I am getting excessive User Account Management Event ID 5379 on startup

This causes all user activity to be prevented on start-up. This takes minutes to clear before user programs will run.

No viruses or disk activity problems found. But disc activity sometimes exceeds 100%!

Event log finds excessive continuous Event ID 5379.

Log is as follow and continues as long as Computer is operational

Credential Manager credentials were read.

Subject:

Security ID: DELL-LAPTOP\stephen

Account Name: stephen

Account Domain: DELL-LAPTOP

Logon ID: 0x15BDD8E7

Read Operation: Enumerate Credentials

Hello, thank you for reaching out to the Microsoft Community. I am here to help and provide assistance with any questions or concerns you may have.

Another user suggested proceeding by deactivating all the tasks in the Task Scheduler.

You can refer to this post, that it's very similar to yours: https://answers.microsoft.com/en-us/windows/for...

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

No, I tried deleting all the scheduled events (99 under Microsoft alone!).

Still I get the pop-ups, instead of running the program, when I press the tool bar icon twice.

I am also getting a lot of googledrivefs31092 installed under system events.

Here is the security event log partial for today.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Do you currently have Google Drive software installed on your computer? This could potentially be contributing to some performance slowdowns, especially if it's frequently backing up data.

Given that the event IDs you're encountering are similar to what I observe on my own computer, albeit not as numerous, it suggests that continuous authentication by Windows or Microsoft software is a regular occurrence. This behavior may be associated with services like OneDrive or various Microsoft Office components.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

I do not use Google drive as a backup. But I have recently created it and use it offline.

In fact I do not use Microsoft backup either.

Microsoft may have made some changes to their security, but I do not use an online account to login, I use a local account as the internet is not always available.

The Pop-ups have been around for about a year, preventing me from starting any programs manually.

It usually takes several attempts to get a program to start.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

What about the User Account Control(UAC) settings? Sometimes, excessive UAC prompts can slow down system startup.

Additionally, consider removing startup applications or performing a clean startup of your system to see if the problem lingers. From my perspective, even if this behavior is considered normal or anticipated, the quantity of events could be attributed to software that interacts with the authentication process.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Already done. Only minimal operations allowed, rest are manually run , not on startup.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

I checked something on my system, I went to the Credential Manager and removed all credentials leaving essentials, this lowered the audit event, you can try it as well:

1. Go to the Windows Control Panel.
2. Search for "Credential Manager" and open it.

You can either disable Credential Manager or review and delete any stored credentials that are no longer needed.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

I have done as you said and deleted non-essential required certificates.

I have two pictures before and after, but it made no difference!

But these events precede the avalanche of 5379's.

Here is the event logs for login and special login

Both are Microsoft Security events.

Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 03/11/2023 08:26:34 Event ID: 4624 Task Category: Logon Level: Information Keywords: Audit Success User: N/A Computer: Dell-Laptop Description: An account was successfully logged on. Subject: Security ID: SYSTEM Account Name: DELL-LAPTOP$ Account Domain: WORKGROUP Logon ID: 0x3E7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: No Elevated Token: Yes Impersonation Level: Impersonation New Logon: Security ID: SYSTEM Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3E7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested. Event Xml: http://schemas.microsoft.com/win/2004/08/events/event"> 4624 2 0 12544 0 0x8020000000000000 660793 Security Dell-Laptop S-1-5-18 DELL-LAPTOP$ WORKGROUP 0x3e7 S-1-5-18 SYSTEM NT AUTHORITY 0x3e7 5 Advapi Negotiate - {00000000-0000-0000-0000-000000000000} - - 0 0x278 C:\Windows\System32\services.exe - - %%1833 - - - %%1843 0x0 %%1842 Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 03/11/2023 08:26:34 Event ID: 4672 Task Category: Special Logon Level: Information Keywords: Audit Success User: N/A Computer: Dell-Laptop Description: Special privileges assigned to new logon. Subject: Security ID: SYSTEM Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3E7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege Event Xml: http://schemas.microsoft.com/win/2004/08/events/event"> 4672 0 0 12548 0 0x8020000000000000 660794 Security Dell-Laptop S-1-5-18 SYSTEM NT AUTHORITY 0x3e7 SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Thank you for the update, Steven. After you've gone through all the mentioned steps, are you still encountering delays when restarting your computer?

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Yes,

I am still having the same problem with what looks like Microsoft Defender logins causing the problem.

No solution so far.

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

 
 

Question Info


Last updated May 16, 2024 Views 1,687 Applies to: