Events duplication (in event viewer) after successful logon - Microsoft Community
can please explain me why see several (looks duplicated) event in event viewer after successful logon.
for example after reboot (win 10 workstation, no domain, no specific configuration) see in security log 2 totally identical logs event 4624, type 2
the same situation "unlock"
i want show these events in logs:
in example pc in domain, , reproducing windows unlock (logoff - logon):
first event
  
  log name:      security
  source:        microsoft-windows-security-auditing
  date:          2/14/2017 1:35:30 pm
  event id:      4624
  task category: logon
  level:         information
  keywords:      audit success
  user:          n/a
  computer:      mpxxx.xxx.xxx.net
  description:
  account logged on.
  
  subject:
  security id:  system
  account name:  mpxxx$
  account domain: kiv
  logon id:  0x3e7
  
  logon information:
  logon type:  7
  restricted admin mode: -
  virtual account: no
  elevated token: yes
  
  impersonation level: impersonation
  
  new logon:
  security id:  universe\mpxxx
  account name:  mpxxx
  account domain: universe
  logon id:  0x3d5986
  linked logon id: 0x3d8cf3
  network account name: -
  network account domain: -
  logon guid:  {a97eb034-e1a9-beba-9e13-0376df13c092}
  
  process information:
  process id:  0x2cc
  process name:  c:\windows\system32\lsass.exe
  
  network information:
  workstation name: mpxxx
  source network address: -
  source port:  -
  
  detailed authentication information:
  logon process: negotiat
  authentication package: negotiate
  transited services: -
  package name (ntlm only): -
  key length:  0
  
  second duplicated event:
  
  log name:      security
  source:        microsoft-windows-security-auditing
  date:          2/14/2017 1:35:30 pm
  event id:      4624
  task category: logon
  level:         information
  keywords:      audit success
  user:          n/a
  computer:      mpxxx.xxx.xxx.net
  description:
  account logged on.
  
  subject:
  security id:  system
  account name:  mpxxx$
  account domain: kiv
  logon id:  0x3e7
  
  logon information:
  logon type:  7
  restricted admin mode: -
  virtual account: no
  elevated token: no
  
  impersonation level: impersonation
  
  new logon:
  security id:  universe\mpxxx
  account name:  mpxxx
  account domain: universe
  logon id:  0x3d8cf3
  linked logon id: 0x3d5986
  network account name: -
  network account domain: -
  logon guid:  {00000000-0000-0000-0000-000000000000}
  
  process information:
  process id:  0x2cc
  process name:  c:\windows\system32\lsass.exe
  
  network information:
  workstation name: mpxxx
  source network address: -
  source port:  -
  
  detailed authentication information:
  logon process: negotiat
  authentication package: negotiate
  transited services: -
  package name (ntlm only): -
  key length:  0
the difference in "elevated token: , logon guid:" portion of output
dear ms guru please give me ideas why duplication happens. important because planning send events third party security system , duplication makes lot of unnecessary noise
thank you.
technet
https://social.technet.microsoft.com/forums/en-us/home
msdn
https://social.msdn.microsoft.com/forums/en-us/home
if give link new thread can point resources
                Windows                /                        Windows 10                    /                        Security & privacy                    /                        PC                
 
  
Comments
Post a Comment