Getting Data In

How can I identify login and logoff times for users using Windows Security Event-IDs 4624 and 4634?

New Member

I want to identify the login and logouts for each user on a server.
I use the event_id 4624 (logon) and 4634(logoff). the problem is that Windows generates multiple events for only one login/logoff.
It seems that they share the same login_id.
so I try something like:

host="server a" user="allice" (EventCode=4624 OR EventCode=4624 )

now I need something like:

| where login_id= login_id

So that I get only 2 events for one login/logoff , but for all users and over time 🙂

Thanks for reading.

0 Karma

Ultra Champion

Are you sure your not seeing multiple events for logintype3 or logintype4 which are network or service logons - its quite conceivable you would see lots of these during login (and use) as you system downloads profiles/maps drives etc.

If you restrict your search to LoginType2 (interactive) you may have more concise results.
I am not near Splunk at the moment, so this may not work off the hop, but this might get you closer.

((EventCode=4624 (Logon_Type=2 OR login_Type=7 OR Login_Type=10)) OR (EventCode=4634 OR EventCode=4647) )|transaction user, host startswith="EventCode=4624"

edited to include loging type7 (unlock) and 10 (remote desktop)

If my comment helps, please give it a thumbs up!
0 Karma


Hi @Aufex,

Can you please try this?

    host="server a" user="allice" (EventCode=4624 OR EventCode=4634)  | dedup EventCode,user

EDIT: If above query works then remove user="allice" from above query so it will give you result for all users who login/logoff in server a

0 Karma
*NEW* Splunk Love Promo!
Snag a $25 Visa Gift Card for Giving Your Review!

It's another Splunk Love Special! For a limited time, you can review one of our select Splunk products through Gartner Peer Insights and receive a $25 Visa gift card!


Or Learn More in Our Blog >>