Events duplication (in event viewer) after successful logon - Microsoft Community


can please explain me why see several (looks duplicated) event in event viewer after successful logon. 

for example after reboot (win 10 workstation, no domain, no specific configuration) see in security log 2 totally identical logs event 4624, type 2

the same situation "unlock"

i want show these events in logs:

in example pc in domain, , reproducing windows unlock (logoff - logon):

first event

log name:      security
source:        microsoft-windows-security-auditing
date:          2/14/2017 1:35:30 pm
event id:      4624
task category: logon
level:         information
keywords:      audit success
user:          n/a
computer:      mpxxx.xxx.xxx.net
description:
account logged on.

subject:
security id:  system
account name:  mpxxx$
account domain: kiv
logon id:  0x3e7

logon information:
logon type:  7
restricted admin mode: -
virtual account: no
elevated token: yes

impersonation level: impersonation

new logon:
security id:  universe\mpxxx
account name:  mpxxx
account domain: universe
logon id:  0x3d5986
linked logon id: 0x3d8cf3
network account name: -
network account domain: -
logon guid:  {a97eb034-e1a9-beba-9e13-0376df13c092}

process information:
process id:  0x2cc
process name:  c:\windows\system32\lsass.exe

network information:
workstation name: mpxxx
source network address: -
source port:  -

detailed authentication information:
logon process: negotiat
authentication package: negotiate
transited services: -
package name (ntlm only): -
key length:  0

second duplicated event:

log name:      security
source:        microsoft-windows-security-auditing
date:          2/14/2017 1:35:30 pm
event id:      4624
task category: logon
level:         information
keywords:      audit success
user:          n/a
computer:      mpxxx.xxx.xxx.net
description:
account logged on.

subject:
security id:  system
account name:  mpxxx$
account domain: kiv
logon id:  0x3e7

logon information:
logon type:  7
restricted admin mode: -
virtual account: no
elevated token: no

impersonation level: impersonation

new logon:
security id:  universe\mpxxx
account name:  mpxxx
account domain: universe
logon id:  0x3d8cf3
linked logon id: 0x3d5986
network account name: -
network account domain: -
logon guid:  {00000000-0000-0000-0000-000000000000}

process information:
process id:  0x2cc
process name:  c:\windows\system32\lsass.exe

network information:
workstation name: mpxxx
source network address: -
source port:  -

detailed authentication information:
logon process: negotiat
authentication package: negotiate
transited services: -
package name (ntlm only): -
key length:  0

the difference in "elevated token: , logon guid:" portion of output 

dear ms guru please give me ideas why duplication happens. important because planning send events third party security system , duplication makes lot of unnecessary noise

thank you.  

question outside scope of site (for consumers) , sure best answer should asked either on technet (for pro's) or msdn (for developers)

technet
https://social.technet.microsoft.com/forums/en-us/home

msdn

https://social.msdn.microsoft.com/forums/en-us/home

if give link new thread can point resources


Windows / Windows 10 / Security & privacy / PC



Comments

Popular posts from this blog

$AV_ASW folder - Microsoft Community

WTouch_Message_Window app running in the background is preventing - Microsoft Community

Windows error No Certificate Available - Microsoft Community