How to Check Windows Event Logs for Signs of Unauthorized Access
Use Event Viewer to spot login abuse, policy changes, and suspicious activity, and let Kudu help with security review.
By the Kudu Team
Fix this automatically with Kudu
Run a free system scan to detect and resolve this issue automatically — no manual steps required.
Download Kudu Free →What Causes This?
Signs of unauthorized access usually appear in Windows Event Logs after someone successfully signs in, repeatedly fails sign-in attempts, changes account settings, or modifies security policies. These events can come from a real attacker, malware using stolen credentials, or even a legitimate user account being misused. In many cases, the problem starts with weak passwords, exposed remote access, reused credentials, or a device that has not been reviewed for suspicious account activity.
Common Symptoms
- You notice login attempts at unusual times
- Your account gets locked out or shows repeated failed sign-ins
- Security settings, user accounts, or audit policies change unexpectedly
- Remote Desktop or network logins appear that you do not recognize
- Event Viewer shows frequent security warnings or account management events
How to Fix It Manually
-
Open Event Viewer and go to the Security log.
- Press
Win + S, typeEvent Viewer, and open it. - In the left pane, expand
Windows Logs. - Click
Security.
- Press
-
Filter the log for important sign-in and account events.
- In the right pane, click
Filter Current Log. - In
Event IDs, enter:4624, 4625, 4634, 4648, 4672, 4720, 4726, 4732, 4738, 4719 - Click
OK. - These IDs help you spot successful logins, failed logins, logoffs, explicit credential use, admin-level access, user account creation/deletion, group membership changes, account changes, and audit policy changes.
- In the right pane, click
-
Review suspicious login events closely.
- Double-click an event such as
4624or4625. - Check fields like
Account Name,Logon Type,Source Network Address,Workstation Name, andTime Created. - Pay attention to:
Logon Type 10for Remote DesktopLogon Type 3for network access- Repeated
4625failures from the same IP or account 4672events showing elevated privileges assigned at logon
- Double-click an event such as
-
Look for account and policy changes.
- In the filtered Security log, review:
4720for a user account created4726for a user account deleted4732for a user added to a privileged group4738for account changes4719for audit policy changes
- If you see these events and did not make the change, treat them as suspicious.
- In the filtered Security log, review:
-
Check related logs for supporting evidence.
- In Event Viewer, expand
Applications and Services Logs>Microsoft>Windows. - Review logs such as
TerminalServices-LocalSessionManagerandRemoteDesktopServices-RdpCoreTSif you suspect Remote Desktop access. - Compare timestamps with Security log events to confirm what happened and when.
- In Event Viewer, expand
-
Secure the PC if you find suspicious activity.
- Disconnect the PC from the internet if active abuse is ongoing.
- Change passwords for affected Windows, Microsoft, email, and admin accounts.
- Disable Remote Desktop if you do not use it: press
Win + I>System>Remote Desktop> turn itOff. - Remove unknown accounts: press
Win + R, typelusrmgr.msc, and checkUsersandGroupsif your Windows edition supports it. - Run a full Windows Security scan: open
Windows Security>Virus & threat protection>Scan options>Full scan.
-
Save evidence for later review.
- In Event Viewer, right-click
Securityand chooseSave All Events As. - Save the log file before clearing anything so you can review it later or share it with IT support.
- In Event Viewer, right-click
Fix It Automatically with Kudu
Kudu can help review Windows security settings, spot risky configuration changes, and surface problems that may point to unauthorized access without making you dig through Event Viewer alone. It gives you a faster way to catch weak points, clean up unsafe settings, and improve your PC’s overall security posture.
Fix this automatically with Kudu
Run a free system scan to detect and resolve this issue automatically — no manual steps required.
Download Kudu Free →Related guides
How to Check Open Listening Ports on Windows and Close Unneeded Ones
Find apps listening on network ports with netstat and shut down unnecessary ones; Kudu can help track suspicious activity.
How to Check the Windows Security Health Report for Missed Issues
Review Windows Security for overlooked warnings and protection gaps, and use Kudu to help surface problems quickly.
How to Block Camera Access on Windows Globally and Per App
Protect your privacy by disabling webcam access system-wide or for specific apps, with Kudu helping review permissions.
How to Block Location Access on Windows Globally and Per App
Prevent apps and Windows services from using your location data, with Kudu helping you lock down device privacy.