Event ID 552 – Logon attempt using explicit credentials
Event ID | 552 |
Category | Logon/Logoff |
Type | Success Audit |
Description | Successful logon attempt using explicit credentials |
When a user who is already logged on (successfully) creates another logon session with a different set of user credentials, event 552 is generated. The field "logged on user" provides the original user account details, while the "user whose credentials were used" field gives the new user account details.
This log data provides the following information:
- Logged on user
- User Name
- Domain
- Logon ID
- Logon GUID
- User whose credentials were used
- Target User Name
- Target Domain
- Target Logon GUID
- Target Server Name
- Target Server Info
- Caller Process ID
- Source Network Address
- Source Port
Why does event ID 552 need to be monitored?
- To prevent privilege abuse
- To detect abnormal and potentially malicious activity
- To get information on user activity (like user attendance and peak logoff times)
- To ensure compliance with regulatory mandates
Pro Tip:
With in-depth reports, real-time alerts, and graphical displays, ADAudit Plus tracks all logon attempts, helping you meet your security, operational, and compliance needs with absolute ease.
Event 552 applies to the following operating systems:
- Windows Server 2000
- Windows 2003 and XP
Corresponding event ID in Windows 2008 and Windows Vista is 4648.
Explore Active Directory auditing and reporting with ADAudit Plus.
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Self-Service Password Management
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools