Event ID 4625 — Failed Logon
Event ID 4625 is logged every time a Windows account fails to authenticate. A single failure is normal, but large volumes — especially against privileged accounts or from a single source IP — indicate a brute-force or credential-stuffing attack.
MITRE ATT&CK
T1110 · Brute Force
Credential Access
Security Relevance
Repeated failed logons are one of the most reliable early indicators of a credential attack. Attackers use automated tools to spray common passwords across many accounts (password spraying) or hammer a single account repeatedly (brute force). Left undetected, these attacks can result in account compromise, lateral movement, and full domain takeover.
Example Log Entry
Log Name: Security Source: Microsoft-Windows-Security-Auditing Event ID: 4625 Level: Information An account failed to log on. Subject: Security ID: SYSTEM Account Name: DESKTOP-01$ Account For Which Logon Failed: Account Name: Administrator Account Domain: CORP Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xC000006D Sub Status: 0xC000006A Network Information: Workstation Name: ATTACKER-PC Source IP Address: 192.168.1.105
Investigation Steps
- 1.Check the volume — 5+ failures may be accidental, 20+ within 5 minutes is almost certainly automated.
- 2.Identify the target account. Attacks against Administrator, Domain Admin, or service accounts are highest risk.
- 3.Check the source IP — internal IPs may indicate lateral movement; external IPs indicate an internet-facing attack.
- 4.Look for Event ID 4624 (successful logon) shortly after a series of failures — this means the attack succeeded.
- 5.Check for Event ID 4740 (account lockout) — if lockouts are triggering, the attack volume is significant.
- 6.Review whether the source workstation is a known asset on your network.
Check your own logs for this technique — upload an EVTX file for instant detection, no account required.
Remediation
- ✓Enable account lockout policy (e.g. lock after 10 failures, reset after 30 minutes).
- ✓Enforce multi-factor authentication on all privileged accounts.
- ✓Block or geo-restrict RDP and SMB ports from the internet.
- ✓Disable the built-in Administrator account and rename it.
- ✓Review and rotate credentials for any accounts targeted in the attack.
- ✓Consider deploying a SIEM alert for 10+ failures within 5 minutes from a single source.
Related Event IDs
Related Detection Guides
Analyze your Windows Event Logs
Upload an .evtx file from servers, domain controllers, or endpoints — get instant detections, MITRE mappings, and an AI-generated triage report.
Detect this technique in your logs →