Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2008 or higher->Security Log->Logon/Logoff->User / Device Claims->EventID 4626 - User / Device claims information.
EventID 4626 - User / Device claims information.

This event is generated when the Audit User/Device claims subcategory is configured and the user's logon token contains user/device claims information. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.

Find more information about this event on ultimatewindowssecurity.com.
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/16/2016 4:12:03 PM
Event ID:      4626
Task Category: User / Device Claims
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      DC01.contoso.local
Description:
User / Device claims information

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:   			3

New Logon:
	Security ID:		CONTOSO\dadmin
	Account Name:		dadmin
	Account Domain:		CONTOSO
	Logon ID:		0x136F7B
	Event in sequence:	1 of 1

User Claims:			ad://ext/cn:88d2b96fdb2b4c49 <%%1818> : "dadmin"
				ad://ext/Department:88d16a8edaa8c66b <%%1818> : "IT"
                        
Device Claims:			-
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Logon/Logoff
Source Microsoft-Windows-Security-Auditing
TaskCategory User / Device Claims
EventId 4626
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Task Category A name for a subclass of events within the same Event Source. TaskCategory
Level Warning, Information, Error, etc. Level
Keywords Audit Success, Audit Failure, Classic, Connection etc. Keywords
Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. Category Account Logon
Object Name -
Whom -
Object Type -
Class Name -
Security ID -
Account Name -
Account Domain -
Subject: Security ID InsertionString1 NULL SID
Subject: Account Name InsertionString2 -
Subject: Account Domain InsertionString3 -
Subject: Logon ID InsertionString4 0x0
New Logon: Security ID InsertionString5 CONTOSO\dadmin
New Logon: Account Name InsertionString6 dadmin
New Logon: Account Domain InsertionString7 CONTOSO
New Logon: Logon ID InsertionString8 0x136F7B
Event in Sequence Multiple events are generated if the group membership information cannot fit in a single security audit event InsertionString10 1
Sequence Length Multiple events are generated if the group membership information cannot fit in a single security audit event InsertionString11 2
User Claims A list of user claims for new logon session InsertionString12 ad://ext/cn:88d2b96fdb2b4c49 <%%1818> : "dadmin"
Device Claims A list of device claims for new logon session InsertionString13 -
Comments
You must be logged in to comment