Event ID 4625 represents one of the most critical security events in Windows logging infrastructure. Generated by the Microsoft-Windows-Security-Auditing provider, this event captures comprehensive details about every failed authentication attempt on the system. The event structure includes over 20 fields providing forensic-quality information about the failed logon attempt.
The event triggers for multiple logon types: interactive desktop logons (Type 2), network logons (Type 3), batch logons (Type 4), service logons (Type 5), and remote desktop sessions (Type 10). Each logon type provides different context clues about the attack vector or authentication issue. Network logons often indicate lateral movement attempts, while interactive logons suggest physical or console access attempts.
Windows 2026 updates have enhanced 4625 events with improved source IP tracking and better integration with Windows Defender for Endpoint. The failure reason codes have been expanded to provide more granular detail about authentication failures, particularly for cloud-hybrid scenarios and certificate-based authentication failures.
The event's Sub Status field contains specific error codes that map to exact failure reasons: 0xC0000064 (user name does not exist), 0xC000006A (incorrect password), 0xC0000072 (account disabled), and 0xC0000193 (account expired). These codes enable automated response systems to differentiate between credential attacks and legitimate account issues.




