Logon Logoff Event: 4655

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Logon Logoff » Logon Logoff Event: 4655

Event ID 4655 – An IPsec Main Mode Security Association Ended

Event ID 4655
Category Logon/Logoff
Sub-Category Audit IPsec Main Mode
Description An IPsec Main Mode security association ended.

Events generated by the Authenticated Internet Protocol (AuthIP) and the Internet Key Exchange protocol (IKE) during Main Mode negotiations are audited by the codes which fall under Audit IPsec Main Mode subcategory. Event 4655 falls under this category.

Example of 4655 log:

An IPsec QUick Mode negotiation failed.

 

Local Network Address: %1

Remote Network Address: %2

Keying Module Name: %3

Main Mode SA ID: %4

Why does event ID 4655 need to be monitored?

  • Security events which fall under the Audit IPsec Main Mode subcategory are monitored primarily for IPsec Main Mode troubleshooting.

Pro Tip:

With in-depth reports, real-time alerts, and graphical displays, ADAudit Plus tracks all IPsec security associations, helping you meet your security, operational, and compliance needs with absolute ease.

Event 4655 applies to the following operating systems:

  • Windows 10
  • Windows Server 2016