Windows Security Log Event ID 5380

Operating Systems Windows Server 2019
Category
 • Subcategory
System
 • Other System Events
Type Success
Corresponding events
in Windows 2003
and before
 
Discussions on Event ID 5380

5380: Vault Find Credential

On this page

This event is new in Windows Server 2019. This event occurs when a user finds stored vault credentials.

Free Security Log Resources by Randy

Description Fields in 5380

Subject:

The user and logon session that performed the action.

  • Security ID:  The SID of the account.
  • Account Name: The account logon name.
  • Account Domain: The domain or - in the case of local accounts - computer name.
  • Logon ID is a semi-unique (unique between reboots) number that identifies the logon session.  Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session.

Supercharger Free Edition


Supercharger's built-in Xpath filters leave the noise behind.

Free.

 

Examples of 5380

 Subject:

Security ID: %1
Account Name: %2
Account Domain: %3
Logon ID: %4
 
This event occurs when a user finds stored vault credentials.

Keep me up-to-date on the Windows Security Log.
Email*:
*We will NOT share this

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection



 

Additional Resources