Event ID 4779 represents a fundamental component of Windows security auditing, specifically designed to track Terminal Services session disconnections. When a user's RDP session terminates—whether through network issues, deliberate disconnection, or administrative action—Windows logs this event to maintain a comprehensive audit trail of remote access activities.
The event structure includes critical forensic data: the target user account (both name and SID), the source network address, session ID, and logon ID that correlates with the original logon event. This correlation capability allows administrators to construct complete timelines of user activity from initial connection through disconnection.
Windows generates 4779 events on multiple systems simultaneously. The target server hosting the RDP session logs the event locally, while domain controllers record the event as part of centralized security auditing. This distributed logging ensures redundancy and provides multiple investigation paths during security incidents.
The event's significance extends beyond simple connection tracking. Security teams rely on 4779 patterns to identify suspicious behavior, such as rapid connection cycling, unusual access times, or connections from unexpected network locations. Combined with other security events, 4779 data helps construct comprehensive user behavior baselines and detect anomalous activities that might indicate compromised accounts or insider threats.