Solved

deciphering security log events

Posted on 2004-08-09
4
206 Views
Last Modified: 2012-05-05
I'm trying to find out information on what the Logon ID: (0x0....) number represents. Example from below:

Event Type:      Success Audit
Event Source:      Security
Event Category:      Logon/Logoff
Event ID:      538
Date:            8/9/2004
Time:            9:14:02 AM
User:            NT AUTHORITY\SYSTEM
Computer:      COMPUTERNAME
Description:
User Logoff:
       User Name:      COMPUTERNAME$
       Domain:            DOMAIN
       Logon ID:            (0x0,0x13E1295)
       Logon Type:      3

Is there a way to decipher that?

Tony

0
Comment
Question by:townsendra
4 Comments
 
LVL 15

Accepted Solution

by:
Yan_west earned 250 total points
Comment Utility
Eric Fitzgerald of Microsoft has explained this:

Whenever a user logs on, a logon session is created that is uniquely identified with a number, called Logon ID which is logged as a parameter with the event in the Windows Security Log. Similarly, when a user log offs, then under normal conditions, this logon session is destroyed and an entry is made into the Windows Security Log with a Logon ID similar to the one with which the session was created. In other words, we can correlate these log on and log off events based on the Logon IDs and irrespective of the Log on type that is mentioned above.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now