Computer Account Logon

Joe 1 Reputation point
2020-07-14T21:32:20.907+00:00

Hi, i have a quick question. How often does a "computer account" (not to confused with a user logon) logon against a DC? I've been reviewing security logs and i've noticed quite frequent computer account logins (4624). Those logon events do not correlate to the "lastLogon" value of the Computer Account object

Subject:
 Security ID: NULL SID
 Account Name: -
 Account Domain: -
 Logon ID: 0x0

Logon Type: 3

New Logon:
 Security ID: Domain\PC-102$
 Account Name: PC-102$
 Account Domain: Domain
 Logon ID: 0x61fe8f7ee
 Logon GUID: {86e8f2f4-eb16-50e6-0470-11525ea0d275}

Process Information:
 Process ID: 0x0
 Process Name: -

Network Information:
 Workstation Name:
 Source Network Address: 192.168.253.66
 Source Port: 37776

Detailed Authentication Information:
 Logon Process: Kerberos
 Authentication Package: Kerberos
 Transited Services: -
 Package Name (NTLM only): -
 Key Length: 0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
 - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
 - Transited services indicate which intermediate services have participated in this logon request.
 - Package name indicates which sub-protocol was used among the NTLM protocols.

- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

Active Directory
Active Directory
A set of directory-based technologies included in Windows Server.
6,644 questions
0 comments No comments
{count} votes

9 answers

Sort by: Most helpful
  1. Anonymous
    2020-07-14T22:03:32.17+00:00
    0 comments No comments

  2. S.Sengupta 19,661 Reputation points MVP
    2020-07-15T01:20:44.91+00:00

    I shall also suggest you to go through:

    4624(S): An account was successfully logged on.

    0 comments No comments

  3. Daisy Zhou 25,061 Reputation points Microsoft Vendor
    2020-07-15T03:40:59.453+00:00

    Hello,
    Thank you for posting in our Q&A forum.

    Based on the test in my lab, if the domain computer is connected to the domain network.

    And if we do the following actions(maybe it also includes other actions that I didn’t think of), the computer will logon:

    1.Restart the domain computer
    2.Shut down and start the domain computer
    3.Update domain group policy about comuter (such as run gpupdate /force or gpupdate /force /target:computer on domain computer manually, or the domain computer update domain GPO in the background)
    12353-update.png
    4.Establish a secure channel or update a secure channel between the domain computer and domain controller.

    I think it is "LastLogon" of the domain computer, it is only updated on one DC, that means this attribute is not replicated. We can get the "LastLogon" about computers in the domain with command on every DC in the domain and the lastest date value is the "LastLogon" value:

    ****Get-ADComputer -Filter * -Properties lastlogon,lastlogondate,lastlogontimestamp | select -Property name,lastlogondate,lastlogontimestamp,@{n="lastlogon";e={[datetime]::FromFileTime($_.lastlogon)}}****

    For example, I have two DCs in the domain (Win10-1809):

    12315-last4.png

    For more information about secure channel, we can refer to the link below.

    Detailed Concepts: Secure Channel Explained
    https://social.technet.microsoft.com/wiki/contents/articles/24644.detailed-concepts-secure-channel-explained.aspx?Sort=MostUseful&PageIndex=1

    0 comments No comments

  4. Joe 1 Reputation point
    2020-07-16T00:06:19.25+00:00

    Hi Daisy,

    Thanks so much for the response and detailed info. Very helpful.

    So tested this a demo environment with a single DC. The events on the single DC are still not aligned with the "LastLogon" value

    @DSPatrick and @SSengupta-4080 the provided links are for "user" logon events "contoso\administrator", not for a computer logon.

    0 comments No comments

  5. Daisy Zhou 25,061 Reputation points Microsoft Vendor
    2020-07-16T09:11:38.07+00:00

    Hi Jeo-4025,
    How do you test it?

    I did test before in my lab:
    1.Logon one domain-joined client, and run gpupdate /force or restart machine.
    2.Then check event ID 4624 on this domain client or run the command above on DC, I can see the date/time is the time when I run gpupdate /force or restart machine.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.