News and blog
NXLog main page
  • Products
    NXLog Platform
    Log collection
    Log management and analytics
    Log storage
    NXLog Community Edition
    Integrations
    Professional Services
  • Solutions
    Use cases
    Specific OS support
    SCADA/ICS
    Windows event log
    DNS logging
    MacOS logging
    Solutions by industry
    Financial Services
    Government & Education
    Entertainment & Gambling
    Telecommunications
    Medical & Healthcare
    Military & Defense
    Law Firms & Legal Counsel
    Industrial & Manufacturing
  • Plans
  • Partners
    Find a Reseller
    Partner Program
  • Resources
    Documentation
    Blog
    White papers
    Videos
    Webinars
    Case Studies
    Community Program
    Community Forum
  • About
    Company
    Careers
  • Support
    Support portals
    Contact us

NXLog Platform
Log collection
Log management and analytics
Log storage
NXLog Community Edition
Integrations
Professional Services

Use Cases
Specific OS support
SCADA/ICS
Windows event log
DNS logging
MacOS logging
Solutions by industry
Financial Services
Government & Education
Entertainment & Gambling
Telecommunications
Medical & Healthcare
Military & Defense
Law Firms & Legal Counsel
Industrial & Manufacturing


Find a Reseller
Partner Program

Documentation
Blog
White papers
Videos
Webinars
Case Studies
Community Program
Community Forum

Company
Careers

Support portals
Contact us
Let's Talk Start free
NXLog search
  • Loading...
Let's Talk Start free
May 15, 2025 security

Remote Desktop logs – A comprehensive guide to RDP logging and monitoring

By Arielle Bonnici

Share
ALL SIEM STRATEGY SECURITY ANNOUNCEMENT DEPLOYMENT COMPLIANCE COMPARISON RSS

Monitoring and centralizing Remote Desktop logs is critical for IT security, compliance, and operational efficiency, and NXLog Platform makes it simple and scalable.

Remote Desktop Protocol (RDP) is a powerful Windows feature that allows users to access a computer remotely over the network. While convenient and widely used, it’s also a potential entry point for attackers. Understanding how to check and analyze RDP connection logs can help detect unauthorized access, troubleshoot issues, and maintain system integrity.

In this post, I’ll walk you through everything you need to know about monitoring RDP logs—from accessing the logs to monitoring active remote sessions and centralizing RDP logs with NXLog Platform.

Understanding Remote Desktop logging

Windows logs an event whenever a remote desktop session is initiated, disconnected, or terminated. RDP logs are crucial for security and troubleshooting. They provide the only means to monitor successful versus failed logins, tracking who connected remotely and when, and diagnosing disconnects.

These logs are stored in Windows Event Log and are accessible via the Event Viewer utility. You can find RDP-related events in Event Viewer in the following Windows Logs:

  • Security log — Contains authentication-related events, such as successful or failed login attempts.

  • System log — Includes service-related events, such as RDP service start or stop.

  • Application log — Less frequently used for RDP, but may contain relevant application-level warnings or errors.

On the other hand, you’ll find more specific RDP events under Applications and Services Logs > Microsoft > Windows in the following logs:

  • TerminalServices-RemoteConnectionManager

  • TerminalServices-LocalSessionManager

Setting up Remote Desktop logging

Before you can monitor RDP logs, you must configure logging to capture the relevant events.

To allow RDP logon on a Windows machine:

  1. Open Settings > System > Remote Desktop.

  2. Toggle the Remote Desktop switch to On.

  3. Allow the firewall rule when prompted.

  4. Click Remote Desktop users to specify the users or groups who can connect remotely.

Next, configure the relevant RDP logging policies:

  1. Open Group Policy Editor (gpedit.msc).

  2. Navigate to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy and turn on the following policies:

    • Audit logon events — Success and Failure

    • Audit account logon events — Success and Failure

    • Audit account management — Success and Failure

    • Audit logoff events

  3. Navigate to Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Logon/Logoff and turn on the following policies:

    • Logon — Success and Failure

    • Logoff — Success

    • Special Logon — Success

    • Other Logon/Logoff Events — Success and Failure

  4. Execute the following command to apply the policy:

    > gpupdate /force

Turning on detailed auditing ensures that you record and can trace all remote connections—an essential security best practice.

Key RDP event IDs

Monitoring these RDP activity events will give you detailed insights into who connected, when, and whether they attempted any unauthorized access.

Successful RDP logon

Event ID Log Description

4624

Security

When this event has Logon Type 10 (RemoteInteractive), it indicates a successful RDP logon.

1149

TerminalServices-RemoteConnectionManager

Logged when a user connects via RDP.

