Windows Authentication Failure Analysis

AuthenticationAttacks Windows Security Authentication Failure

What This Means

Comprehensive guide to analyzing Windows authentication failures across NTLM, Kerberos, and local logon. Detect attacks and troubleshoot legitimate access issues with structured investigation.

Example Log

An account failed to log on.
Logon Type: 2
Account Name: jsmith
Failure Reason: The user has not been granted the requested logon type at this machine.
Status: 0xC000015B

Indicators of Suspicious Activity

How to Investigate

  1. Categorize failures by protocol (NTLM, Kerberos, local) and Logon Type
  2. Identify the most targeted accounts and determine their sensitivity level
  3. Check the Status and Sub Status codes for the specific failure reason
  4. Determine if failures are internal (misconfiguration) or external (attack)
  5. Review Group Policy logon right assignments for affected accounts
  6. Correlate with successful logons to find the failure-to-success ratio

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

What are the main Windows authentication protocols?
Windows uses NTLM (legacy, logged as Event 4776), Kerberos (Active Directory, logged as Events 4768/4769/4771), and local SAM authentication. Each protocol has different failure events and investigation approaches.
How do I determine the root cause of authentication failures?
Check the Status and Sub Status codes in Event 4625. 0xC000006D = bad username/password, 0xC000006E = account restriction, 0xC0000234 = account locked, 0xC0000072 = account disabled.
Should I alert on all authentication failures?
No — some failures are normal (typos, expired passwords). Alert on patterns: more than 10 failures per account per hour, failures against privileged accounts, and failures from unexpected IPs.