Windows Logon Type Reference

The LogonType field in Microsoft-Windows-Security-Auditing events 4624, 4625, and 4648 is an integer indicating how the user authenticated. Each value maps to a distinct authentication method with different security implications.

Logon Types#

ValueNameDescriptionDetection Context
0SystemUsed only by the SYSTEM account during OS startupNormal during boot; unexpected at other times may indicate rootkit activity
2InteractiveLocal console logon — most commonly occurs when a user physically signs in, but may also be seen with a server KVM or VNCExpected on workstations; on servers may indicate physical access or KVM
3NetworkAuthentication over the network (SMB, mapped drives, most remote tools). Examples: file share access, vulnerability scanner auth checks, remote PowerShell, PsExecPrimary lateral movement indicator: correlate source IP with known admin hosts
4BatchScheduled task execution (non-interactive)Check Task Scheduler for persistence; unusual batch logons may indicate malicious scheduled tasks
5ServiceService Control Manager started a service (non-interactive)Normal for service accounts; investigate if seen with interactive user accounts
7UnlockWorkstation unlocked (can include RDP unlock/reconnect)Generally benign; high frequency from a locked-out account may indicate brute force
8NetworkCleartextNetwork logon with credentials sent in cleartext (basic HTTP auth, IIS). May indicate a downgrade attack or older admin toolCredentials exposed on the wire: flag unless expected (e.g. legacy IIS app)
9NewCredentialsCaller cloned current token with new credentials for outbound connections. Triggered by runas /netonly, CreateProcessWithLogonW with LOGON_NETCREDENTIALS_ONLY, or LogonUserW with LOGON32_LOGON_NEW_CREDENTIALSPass-the-Hash and runas /netonly produce type 9; correlate with source process
10RemoteInteractiveRemote Desktop (RDP) or Remote Assistance — a user logged on remotely using Terminal ServicesKey RDP indicator: match source IP against expected admin jump hosts
11CachedInteractiveLogon using cached domain credentials when domain controller is unreachable (e.g. laptop off-network)Expected for laptops off-network; on servers may indicate DC connectivity issues
12CachedRemoteInteractiveRemote interactive logon using cached credentials. Also seen when Microsoft Live accounts authenticate on standalone workstationsRDP with cached credentials: unusual, may indicate disconnected DC during RDP session
13CachedUnlockWorkstation unlock using cached credentials (similar to type 7)Similar to type 11; expected off-network

Lateral Movement Indicators#

The following logon types are most relevant when hunting for lateral movement:

TypeNameWhy It Matters
3NetworkMost common lateral movement vector: SMB, WMI, PSRemoting, WinRM all produce type 3. Filter by source IP to isolate unexpected origins.
9NewCredentialsCreated by runas /netonly and many Pass-the-Hash tools (e.g. Mimikatz sekurlsa::pth). The local session keeps the original token while outbound connections use the new credentials.
10RemoteInteractiveRDP sessions. Hands-on-keyboard access: especially concerning when the source is not a known jump host or PAW.

Filtering guidance: Start by excluding type 3 logons from known admin workstations and service accounts. Remaining type 3 events, particularly to domain controllers or file servers from unexpected sources, are high-value leads.

Analysis Tips#