This lab demonstrates how to investigate failed authentication attempts using Windows Event Viewer.
Security teams monitor Event ID 4625 to detect brute force attacks, credential guessing attempts, and unauthorized login activity.
Multiple failed login attempts were generated on a Windows system.
The goal of this investigation was to:
• Identify failed authentication events
• Analyze login attempt details
• Understand how security logs record authentication failures
- Windows Event Viewer
- Windows Security Logs
Open Event Viewer and navigate to:
Windows Logs → Security
Screenshot:
Filter the security log to show only failed logon attempts.
Event ID:
4625
Screenshot:
The filtered results show multiple failed authentication attempts recorded by the system.
Screenshot:
Event details reveal important authentication information such as:
- Source Network Address
- Authentication Package
- Logon Process
- Account Domain
Screenshot:
-
Event ID 4625 represents a failed logon attempt
-
Security logs capture detailed authentication information
-
Failed login events can indicate:
- brute force attacks
- credential guessing attempts
- unauthorized login activity
Monitoring Event ID 4625 helps security teams detect potential attacks and investigate suspicious login behavior within an environment.



