Javascript must be enabled to download our products and perform other essential functions on the website.

Buy Now Download Free Trial

Active Directory Login Monitor

The Active Directory Login Monitor watches the Security Event Log and records logins to a database. It can also alert for certain login events, and run reports later to see a history of logins.

The monitor is powerful, yet simple to setup. All events get written to the database so you have full reporting capability later. To alert on specific events, check the box next to the category.

Login Event Categories

There are many types of logins and similar events that the monitor will watch. These events are grouped into the following categories:

  • Logoff
  • Logon Failed
  • Administrator Logon
  • Logon Suceeded - Interactive (Logon Type 2 - Console)
  • Logon Suceeded - Interactive - Cached Credentials (Logon Type 11)
  • Logon Suceeded - Remote Interactive (Logon Type 10 - RDP, etc)
  • Logon Suceeded - Remote Interactive - Cached Credentials (Logon Type 12 - RDP, etc)
  • Logon Suceeded - Unlock Workstation (Logon Type 7)
  • Logon Suceeded - Unlock Workstation - Cached Credentials (Logon Type 31)
  • Logon Suceeded - Network (Logon Type 3)
  • Logon Suceeded - Batch (Logon Type 4)
  • Logon Suceeded - Service (Logon Type 5)
  • Logon Suceeded - Network Clear Text (Logon Type 8)
  • Logon Successful - Different Credentials

Other Security Categories

In addition to login tracking, there are other events that are tracked that involve security, such as user and group changes, accounts and consoles locked, etc.

  • User Account Created
  • User Account Deleted
  • User Account Changed
  • User Account Enabled
  • User Account Disabled
  • User Account Locked Out
  • User Account Unlocked
  • Console Locked
  • Console Unlocked
  • User Credentials Change Success
  • User Credentials Change Failure
  • Group Created
  • Group Deleted
  • Group Changed
  • Member Added To Group
  • Member Removed From Group
  • Security Alert (DoS, replay, and IPsec events)

Configuration Options


There are some events, such as failed login attempts, that you only care about if there are a lot of them in a short amount of time (indicating some sort of break in attempt). The Suppression setting lets you configure a threshold for how many have to happen before an alert is fired.


If there are specific accounts, workstations, etc, that you don't want to be alerted about, you can exclude them, or only include specific targets. The filter text is checked against the entire Event Log Event text, so it can target any part of the event.


To see specifically which Event IDs are included in each category, scroll to the right and there is Definition column. Hover the mouse over any row to see the Event IDs in that category.

Non-Human Accounts

Windows has many types of logins, including:

  • Normal - typical user logins
  • Machine Accounts - this is when Windows itself performs a login to a different computer
  • Windows Manager/DWM - newer versions of Windows have Desktop Windows Manager that logs in along side each user
  • Anonymous Logons - usually to access publicly available resources
  • NT AUTHORITY\SYSTEM - these usually represent the operating system requesting access to local resources

By default, the non-normal login types are ignored, but you can choose to alert on them if they are of a category that is being monitored.


There are a few different types of reports available that make it easy to find out what login activity happened.

The Login Events report is especially flexible with many options for selecting the events you want to see, as shown below.

Not all fields make sense for all event types. So you would just fill in the details you care about and let the report find the appropriate events for you.

Standard Configuration Options

Like all monitors, this monitor has standard buttons on the right for Adding Actions, setting Advanced Options and setting the Monitor Schedule.

PA Server Monitor

Help Map