From ac9e4b7ad14379d5d474d59313a8e8084e5595d4 Mon Sep 17 00:00:00 2001 From: Arjun S Date: Thu, 28 Jun 2018 15:58:02 +0530 Subject: [PATCH] Update event-4624.md --- windows/security/threat-protection/auditing/event-4624.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/auditing/event-4624.md b/windows/security/threat-protection/auditing/event-4624.md index 5fb9a858c9..bb4d0dfde8 100644 --- a/windows/security/threat-protection/auditing/event-4624.md +++ b/windows/security/threat-protection/auditing/event-4624.md @@ -214,7 +214,7 @@ This event generates when a logon session is created (on destination machine). I **Process Information:** -- **Caller Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted the logon. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column): +- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process that attempted the logon. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column): Task manager illustration @@ -222,7 +222,7 @@ This event generates when a logon session is created (on destination machine). I You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**. -- **Caller Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process. +- **Process Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process. **Network Information:**