5633(S, F): A request was made to authenticate to a wired network.

Applies to

  • Windows 10
  • Windows Server 2016
Event 5633 illustration

Subcategory: Audit Other Logon/Logoff Events

Event Description:

This event generates when 802.1x authentication attempt was made for wired network.

It typically generates when network adapter connects to new wired network.

Note  For recommendations, see Security Monitoring Recommendations for this event.

Event XML:

- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
- <System>
 <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /> 
 <TimeCreated SystemTime="2015-11-11T01:26:59.679232500Z" /> 
 <Correlation /> 
 <Execution ProcessID="500" ThreadID="2920" /> 
 <Security /> 
- <EventData>
 <Data Name="InterfaceName">Microsoft Hyper-V Network Adapter</Data> 
 <Data Name="Identity">-</Data> 
 <Data Name="SubjectUserName">-</Data> 
 <Data Name="SubjectDomainName">-</Data> 
 <Data Name="SubjectLogonId">0x0</Data> 
 <Data Name="ReasonCode">0x70003</Data> 
 <Data Name="ReasonText">The network does not support authentication</Data> 
 <Data Name="ErrorCode">0x0</Data> 

Required Server Roles: None.

Minimum OS Version: Windows Server 2008, Windows Vista.

Event Versions: 0.

Field Descriptions:


  • Security ID [Type = UnicodeString]: User Principal Name (UPN) of account for which 802.1x authentication request was made.

Note  User principal name (UPN) format is used to specify an Internet-style name, such as UserName@Example.Microsoft.com.

  • Account Name [Type = UnicodeString]: the name of the account for which 802.1x authentication request was made.

  • Account Domain [Type = UnicodeString]: subject’s domain or computer name. Formats vary, and include the following:

    • Domain NETBIOS name example: CONTOSO

    • Lowercase full domain name: contoso.local

    • Uppercase full domain name: CONTOSO.LOCAL

    • For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.

    • For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.

  • Logon ID [Type = HexInt64]: hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “4624: An account was successfully logged on.”


  • Name [Type = UnicodeString]: the name (description) of network interface which was used for authentication request. You can get the list of all available network adapters using “ipconfig /all” command. See “Description” row for every network adapter:
Ipconfig command illustration

Additional Information:

Security Monitoring Recommendations

For 5633(S, F): A request was made to authenticate to a wired network.

  • There is no recommendation for this event in this document.