Hello Readers,
Last week’s Sunday Funday challenge had me asking you all to test Windows Hello and discover what traces it leaves behind after authentication. Since the community couldn’t pinpoint the answer, I decided to dive in and do the testing myself.
Part 1: Facial Recognition
I started by focusing on the aspect that interests me most—facial recognition. Why facial recognition because it would indicate whose face was being presented and in theory who is actually at the keyboard. I purchased a Windows Hello-capable webcam that uses a facial scan for authentication. After installing it, I rebooted my computer, logged in using the facial scan, and then locked and unlocked the computer with Windows Hello.
Digging Into the Event Logs
First, I checked the Security Event Log. As expected, I found several Event ID 4624 entries. However, these only showed “Type 11 (cached credentials)”—there was no mention of Windows Hello or the facial scan being used for authentication.
After some research, I discovered a custom Microsoft log called Microsoft-Windows-Biometrics/Operational. There, I found Event ID 1605, which read:
"The Windows Biometric Service secure component successfully authorized user (domain)<user>"
This confirmed that biometric authentication had taken place, but it didn’t specify which method was used. Looking two events earlier, I found Event ID 1019, which provided the missing details:
"The Windows Biometric Service completed a privileged vendor-specific operation for sensor: Facial Recognition (Windows Hello) Software Device (ROOT\WINDOWSHELLOFACESOFTWAREDRIVER\0000).
The command was directed to the biometric unit's 'Sensor Adapter' component."
This closed the loop for me. I now know exactly which biometric device was used, which user was authenticated, and that the login was successful—all thanks to facial recognition.
Stay tuned for the next part, where I’ll explore PIN-based logins and what they leave behind!