Failed RDP logon attempt

Event ID Log Description

4625

Security

When this event has Logon Type 10 (RemoteInteractive), it signifies a failed RDP login attempt. Check the failure reason and account name fields. This event is critical for detecting brute-force or unauthorized logon attempts.

140

TerminalServices-RemoteConnectionManager

Provides more context about failed RDP connection attempts.

Session connect and reconnect

Event ID Log Description

21

TerminalServices-LocalSessionManager

A user connected to an existng session.

25

TerminalServices-LocalSessionManager

A user reconnected to an existing session.

User disconnected

Event ID Log Description

4779

Security

Logged when a user disconnects from an RDP session.

40

TerminalServices-LocalSessionManager

A user disconnected from an existing session. It could be due to a network interruption or user-initiated.

24

TerminalServices-LocalSessionManager

A user successfully disconnected from an existing session.

User logoff

Event ID Log Description

4647

Security

User initiated logoff.

4634

Security

Logged when a session is terminated.

23

TerminalServices-LocalSessionManager

A user successfully logged off.

Differentiating between disconnecting and logging off from an RDP session

So, what is the difference between disconnecting and logging off, and why should you monitor both? Succintly:

  • Disconnecting means the session remains active on the server, but the user has temporarily disconnected from it. All open applications remain running.

  • Logging off ends the session completely. Any open applications are closed, and unsaved work may be lost.

From a security and resource management perspective, users preferably log off. Disconnected sessions still consume memory and could be hijacked if not adequately secured.

How to check Remote Desktop logs

Checking RDP logs is essential for monitoring activity, troubleshooting connection issues, and spotting unauthorized access. Here’s how you can find and interpret Remote Desktop logs.

Step 1: Open Event Viewer
  • Press Win + R, type eventvwr.msc, and hit Enter.

  • This opens Event Viewer, the tool for viewing all Windows event logs.

Step 2: Navigate to the relevant logs
  • Navigate to Windows > Security to view authentication attempts, including successful and failed RDP logins.

  • Navigate to Application and Services Logs > Microsoft > Windows > TerminalServces-LocalSessionManager for RDP session connection and disconnection events.

  • Navigate to Application and Services Logs > Microsoft > Windows > TerminalServces-RemoteConnectionManager to track session state changes like logoff, disconnect, and session creation.

Step 3: Filter by RDP-specific event IDs

To narrow down the results:

  • Right-click on a log, for example, Security, then choose Filter Current Log…​.

  • In the Event IDs field, input key IDs like 4624, 4625, 4647, and 4779.

I explain these event IDs in detail in Key RDP event IDs above.

Step 4: Interpret the event details

Once you find a relevant event:

  • Double-click to open it.

  • Review fields like:

    • Account Name – the user attempting the connection.

    • Logon Type – RDP events have Type 10.

    • Source Network Address – the remote IP address.

    • Session ID – used to correlate the session across different events.

You can also check RDP logs remotely by right-clicking on Event Viewer (Local) and choosing Connect to Another Computer…​.

Event Viewer

Viewing current Remote Desktop connections

Sometimes, you may need to see who is logged in remotely to a computer. For example, to notify connected users of system changes or to avoid kicking them off during maintenance. Windows provides several session management tools that allow you to view current RDP connections. The most straightforward is from Task Manager.

  1. Press Ctrl + Shift + Esc to open Task Manager.

  2. Switch to the Users tab to display the active sessions, their status, and the user they belong to.

    Windows Task Manager

You can also view current RDP sessions from Command Line. The query session and qwinsta commands list all current user sessions, their status, and session IDs.

Windows qwinsta command output

Finally, administrators can query sessions for a Remote Desktop Services deployment using PowerShell. The Get-RDUserSession cmdlet returns a list of all user sessions in a virtual desktop or session collection.

Get-RDUserSession output

Centralizing and analyzing Remote Desktop logs

Monitoring RDP logs on one or two systems might be manageable manually, but it quickly becomes unscalable in a network with dozens or hundreds of machines. That’s where centralized logging comes into play, and without it, you risk missing critical compromise indicators.

Centralizing RDP logs has several benefits:

  • Consolidation — Aggregate RDP logs from all systems in one place for easier management.

  • Correlation — Identify patterns across multiple systems. For example, simultaneous login attempts.

  • Alerting — Configure real-time alerts on suspicious activities, like multiple failed logins in a short time or logins outside of work hours.

  • Compliance — Maintaining a secure log trail helps meet audit and regulatory requirements.

  • Forensics — In case of a breach, centralized logs help reconstruct attacker activity.

