Was this page helpful?
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Audit Other Account Logon Events

Updated: June 15, 2009

Applies To: Windows 7, Windows Server 2008 R2

This security policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. Examples can include the following:

  • Remote Desktop session disconnections

  • New Remote Desktop sessions

  • Locking and unlocking a workstation

  • Invoking a screen saver

  • Dismissing a screen saver

  • Detection of a Kerberos replay attack, in which a Kerberos request with identical information was received twice

    This condition could be caused by a network misconfiguration.

  • Access to a wireless network granted to a user or computer account

  • Access to a wired 802.1x network granted to a user or computer account

Event volume: Varies, depending on system use

Default: Not configured

If this policy setting is configured, the following events are generated. The events appear on computers running Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista.


Event ID Event message


A replay attack was detected.


A session was reconnected to a Window Station.


A session was disconnected from a Window Station.


The workstation was locked.


The workstation was unlocked.


The screen saver was invoked.


The screen saver was dismissed.


The requested credentials delegation was disallowed by policy.


A request was made to authenticate to a wireless network.


A request was made to authenticate to a wired network.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft