Windows Event ID 6279 represents the destruction of a user logon session and is generated by the WinLogon process whenever a user session terminates. This event serves as the counterpart to logon events, providing a complete audit trail of user session lifecycle from creation to destruction. The event is logged in the Security event log and requires proper audit policy configuration to appear.
The event contains several critical data fields including the Security ID (SID) of the user whose session was destroyed, the Logon ID that uniquely identifies the session, the session name, and the logon type that indicates how the user originally authenticated. Additional context includes the source network address for remote sessions and the authentication package used during the original logon process.
Session destruction can occur through various mechanisms: normal user-initiated logoff, administrative session termination, automatic timeout due to inactivity policies, system shutdown or restart, remote desktop disconnection, or forced termination due to security policies. Each scenario provides valuable forensic information for security analysis and compliance reporting.
In Windows Server environments, particularly those running Remote Desktop Services or Citrix, Event ID 6279 becomes especially important for tracking concurrent user sessions and ensuring proper license compliance. The event helps administrators understand session utilization patterns and identify potential issues with session cleanup processes.