Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Logon/Logoff->Logoff->EventID 4647 - User initiated logoff.
EventID 4647 - User initiated logoff.

Indicates that a user that had logged on interactively (type 2) or by terminal services has started the logoff process.

This event means that the system started erasing from memory user's primary access token, which contains the user's security information and allows access to objects. After this token is erased, the user cannot access resources such as files or registry keys. When the logoff process (erasure) is completed, a Security 4634 message appears in Event Viewer.

If a Security 4634 message does not appear shortly after the Security 4647 message, a program or service might not be managing its access tokens correctly. Although the user cannot access objects, the program or service might have cached an access token and therefore retained the ability to access objects. Another reason for the event 4634 not appearing may be that the system shut down before the process could complete.

Find more information about this event on ultimatewindowssecurity.com.

Corresponding events on other OS versions:


Windows 2003

 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
User initiated logoff:
Subject:
	Security ID:		S-1-5-21-1135140816-2109348461-2107143693-500
	Account Name:		Administrator
	Account Domain:		LOGISTICS
	Logon ID:		0x1806d9
This event is generated when a logoff is initiated but the token reference count is not zero and the logon session cannot be destroyed.  No further user-initiated activity can occur.  This event can be interpreted as a logoff event.
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Logon/Logoff
Source Microsoft-Windows-Security-Auditing
TaskCategory Logoff
EventId 4647
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom -
Object Type -
Class Name -
Security ID -
Account Name -
Account Domain -
Subject: Security ID Security ID of the account that performed the action. Usually resolved to Domain\Name in home environment. InsertionString1 S-1-5-18
Subject: Account Name Name of the account that initiated the action. InsertionString2 DCC1$
Subject: Account Domain Name of the domain that account initiating the action belongs to. InsertionString3 LOGISTICS
Subject: Logon ID A number uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session. InsertionString4 0x1806d9
Comments
You must be logged in to comment