Event ID 4624 Logon Type 11: Explaining Phantom Logons in Windows
Finding a "Successful Logon" entry in your Windows Event Viewer for a time when you were physically away from your computer can be alarming. When Event ID 4624 is paired with Logon Type 11, it specifically indicates a Cached Interactive logon. This does not always mean an intruder is at your keyboard; rather, it often points to how Windows handles credentials when a domain controller is unavailable or when specific automated tasks are triggered using your saved profile. This guide deciphers the technical "fingerprints" of Type 11 logons to help you distinguish between routine system behavior and unauthorized access.
Table of Content
- Purpose of Monitoring Logon Types
- Common Use Cases
- Step by Step: Analyzing the Event
- Best Results for Security Auditing
- FAQ
- Disclaimer
Purpose
The primary purpose of investigating Logon Type 11 is to verify Credential Authenticity. In a standard office environment, your PC usually contacts a Domain Controller (DC) to verify your password. If the DC is unreachable (e.g., you are working from home without a VPN, or the server is down), Windows uses a "Cached" version of your credentials to let you in. However, because this logon type is also associated with Task Scheduler and Workstation Unlocks, understanding the "Source Network Address" and "Process Name" within the event is vital for confirming that the activity was a legitimate background system process.
Use Case
You should analyze Logon Type 11 events when:
- After-Hours Activity: Your security logs show your account logged in at 3:00 AM while the PC was supposedly locked.
- Remote Work Syncing: You notice logons occurring while your laptop is disconnected from the corporate network.
- Automated Scripting: You have scheduled tasks or backups that require your user permissions to execute.
- Forensic Investigation: You need to determine if a user bypassed network authentication by using local cached data.
Step by Step
Locate the Specific Event
Open Event Viewer (eventvwr.msc), navigate to Windows Logs > Security, and use the "Filter Current Log" option to search for ID 4624.
Verify the Logon Type
Scroll down to the "Logon Information" section of the event description. Look for Logon Type: 11. If it were a physical person at the desk, you would typically see Type 2 (Interactive) or Type 7 (Unlock).
Check the Subject and Target Account
Ensure the TargetUserName matches your account. Then, look at the Logon ID. This unique hex value can be used to link this logon to other events, like 4672 (Special Privileges assigned).
Investigate the Source Network Address
Check the Source Network Address. If it is 127.0.0.1 or -, the logon was local to the machine. If it shows an external IP you don't recognize, this is a red flag for unauthorized remote access.
Examine the Process Information
Look for Process Name. Common legitimate processes include:
C:\Windows\System32\lsass.exe(Local Security Authority)C:\Windows\System32\winlogon.exe(Standard Login)C:\Windows\System32\svchost.exe(System Services)
Best Results
| Element | Standard Value | Security Significance |
|---|---|---|
| Logon Type | 11 (Cached Interactive) | Indicates DC was bypassed/unavailable. |
| Source Address | 127.0.0.1 / Localhost | Confirms the activity originated locally. |
| Workstation Name | Your PC Name | Verifies which hardware processed the key. |
FAQ
Why is it called "Cached" Interactive?
Windows stores a hash of your password locally. Type 11 occurs when the system uses this hash to verify you because the "Master" database (the Domain Controller) cannot be reached. It essentially means "I logged you in based on what I remembered about you."
Can a scheduled task trigger Type 11?
Yes. If a task is set to "Run only when user is logged on" or "Run with highest privileges" and the network is down, the Task Scheduler may invoke a Type 11 logon to start the process using your cached profile.
Is Logon Type 11 dangerous?
Not inherently. It is very common on laptops. However, if you see Type 11 logons for an account that has never logged into that specific computer before, it could indicate a credential harvesting attack or "Pass-the-Hash" attempt.
Disclaimer
Event logs can be complex and sometimes misleading due to system "noise." A single Event 4624 is rarely enough to prove a security breach without correlating events like 4625 (Failed Logons) or 4648 (Explicit Credentials). This guide applies to Windows 10, Windows 11, and Windows Server environments as of 2026. If you suspect an active breach, disconnect the machine from the network and consult an IT security professional.
Tags: EventViewer, WindowsSecurity, EventID4624, Cybersecurity
