Event ID 4611 — A trusted logon process has been registered with the Local Security Authority.
Description
A trusted logon process has been registered with the Local Security Authority.
Message #
Fields #
| Name | Description |
|---|---|
SubjectUserSid SID | [Subject] Security ID. |
SubjectUserName UnicodeString | [Subject] Account Name. |
SubjectDomainName UnicodeString | [Subject] Account Domain. |
SubjectLogonId HexInt64 | [Subject] Logon ID. |
LogonProcessName UnicodeString | [Subject] Logon Process Name. |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 4611,
"version": 0,
"level": 0,
"task": 12289,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2022-04-04T13:50:33.878854+00:00",
"event_record_id": 31791,
"correlation": {
"ActivityID": "7377737E-4825-0000-C974-77732548D801"
},
"execution": {
"process_id": 612,
"thread_id": 3232
},
"channel": "Security",
"computer": "WIN-TKC15D7KHUR",
"security": {
"user_id": ""
}
},
"event_data": {
"SubjectUserSid": "S-1-5-18",
"SubjectUserName": "WIN-TKC15D7KHUR$",
"SubjectDomainName": "WORKGROUP",
"SubjectLogonId": "0x3e7",
"LogonProcessName": "UserManager"
},
"message": ""
}
Community Notes #
May be seen when a process injects into LSASS.
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- Register new Logon Process by Rubeus source high: Detects potential use of Rubeus via registered new trusted logon process
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4611
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-system-extension
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4611
- Example event sourced from https://github.com/NextronSystems/evtx-baseline