Event ID 4647 — User initiated logoff.
Description
User initiated logoff.
Message #
Fields #
| Name | Description |
|---|---|
TargetUserSid SID | [Subject] Security ID. |
TargetUserName UnicodeString | [Subject] Account Name. |
TargetDomainName UnicodeString | [Subject] Account Domain. |
TargetLogonId HexInt64 | [Subject] Logon ID. |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 4647,
"version": 0,
"level": 0,
"task": 12545,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2023-11-05T22:31:33.526113+00:00",
"event_record_id": 3363,
"correlation": {
"ActivityID": "59A0D65F-1037-0001-A7D6-A0593710DA01"
},
"execution": {
"process_id": 808,
"thread_id": 8392
},
"channel": "Security",
"computer": "WinDev2310Eval",
"security": {
"user_id": ""
}
},
"event_data": {
"TargetUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
"TargetUserName": "User",
"TargetDomainName": "WINDEV2310EVAL",
"TargetLogonId": "0x580c6"
},
"message": ""
}
Detection Patterns #
Uses Authentication Normalization
Security-Auditing Event ID 4624: An account was successfully logged on.ANDEvent ID 4625: An account failed to log on.ANDEvent ID 4634: An account was logged off.ANDEvent ID 4647: User initiated logoff.ANDEvent ID 4648: A logon was attempted using explicit credentials.ANDEvent ID 4675: SIDs were filtered.
Impact: Account Access Removal
1 rule
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4647
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-logoff
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4647
- Example event sourced from https://github.com/NextronSystems/evtx-baseline