Embedded Technology Guide Tech How to Check User Login History in Windows Server 2016

How to Check User Login History in Windows Server 2016


How to Check User Login History in Windows Server 2016

One of the essential tasks for system administrators is to keep track of user logins on a Windows Server 2016. By monitoring user login history, administrators can detect any unauthorized access or suspicious activity on the server. In this article, we will discuss how to check user login history in Windows Server 2016, along with some frequently asked questions.

To check user login history, follow these steps:

1. Open the Event Viewer: Press the Windows key + R, then type “eventvwr.msc” and hit Enter.
2. Navigate to the Security Logs: Expand the “Windows Logs” folder, then click on “Security.”
3. Filter the Log: Right-click on the “Security” log and select “Filter Current Log.”
4. Insert the Filter Parameters: In the “Filter” tab, select the “Event sources” drop-down menu and choose “Microsoft Windows security auditing.” Then, in the “Event IDs” field, enter “4624” (for successful logins) or “4625” (for failed logins).
5. Apply the Filter: Click on “OK” to apply the filter.
6. View User Login History: The filtered results will display the user login events. You can view the details by clicking on each event.


1. Can I check the user login history remotely?
Yes, you can access the Event Viewer on a remote Windows Server 2016 by connecting to it using Remote Desktop Protocol (RDP) or using the Computer Management console.

2. How long are the user login events stored in the event logs?
By default, Windows Server 2016 stores user login events in the event logs for 30 days. However, you can configure the log retention period as per your requirements.

See also  How to Move All Apps to SD Card Galaxy S5

3. Can I export the user login history to a file?
Yes, you can export the user login events to a CSV or XML file by right-clicking on the event logs and selecting “Save All Events As.”

4. Can I track user login history for specific user accounts only?
Yes, you can filter the user login events by entering the username in the “User” field in the Event Viewer’s filter options.

5. How can I receive notifications for user logins?
You can configure Windows Server 2016 to send email notifications for specific event IDs, including successful or failed user logins, using third-party monitoring tools or PowerShell scripts.

6. Can I check user login history for past dates?
Yes, you can modify the filter in the Event Viewer to specify a specific date or date range to view user login events for past dates.

7. Is it possible to automatically delete user login events after a certain period?
Yes, you can configure the event logs to automatically clear older events by setting up log retention policies in Windows Server 2016.

In conclusion, monitoring user login history is crucial for maintaining the security of a Windows Server 2016. By following the steps mentioned above, administrators can easily check user login events and identify any unauthorized access or suspicious activity.