Windows System Event: 4611

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on his Active Directory. This helps him identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Account Management » Windows System Event: 4611

Event ID 4611- A trusted logon process has registered with the Local Security Authority.

Description A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests.
Category System

Information:

  • The part of the operating system which handles the overall logon function for different logon methods is the Local Security Authority.
  • It includes incoming RAS connections, RunAs, interactive logons initiated by Ctrl+Alt+Del, and network logons.

The event logs the following information:

Logon process name

Event 4611 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10

Corresponding event in Windows Server 2003 and earlier versions - Event 515

Explore Active Directory auditing and reporting with ADAudit Plus.

  • Enter your email id
    Please enter a valid email id
  • Enter your phone number
  • Select demo date
  •  
  • By clicking 'Schedule a personalized demo', you agree to processing of personal data according to the Privacy Policy. You can unsubscribe from our mails at anytime.
Account Management Auditing
Active Directory Auditing
Windows Server Auditing