Windows Logon Types and Logon Codes

This article explains the various Windows logon types and their corresponding logon codes, offering insights into how users access Windows systems and the security implications of each.

In this Guide:

Windows Logon Types and Logon Codes are crucial for system security, to help administrators monitor and analyze user authentication events. These logs are stored in the Event Viewer and can help you see login attempts, successful authentications and potential security threats.

This article explains Windows logon types, their codes and how to read them easily.

What are Windows Logon Types?

Windows logon types define how a user logs into a system. Each logon type corresponds to an activity, like a local logon, remote desktop or network authentication.

Common Windows Logon Types and Their Codes

Logon TypeInteger ValueDescriptionUse Case
Interactive2Occurs when a user logs on physically at the console or keyboard.Local access by employees or users.
Network3Occurs when accessing shared resources over the network (e.g., accessing a file share).Common in server environments and file-sharing scenarios.
Batch4Used for scheduled tasks or batch jobs.Automation and scheduled scripts.
Service5Initiated by a service that runs as a specific user account.Background services and applications.
Unlock7Occurs when a user unlocks a workstation.Resuming activity on a locked system.
NetworkClearText8Network logon using plaintext credentials.Generally considered insecure; typically used in older systems.
NewCredentials9Occurs when credentials are reused for outbound connections.RunAs commands with the /netonly option.
Remote Interactive10Used for Remote Desktop Protocol (RDP) sessions.Remote server or desktop management.
CachedInteractive11Used when a domain controller is unavailable, and cached credentials are used for login.Offline domain logins.

 How to View Windows Logon Types and Codes

  1. Open Event Viewer:

    • Press Windows Key + R, type eventvwr, and press Enter.

  2. Navigate to Security Logs:

    • Go to Windows Logs > Security in the left pane.

  3. Find Relevant Events:

    • Look for Event IDs like 4624 (Logon) or 4634 (Logoff) for detailed logon information.

  4. Analyze the Log Details:

    • In the event details, look for the Logon Type field to identify the specific logon method.

Common Event IDs Related to Logon Types

Event IDEvent NameDescriptionKey Details
4624Successful LogonA user successfully logged on to the system.Includes logon type, user account, source IP, and authentication method.
4625Failed Logon AttemptA failed attempt was made to log on to the system.Shows logon type, account name, status, failure reason, and source.
4634Logoff EventA user logged off from the system.Identifies the account and session terminated.
4647User-Initiated LogoffA user initiated a logoff from their session.Specifies the account that initiated the logoff.
4672Special Privileges AssignedSpecial privileges assigned to a new logon session (e.g., admin rights).Indicates assignment of elevated privileges to an account at logon.

Security Implications of Logon Types

  1. Monitor for Unauthorized Access:

    • Look at failed logon attempts (Event ID 4625) to see brute-force attacks.

  2. Identify Unusual Activity:

    • Investigate unexpected logon types, like Type 8 (ClearText logon) as they might be insecure practices.

  3. Track Remote Logins:

    • Keep an eye on Type 10 (RDP logon) to see unauthorized remote access.

  4. Audit Service Activity:

    • Regularly review Type 5 (Service logon) for unexpected services running under specific accounts.

Related Article

  1. Microsoft's Windows Audit logon events
  2. Understanding Windows Logon Type 3

FAQ