Triage guide to failed logons in Windows 

Cybersecurity

Security and SOC analysts regularly triage Windows event logs to identify potential threats. One of the most common — and often misunderstood — alerts is the failed logon attempt, known as Windows Event ID 4625. With so many ways users, services and systems authenticate today, pinpointing the root cause can be challenging for both IT generalists and security teams. 

Why you care about failed logons 

Failed logon events may seem routine, but they often signal underlying security, operational or compliance concerns. Monitoring and triaging these events is important for several key reasons: 

  • Security – To detect brute force / password related attacks and malicious internal activity. 
  • IT hygiene – Housecleaning of devices failing to authenticate should be remediated as stale administrative accounts or users with expired passwords can pose security risks. 
  • Compliance – Most industry regulations mandate log monitoring and auditing of failed logons. 

Logon Types 

When triaging a failed logon event, one of the first questions to answer is how the authentication attempt occurred. Windows assigns a specific logon type to each authentication attempt, providing important context about whether the activity was interactive, network-based, service-driven or automated. Understanding these logon types helps narrow the investigation and prioritize response efforts. 

The table below outlines the most common Windows logon types you’ll encounter when investigating Event ID 4625: 

Logon type Logon title Description 
Interactive A user attempted to log on at a Windows computer’s local keyboard and screen. The most common cause is human error, specifically, incorrectly typing the username and/or password. 
Network A user or computer logged on to this computer from the network. This logon mostly occurs when you access remote file shares or printers. If IIS is in play, Internet Information Server attempts are recorded as a network logon also. 
Batch Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. The most common failed event is scheduled tasks here. 
Service A service was started by the Service Control Manager. Most common failed event is when services and service accounts attempt to log on to start a service. 
Unlock This workstation was unlocked. This occurs when you attempt to unlock your Windows system. 
NetworkCleartext A user logged on to this computer from the network while the user’s password was passed to the authentication package in its unhashed form (in clear text). Most failed logons occur here when a user uses basic authentication to authenticate to an IIS server. 
NewCredentials A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity but uses different credentials for other network connections. Failed events here are mostly caused when a user starts a program with RunAs /netonly. 
10 RemoteInteractive A user logged on to this computer remotely using Terminal Services or Remote Desktop. 
11 CachedInteractive A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. 

Based on observations from the RocketCyber SOC team, most failed logon events in small and medium-sized businesses (SMBs) fall under logon Types 2, 3, 4 and 5. In many cases, these events are not malicious — but they can still introduce security risk if left unaddressed. 

After investigating numerous failed logons originating from inside the network, the most common causes include: 

  • Fat finger logons (bad password / username entry) 
  • Cached outdated credentials accessing mapped drives 
  • Scheduled tasks with outdated credentials 
  • Batch files with expired accounts 

Failed logons are inevitable, but they should never be ignored. Consistent monitoring and triage are essential to distinguishing harmless user error from genuine security threats. Logon types can help prioritize remediation efforts, especially when determining whether activity originated inside or outside the network. While external attempts often receive immediate attention, internal failed logons are frequently overlooked — even though they can indicate misconfigurations, stale credentials or malicious activity. 

Event field descriptions 

To better understand how failed logons appear in practice, let’s examine a real-world example of a Windows Event ID 4625 entry. The screenshot below highlights the key fields analysts review during triage. 


Beyond logon type, several additional event fields provide critical context when investigating a failed logon. These details help analysts determine who initiated the attempt, where it originated and why it failed. 

Subject / account name – Identifies the account that requested the logon. This is not necessarily the same as the user account that ultimately failed authentication. 

Account for which logon failed (account name & domain) – Identifies the account that attempted to authenticate and failed. In most cases, this includes both the username and the associated domain (or computer name if it is a local account). 

Network information – Indicates where the logon attempt originated. If the attempt was initiated from the same system, this section may be blank or reflect the local machine. When populated, the workstation name and source network address are especially valuable for triage. The source port is also listed, but it is typically less useful since most source ports are dynamically assigned. 

Failure information – Explains why the logon attempt failed. This includes a textual failure reason along with status and substatus codes (in hexadecimal format), which provide more granular insight into the cause of the failure. 

Process information – When available, this section can be particularly useful. It includes the process ID (PID) of the application that initiated the logon attempt. Analysts can cross-reference the PID in Task Manager to identify the associated process. Note that Windows logs the PID in hexadecimal format, which must be converted to decimal before performing the lookup. 

Top 10 status / sub status codes 

The table below is provided as a reference for the most frequent status / sub status codes observed by the RocketCyber SOC team: 

Status / sub status code Description 
0xC000006A Username is correct but the password is wrong 
0xC0000064 Username does not exist 
0XC000006D This is either due to a bad username or authentication information 
0XC000006E Unknown username or bad password 
0xC0000193 Account expired 
0xC0000070 Logon attempt from unauthorized workstation 
0xC0000071 Password expired 
0xC0000072 Logon attempt to account disabled by administrator 
0xc000015b The user does not have logon rights to authenticate to this computer 
0xC0000234 Logon attempt with account locked 

Summary of triaging Windows event log 4625 (failed logon) 

While this overview does not cover every possible telemetry detail, it serves as a practical foundation for IT and cybersecurity professionals investigating failed logon events. Monitoring Event ID 4625 supports stronger security oversight, improved IT hygiene and regulatory compliance. 

For managed service providers supporting small and medium-sized businesses, consistent monitoring and triage of failed logons — alongside other critical security events — can significantly strengthen overall security posture. Organizations that lack the tools, expertise or resources to effectively monitor and respond to these events should consider evaluating modern security solutions designed to deliver continuous visibility, threat detection and response. 

To learn how Kaseya’s security portfolio can help enhance monitoring, detection and response capabilities, request a demo with a security specialist. 

One Complete Platform for IT & Security Management

Kaseya 365 is the all-in-one solution for managing, securing, and automating IT. With seamless integrations across critical IT functions, it simplifies operations, strengthens security, and boosts efficiency.

One platform. Everything IT.

Kaseya 365 customers experience the benefits of the best IT Management and Security tools in a single solution.

Explore Kaseya 365

Your success is our #1 priority

Partner First is a commitment to flexible terms, shared risk and dedicated support for your business.

Explore Partner First Pledge

2025 Global MSP Benchmark Report

The 2025 Global MSP Benchmark Report from Kaseya is your go-to resource for understanding where the industry is headed.

Download Now
Security information and incident management concepts. Officials are managing events and safety on virtual screens.

What is SIEM? How it works, use cases and benefits explained

Learn how security information and event management (SIEM) helps organizations proactively identify and address potential security threats and vulnerabilities.

Read blog post

Backup verification just got smarter: Introducing AI-powered screenshot verification

In an era of relentless cyberattacks, infrastructure complexity and rising client expectations, simply having backups is no longer enough. BackupsRead More

Read blog post
NIS 2 Directive. European cybersecurity rule

Ten things to ask your IT team about NIS2 compliance

Ensure your organisation is prepared to withstand security threats and recover from incidents. Read the blog to learn about the ten key areas to consider for NIS2 compliance.

Read blog post