Several tools are available on the market to help you centralize your logs. NXLog Platform provides NXLog Agent, a powerful data collection tool with native support for Windows Event Log, among many other sources. With NXLog Agent, you can easily collect logs from all your RDP-enabled machines and forward them to a central location, including NXLog Platform’s data storage or third-party SIEMs.

Remote Desktop logging and security best practices

Effective logging is only part of securing your Remote Desktop infrastructure. It’s important to follow industry best practices for RDP security and logging to fully leverage logs for defense and detection.

Restrict RDP access

Limit RDP access to specific users and remove unnecessary users from the Remote Desktop Users group. In addition, implement firewall rules or VPN tunneling to limit access to specific IP addresses. You can also use Just-In-Time (JIT) access via tools like Microsoft Defender for Cloud to allow temporary access only when needed.

Automatically log off idle or disconnected sessions

Use Group Policy to configure automatic session timeout for idle users. The Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Session Time Limits policy allows you to set limits for disconnected and idle sessions to free resources and reduce security risk.

Alert on key events

It is crucial to set up alerts or dashboards using a SIEM to notify security personnel of anomalies in real time. Such anomalies include:

  • Multiple failed login attempts (Event ID 4625).

  • Unexpected logons (Event ID 4624 from unknown IPs or accounts).

  • Sessions during odd times or from unusual geographic locations.

Aggregate logs in a central location

Use centralized logging tools like NXLog Agent, Sysmon, or Windows Event Forwarding (WEF) to collect logs from all RDP-enabled machines and store them in a central location. Centralizing logs makes it easier to detect coordinated attacks or policy violations.

Enable and protect audit logs

Ensure you retain logs for a sufficient period and use log integrity measures. For example, read-only access or write-once logging systems. In addition, log files should be regularly backed up and protected from tampering.

Regularly review and fine-tune logging policies

Review the events you’re logging to ensure you’re capturing what you need without overloading storage. Update filters and queries as needed to align with evolving threats and business requirements.

By following these best practices, you’ll improve your ability to detect and respond to security incidents, optimize system performance, and comply with industry standards.

How NXLog Agent helps forward, analyze, and centralize Remote Desktop logs

NXLog Agent is widely used for aggregating, parsing, and forwarding logs to SIEMs and log analytics platforms. Key features for RDP monitoring include:

  • Windows Event Log support — NXLog Agent can collect logs locally or remotely from all the channels relevant to RDP, including custom channels like Microsoft-Windows-TerminalServices-*.

  • Log parsing and filtering — You can configure NXLog Agent to extract and forward only relevant RDP events using filters based on event IDs.

  • Log forwarding — Forward logs to centralized log storage in standard formats like JSON, XML, or syslog.

  • Secure transport — Supports encrypted log forwarding using TLS/SSL to protect log integrity.

  • Lightweight agent — It runs efficiently on both Windows clients and servers with minimal overhead.

Conclusion

RDP is a vital tool for modern IT operations, but it also introduces security and visibility challenges that you cannot ignore. Monitoring Remote Desktop logs is not just about keeping an eye on who’s connecting; it’s about maintaining control, detecting threats, and ensuring accountability.

Key takeaways
  • RDP activity is fully traceable through Windows Event Log, especially the Security and TerminalServices logs.

  • Event Viewer is a powerful tool for checking RDP logs and filtering for key event IDs like 4624, 4625, 4647, and 4779.

  • Real-time monitoring of successful logins, failed attempts, and disconnections is critical for detecting intrusions or policy violations.

  • Centralized logging tools like NXLog Agent greatly enhance manageability and visibility across multiple systems.

  • Security hygiene matters — enforcing strong authentication, restricting access, and logging out idle sessions are just as important as logging.

Final recommendations
  • Enable detailed auditing policies on all RDP-enabled machines.

  • Use centralized logging to correlate data and respond faster to threats.

  • Review logs regularly — automation is ideal to catch red flags early on.

  • Harden your RDP settings using best practices, including Network Level Authentication and IP restrictions.

By combining strong controls with effective monitoring, you can turn Remote Desktop from a potential risk into a secure, reliable management tool. Implement these practices today to gain full visibility into RDP activity and improve your organization’s overall security posture. Don’t leave your RDP sessions unwatched. Monitor, alert, and protect.

NXLog Platform is an on-premises solution for centralized log management with
versatile processing forming the backbone of security monitoring.

With our industry-leading expertise in log collection and agent management, we comprehensively
address your security log-related tasks, including collection, parsing, processing, enrichment, storage, management, and analytics.

