Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 4648 Source: Microsoft-Windows-Security-Auditing

A logon was attempted using explicit credentials.

Security ID: S-1-5-18
Account Name: AGWIN7$
Account Domain: WORKGROUP
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:
Account Name: AG
Account Domain: AGWIN7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Target Server:
Target Server Name: localhost
Additional Information: localhost

Process Information:
Process ID: 0x42c
Process Name: C:\Windows\System32\winlogon.exe

Network Information:
Network Address:
Port: 0

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
This event indicates a successful login by an application (it can be a process, a batch file, a script, the user mapping a drive to a remote share) using a different account from the one currently logged in. Opening an elevated command-line prompt and running commands from it that interact with the domain, would also trigger this event.
UWS4648 provides a description of the various fields recorded in this event.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.