4647: User initiated logoff.” and 4634 event is that 4647 event is generated when logoff procedure was initiated by specific account using logoff function, and 4634 event shows that session was terminated and no longer exists.

How to track users' logon logoff? ›

Go back to Computer Configuration and navigate to Windows Settings> Security Settings> Advanced Audit Policy Configuration> Audit Policy> Logon/Logoff. Under that, configure 'Audit Logon', 'Audit Logoff' and 'Audit Special Logon' and enable them for 'Success' and 'Failure'.

What is the event ID for account lockout? ›

Event ID 4740 is generated on domain controllers, Windows servers, and workstations every time an account gets locked out. Event ID 4767 is generated every time an account is unlocked.

What is event ID 4624 Remote Desktop? ›

Event ID 4624 is generated in the Windows Security Log when a successful logon occurs on a local computer. This event is generated on the computer that was accessed, meaning that it is the computer where the logon session was created. A related event, Event ID 4625, is generated when a logon attempt fails.

What is the difference between event ID 4624 and 4776? ›

As you might be confused by now that how 4624, 4625 is different from 4776 since they both indicates successful or failed login. Actually, EventID 4624, 4625 are generated when credentials are stored in local machine/ when the system cannot reach Domain Controller.

What is the difference between Windows Eventcode and event ID? ›

event.id should be unique to the event instance (like the record ID in windows events). event. code is identifier that indicates the type of event or message.

How do I fix error code 232404? ›

Use Incognito Mode. If the "Error loading media: File could not be played" or "this video file cannot be played. (error code: 232404)" error is triggered by the extensions, you can quickly resolve it by using the Incognito mode.

What is HTTP error for invalid credentials? ›

The HTTP status code 401, often denoted as UNAUTHORIZED , signifies that the client lacks proper authentication credentials or has provided invalid credentials. In simpler terms, the server has failed to identify the user.

What is error failed to connect to a Windows service? ›

The Failed to connect to a windows service error is usually caused by another conflicting service or misconfigured settings. A quick solution is to disable UAC and fast startup. For advanced users, modifying the Registry should do the trick.

What is error code 7034 Windows? ›

Cause : This event is logged when the service terminated unexpectedly. To resolve this issue, change the recovery actions that the Service Control Manager (SCM) will take when a service fails.

Top Articles
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 5903

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.