Event ID 4634 represents a fundamental component of Windows security auditing infrastructure. When a user session terminates, Windows Security Auditing subsystem generates this event to maintain comprehensive audit trails of user activities. The event captures the moment when authentication tokens are invalidated and user sessions are formally closed.
The event structure includes several key fields: Subject Security ID identifies the account being logged off, Logon Type indicates how the user originally authenticated (interactive, network, service, etc.), and Logon ID provides a unique session identifier that correlates with the corresponding 4624 logon event. This correlation capability makes 4634 events invaluable for session duration analysis and security investigations.
In enterprise environments, 4634 events generate significant log volume, especially on terminal servers and domain controllers. The event fires for both successful and forced logoffs, including those triggered by Group Policy settings, administrative actions, or system shutdowns. Modern Windows versions in 2026 have enhanced the event with additional context fields for cloud-integrated scenarios and hybrid identity environments.
Security teams use 4634 events to detect anomalous logoff patterns, such as unusually short sessions that might indicate automated attacks or compromised accounts. The event also supports compliance requirements for tracking user access duration and maintaining detailed audit logs for regulatory purposes.



