Events duplication (in event viewer) after successful logon - Microsoft Community
can please explain me why see several (looks duplicated) event in event viewer after successful logon.
for example after reboot (win 10 workstation, no domain, no specific configuration) see in security log 2 totally identical logs event 4624, type 2
the same situation "unlock"
i want show these events in logs:
in example pc in domain, , reproducing windows unlock (logoff - logon):
first event
log name: security
source: microsoft-windows-security-auditing
date: 2/14/2017 1:35:30 pm
event id: 4624
task category: logon
level: information
keywords: audit success
user: n/a
computer: mpxxx.xxx.xxx.net
description:
account logged on.
subject:
security id: system
account name: mpxxx$
account domain: kiv
logon id: 0x3e7
logon information:
logon type: 7
restricted admin mode: -
virtual account: no
elevated token: yes
impersonation level: impersonation
new logon:
security id: universe\mpxxx
account name: mpxxx
account domain: universe
logon id: 0x3d5986
linked logon id: 0x3d8cf3
network account name: -
network account domain: -
logon guid: {a97eb034-e1a9-beba-9e13-0376df13c092}
process information:
process id: 0x2cc
process name: c:\windows\system32\lsass.exe
network information:
workstation name: mpxxx
source network address: -
source port: -
detailed authentication information:
logon process: negotiat
authentication package: negotiate
transited services: -
package name (ntlm only): -
key length: 0
second duplicated event:
log name: security
source: microsoft-windows-security-auditing
date: 2/14/2017 1:35:30 pm
event id: 4624
task category: logon
level: information
keywords: audit success
user: n/a
computer: mpxxx.xxx.xxx.net
description:
account logged on.
subject:
security id: system
account name: mpxxx$
account domain: kiv
logon id: 0x3e7
logon information:
logon type: 7
restricted admin mode: -
virtual account: no
elevated token: no
impersonation level: impersonation
new logon:
security id: universe\mpxxx
account name: mpxxx
account domain: universe
logon id: 0x3d8cf3
linked logon id: 0x3d5986
network account name: -
network account domain: -
logon guid: {00000000-0000-0000-0000-000000000000}
process information:
process id: 0x2cc
process name: c:\windows\system32\lsass.exe
network information:
workstation name: mpxxx
source network address: -
source port: -
detailed authentication information:
logon process: negotiat
authentication package: negotiate
transited services: -
package name (ntlm only): -
key length: 0
the difference in "elevated token: , logon guid:" portion of output
dear ms guru please give me ideas why duplication happens. important because planning send events third party security system , duplication makes lot of unnecessary noise
thank you.
technet
https://social.technet.microsoft.com/forums/en-us/home
msdn
https://social.msdn.microsoft.com/forums/en-us/home
if give link new thread can point resources
Windows / Windows 10 / Security & privacy / PC
Comments
Post a Comment