Chat now with support
Chat with Support

Change Auditor for Logon Activity 7.0.2 - Event Reference Guide

Introduction

Information about login and log out activity is important for regulatory compliance and user activity tracking. There are two auditing modules provided to allow you to collect this important activity:

This guide lists the events captured by these two Change Auditor for Logon Activity auditing modules. Separate event reference guides are available that list the core Change Auditor events (when any Change Auditor license is applied) and the events captured when the different auditing modules are licensed.

 

Change Auditor for Logon Activity Events

This section lists the audited events captured by the two Change Auditor for Logon Activity auditing modules. They are listed in alphabetical order by facility:

 

Authentication Activity

Domain - Group Policy:

Workgroup - Local Group Policy:

User failed to log on interactively

Created when a user failed to log on interactively to a computer.

Windows® Event equivalent: 529/4625

Medium

User failed to log on interactively from a remote computer

Created when a user failed to log on interactively from a remote computer.

Windows Event: 529/4625

Medium

User failed to perform a network logon from a remote computer

Created when a user failed to log on from a remote computer on the network. (Disabled by default)

Windows Event equivalent: 529/4625

Medium

User logged on interactively

Created when a user successfully logged on interactively to a computer.

Windows Event equivalent: 528/4624

NOTE: When logging onto a monitored Windows 2012 or 2012 R2 server or a Windows 8 or 8.1 workstation, you may see additional events with ‘Windows Manager\DWM-n’ in the who information. This is expected behavior because the logon is being performed by the system.

Medium

User logged on interactively from a remote computer

Created when a user successfully logged on interactively from a remote computer.

Windows Event equivalent: 528/4624

Medium

User performed a successful network logon from a remote computer

Crated when a user successfully logged on from a remote computer on the network. (Disabled by default)

Windows Event equivalent: 540/4624

Medium

Domain Controller Authentication

User authenticated through Kerberos

Created when a user successfully authenticated to a domain controller using Kerberos authentication. (Disabled by default)

Medium

User failed to authenticate through Kerberos

Created when a user failed to authenticate to a domain controller using Kerberos authentication.

Medium

Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating