Windows Logon Types and Logon Codes

This article explains the various Windows logon types and their corresponding logon codes, offering insights into how users access Windows systems and the security implications of each.

In this Guide:

Windows Logon Types and Logon Codes are important elements of system security, helping administrators monitor and analyze user authentication events. These logs are stored in the Event Viewer and can help identify login attempts, successful authentications, and potential security threats.

This article explains Windows logon types, their associated codes, and how to interpret them easily.


What are Windows Logon Types?

Windows logon types define the method used for a user to log into a system. Each logon type corresponds to a specific activity, such as a local logon, remote desktop, or network authentication.


Common Windows Logon Types and Their Codes

Logon TypeInteger ValueDescriptionUse Case
Interactive2Occurs when a user logs on physically at the console or keyboard.Local access by employees or users.
Network3Occurs when accessing shared resources over the network (e.g., accessing a file share).Common in server environments and file-sharing scenarios.
Batch4Used for scheduled tasks or batch jobs.Automation and scheduled scripts.
Service5Initiated by a service that runs as a specific user account.Background services and applications.
Unlock7Occurs when a user unlocks a workstation.Resuming activity on a locked system.
NetworkClearText8Network logon using plaintext credentials.Generally considered insecure; typically used in older systems.
NewCredentials9Occurs when credentials are reused for outbound connections.RunAs commands with the /netonly option.
Remote Interactive10Used for Remote Desktop Protocol (RDP) sessions.Remote server or desktop management.
CachedInteractive11Used when a domain controller is unavailable, and cached credentials are used for login.Offline domain logins.

How to View Windows Logon Types and Codes

  1. Open Event Viewer:
    • Press Windows Key + R, type eventvwr, and press Enter.
  2. Navigate to Security Logs:
    • Go to Windows Logs > Security in the left pane.
  3. Find Relevant Events:
    • Look for Event IDs like 4624 (Logon) or 4634 (Logoff) for detailed logon information.
  4. Analyze the Log Details:
    • In the event details, look for the Logon Type field to identify the specific logon method.

Common Event IDs Related to Logon Types

  1. Event ID 4624: Successful logon.
  2. Event ID 4625: Failed logon attempt.
  3. Event ID 4634: Logoff event.
  4. Event ID 4647: User-initiated logoff.
  5. Event ID 4672: Special privileges assigned to a new logon.

Security Implications of Logon Types

  1. Monitor for Unauthorized Access:
    • Analyze failed logon attempts (Event ID 4625) to identify potential brute-force attacks.
  2. Identify Unusual Activity:
    • Investigate unexpected logon types, such as Type 8 (ClearText logon), as they may indicate insecure practices.
  3. Track Remote Logins:
    • Keep an eye on Type 10 (RDP logon) to detect unauthorized remote access.
  4. Audit Service Activity:
    • Regularly review Type 5 (Service logon) for unexpected services running under specific accounts.

FAQ