Start free Contact us
  • rdp
  • windows event log
Share

Facebook Twitter LinkedIn Reddit Mail
Related Posts

Making the most of Windows Event Forwarding for centralized log collection
6 minutes | December 17, 2018
Using Raijin Database Engine to aggregate and analyze Windows security events
11 minutes | July 29, 2021
Setting up a Windows Event Collector (WEC) on Linux
13 minutes | February 22, 2021

Stay connected:

Sign up

Keep up to date with our monthly digest of articles.

By clicking singing up, I agree to the use of my personal data in accordance with NXLog Privacy Policy.

Featured posts

Announcing NXLog Platform 1.6
April 22, 2025
Announcing NXLog Platform 1.5
February 27, 2025
Announcing NXLog Platform 1.4
December 20, 2024
NXLog redefines log management for the digital age
December 19, 2024
2024 and NXLog - a review
December 19, 2024
Announcing NXLog Platform 1.3
October 25, 2024
NXLog redefines the market with the launch of NXLog Platform: a new centralized log management solution
September 24, 2024
Welcome to the future of log management with NXLog Platform
August 28, 2024
Announcing NXLog Enterprise Edition 5.11
June 20, 2024
Raijin announces release of version 2.1
May 31, 2024
Ingesting log data from Debian UFW to Loki and Grafana
May 21, 2024
Announcing NXLog Enterprise Edition 6.3
May 13, 2024
Raijin announces release of version 2.0
March 14, 2024
NXLog Enterprise Edition on Submarines
March 11, 2024
The evolution of event logging: from clay tablets to Taylor Swift
February 6, 2024
Migrate to NXLog Enterprise Edition 6 for our best ever log collection experience
February 2, 2024
Raijin announces release of version 1.5
January 26, 2024
2023 and NXLog - a review
December 22, 2023
Announcing NXLog Enterprise Edition 5.10
December 21, 2023
Raijin announces release of version 1.4
December 12, 2023
Announcing NXLog Enterprise Edition 6.2
December 4, 2023
Announcing NXLog Manager 5.7
November 3, 2023
Announcing NXLog Enterprise Edition 6.1
October 20, 2023
Raijin announces release of version 1.3
October 6, 2023
Upgrading from NXLog Enterprise Edition 5 to NXLog Enterprise Edition 6
September 11, 2023
Announcing NXLog Enterprise Edition 6.0
September 11, 2023
The cybersecurity challenges of modern aviation systems
September 8, 2023
Raijin announces release of version 1.2
August 11, 2023
The Sarbanes-Oxley (SOX) Act and security observability
August 9, 2023
Log Management and PCI DSS 4.0 compliance
August 2, 2023
Detect threats using NXLog and Sigma
July 27, 2023
HIPAA compliance logging requirements
July 19, 2023
Announcing NXLog Enterprise Edition 5.9
June 20, 2023
Industrial cybersecurity - The facts
June 8, 2023
Raijin announces release of version 1.1
May 30, 2023
CISO starter pack - Security Policy
May 2, 2023
Announcing NXLog Enterprise Edition 5.8
April 24, 2023
CISO starter pack - Log collection fundamentals
April 3, 2023
Raijin announces release of version 1.0
March 9, 2023
Avoid vendor lock-in and declare SIEM independence
February 13, 2023
Announcing NXLog Enterprise Edition 5.7
January 20, 2023
NXLog - 2022 in review
December 22, 2022
Need to replace syslog-ng? Changing to NXLog is easier than you think
November 23, 2022
The EU's response to cyberwarfare
November 22, 2022
Looking beyond Cybersecurity Awareness Month
November 8, 2022
GDPR compliance and log data
September 23, 2022
NXLog in an industrial control security context
August 10, 2022
Raijin vs Elasticsearch
August 9, 2022
NXLog provides native support for Google Chronicle
May 11, 2022
Aggregating macOS logs for SIEM systems
February 17, 2022
How a centralized log collection tool can help your SIEM solutions
April 1, 2020

Categories

  • SIEM
  • STRATEGY
  • SECURITY
  • ANNOUNCEMENT
  • DEPLOYMENT
  • COMPLIANCE
  • COMPARISON
logo

Subscribe to our newsletter to get the latest updates, news, and products releases. 

© Copyright 2024 NXLog FZE.

Privacy Policy. General Terms of Use

Follow us

  • Product
  • NXLog Platform 
  • Log collection
  • Log management and analysis
  • Log storage
  • Integration
  • Professional Services
  • Plans
  • Resources
  • Documentation
  • Blog
  • White papers
  • Videos
  • Webinars
  • Case studies
  • Community Program
  • Community forum
  • Support
  • Getting started guide
  • Support portals
  • About NXLog
  • About us
  • Careers
  • Find a reseller
  • Partner program
  • Contact us