Windows Event ID 4624 — Successful Logon
Logged every time an account successfully authenticates to a Windows system. One of the highest-volume events in the Security log — a DC in a large domain can generate millions per day. The security value is not in individual events but in patterns: the logon type, authentication protocol, source, and account together reveal lateral movement, pass-the-hash, RDP access, and service account abuse.
MITRE ATT&CK
T1550.002 · Pass the Hash
Lateral Movement
Why It Matters
4624 is the primary data source for detecting lateral movement. Type 3 (network) logons using NTLM on domain controllers are a pass-the-hash signal — Kerberos is the expected domain protocol; NTLM is a downgrade that indicates a hash, not a password, was used. Multiple Type 3 logons from a single source IP across different hosts in quick succession is the textbook lateral movement pattern. Type 10 (RDP) from external or unusual IPs indicates unauthorized remote access. A 4624 immediately following a spike of 4625 failures means a credential attack succeeded.
Key Fields
Investigation Tips
- 1.Pass-the-hash signal: Type 3 logon with Authentication Package = NTLM to a domain controller. Legitimate domain authentication uses Kerberos; NTLM for a domain account to a DC means a hash, not a password, was used. Filter: EventID=4624, LogonType=3, AuthPackage=NTLM, TargetDomainName not 'NT AUTHORITY'.
- 2.Lateral movement pattern: single Source Network Address generating Type 3 logons across multiple different hosts within minutes. One source, many destinations in rapid succession = attacker moving through the environment.
- 3.RDP (Type 10) from external IPs, VPN ranges not in your admin workstation baseline, or any IP that also appears in 4625 failures = unauthorized or post-brute-force remote access.
- 4.Credential attack success: 4625 spike from a source IP followed by a 4624 from the same source = attacker succeeded. The time between last failure and first success is the detection window — measure it to understand your coverage gap.
- 5.Service logon baseline (Type 5): enumerate which service accounts log on to which hosts. New service accounts appearing in Type 5 logons, or existing accounts on new hosts, are persistence indicators — correlate with 4697 and 7045.
- 6.ANONYMOUS LOGON in Account Name: null session — unauthenticated connection attempting to enumerate shares, accounts, or registry. Block via Group Policy: 'Network access: do not allow anonymous enumeration of SAM accounts and shares'.
- 7.Correlate Logon ID with 4688 to reconstruct what the session executed — especially useful for Type 3 logons that appear briefly (attacker runs a command and disconnects).
Related Event IDs
Frequently Asked Questions
- Why am I seeing thousands of Event ID 4624 every day?
- High volume is expected and normal — a domain controller in a mid-size environment can generate hundreds of thousands of 4624 events daily. Every file share access, scheduled task run, service startup, and user login produces one. The security value is not in individual events but in patterns: logon type, source IP, authentication protocol, and timing. Filter to Type 3 (network) logons using NTLM on domain controllers, or Type 10 (RDP) from unexpected source IPs, rather than trying to review every event.
- Is Event ID 4624 from an unknown IP address a threat?
- It depends on the logon type. A Type 10 (RDP) 4624 from an IP outside your admin workstation baseline is high priority — it means someone remotely accessed a system. A Type 3 (network) 4624 using NTLM authentication to a domain controller from an unexpected host is a strong pass-the-hash indicator — domain accounts should authenticate via Kerberos, not NTLM, to a DC. A Type 3 using Kerberos from an unfamiliar IP warrants checking but may be a new device or VPN endpoint. ANONYMOUS LOGON in the account name is always suspicious regardless of source.
- What logon types in Event ID 4624 should I investigate first?
- Prioritize in this order: Type 3 (network) with Authentication Package = NTLM on a domain controller — pass-the-hash signal; Type 10 (RemoteInteractive / RDP) from IPs not in your admin workstation list — unauthorized remote access; Type 9 (NewCredentials / RunAs with alternate credentials) from non-admin accounts — credential misuse; Type 5 (service) for new service accounts or existing accounts on new hosts — persistence indicator. Type 2 (interactive console) and Type 7 (unlock) are lowest priority unless the account or host is unexpected.
- How do I detect a successful brute-force attack using Event ID 4624?
- Look for a 4624 success event from the same Source Network Address that was generating 4625 failures immediately before it. The pattern is: 10+ failures from IP X for account Y, then a 4624 for account Y from IP X within minutes. That gap between last failure and first success is your detection window. In your SIEM, join 4625 and 4624 on the source IP and account within a 10-minute window — any match where failures preceded success by less than the gap threshold is almost certainly a successful brute-force or password spray.
Full Detection Guide Available
This event ID has a full detection guide with investigation steps, remediation advice, and example log entries.
View full guide for Event ID 4624 →See Event ID 4624 in your logs
Upload a Windows Event Log (.evtx) file — EventPeeker automatically detects successful logon patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Analyze EVTX Logs Free →