Search Our Database

How to Check RDP Windows Server Connection Logs

Last updated on |
by

Introduction

This guide explains how to check Remote Desktop Protocol (RDP) connection logs on a Windows Server. It focuses on identifying incoming RDP session activity using the built-in Event Viewer.


Prerequisites

Before you begin, ensure you have:

  • Remote Desktop (RDP) access to the Windows Server
  • Administrator privileges

Step-by-Step Guide

Method 1: Check Incoming RDP Logs Using Event Viewer

Step 1: Open Event Viewer

  1. Press 🪟 Win + R to open the Run dialog box.
  2. Type eventvwr.msc  and press Enter.

Open Event Viewer Screenshot

Step 2: Navigate to the RDP Log Directory

  1. In Event Viewer, navigate to:
    Applications and Services Logs > Microsoft > Windows
  2. Scroll down and select:
    TerminalServices-RemoteConnectionManager > Operational
  3. Right-click Operational and choose Filter Current Log.

Navigate to TerminalServices Logs
Operational Log View

Filter Log by Event ID 1149Step 3: Filter the Log by Event ID

  1. In the Filter window, enter the Event ID: 1149
  2. Click OK to apply the filter.

Apply Filter Event ID 1149

Step 4: View the List of RDP Connections

You will now see a list of all historical RDP connection attempts made to the server.

RDP Connection History

Step 5: Check Connection Details

Click any event log entry to view detailed information, including:

  • Source IP address – You can use  https://whatismyipaddress.com  to look up unknown IPs.
  • Login time
  • The username

Conclusion

Monitoring RDP logs is critical for tracking access and safeguarding your server. By using Event Viewer and filtering for Event ID  1149  , you can quickly identify connection attempts and retrieve relevant information such as usernames and source IP addresses.

Regular log reviews help detect unauthorized access and improve security posture. If you encounter issues or need further guidance, please contact our support team at support@ipserverone.com. We’re happy to assist.