Microsoft-Windows-Security-Auditing › Event 4634

Event ID 4634 — An account was logged off.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logoff
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account was logged off.

Message #

An account was logged off.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.

Fields #

NameDescription
TargetUserSid SID[Subject] Security ID.
TargetUserName UnicodeString[Subject] Account Name.
TargetDomainName UnicodeString[Subject] Account Domain.
TargetLogonId HexInt64[Subject] Logon ID.
LogonType UInt32[Subject] Logon Type. Logon type reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4634,
    "version": 0,
    "level": 0,
    "task": 12545,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-10-25T22:56:14.242850+00:00",
    "event_record_id": 2692,
    "correlation": {},
    "execution": {
      "process_id": 824,
      "thread_id": 880
    },
    "channel": "Security",
    "computer": "WinDevEval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserSid": "S-1-5-111-3847866527-469524349-687026318-516638107-1125189541-4560",
    "TargetUserName": "sshd_4560",
    "TargetDomainName": "VIRTUAL USERS",
    "TargetLogonId": "0x41a49",
    "LogonType": 5
  },
  "message": ""
}

Detection Patterns #

References #