Windows Security Log Event ID 552

Operating Systems Windows 2003 and XP
CategoryLogon/Logoff
Type Success
Corresponding events
in Windows 2008
and Vista
4648  

552: Logon attempt using explicit credentials

On this page

Event 552 is logged when a process logs on as a different account such as when the Scheduled Tasks service starts a task as the specified user. Logged on user: specifies the original user account.

User whose credentials were used: specifies the new user account. Caller process ID: the process that performed this action. Look for a prior event 592 with the same process id. Target Server Name and Info have always been observed as "local host" and source network address and port as empty.

Free Security Log Resources by Randy

Description Fields in 552

  • Logged on user:
  • User Name:
  • Domain:
  • Logon ID:
  • Logon GUID:
  • User whose credentials were used:
  • Target User Name:
  • Target Domain: MTG
  • Target Logon GUID:
  • Target Server Name:
  • Target Server Info:
  • Caller Process ID:
  • Source Network Address:
  • Source Port:

Supercharger Enterprise


 

Examples of 552

Logon attempt using explicit credentials:

Logged on user:
User Name: MTG1$
Domain: MTG
Logon ID: (0x0,0x3E7)
Logon GUID: -

User whose credentials were used:
Target User Name: bozo
Target Domain: MTG
Target Logon GUID: {8e3681a4-23bd-54ef-89bb-20b3b12e3512}
Target Server Name: localhost
Target Server Info: localhost
Caller Process ID: 960
Source Network Address: -
Source Port: -

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection

 

Additional Resources

    Go To Event ID:

    Security Log
    Quick Reference
    Chart
    Download now!