See Who Has Logged Into Windows 10
Edited by Jay
If you're the system administrator in your household, and you share a PC with multiple people, you may want to monitor who's been logging in from time-to-time. With the Logon Auditing Policy enabled, you can see who's been using your device, along with any attempts users have made to log in. In addition to checking local accounts, you can also see network sign-in attempts as well. You'll be able to view both successful and failed login attempts, along with the name of the account, the time they tried to sign-in, plus some other information too.
So if you suspect your roommate or sibling has been trying to hack into your device, you'll be able to see a record of all the attempts, and better yet, be able to prove it! Although this feature is typically reserved for professional environments, it still has some practical use for home users as well.
In the following VisiHow guide, we'll go through the steps for enabling the logon audit policy, and also how to use the event viewer to check on who's been logging in. For this article, we used a Sager laptop running Windows 10 Professional.
**Please Note** Editing the group policy isn't available for Windows 10 Home users. However, successful login auditing comes turned on by default. So if you're using Windows 10 Home edition, you can jump directly to the section on using the Event Viewer.
Enable Audit Account Logon Events Via Group Policy in Windows 10
Use Event Viewer to Check Login Attempts in Windows 10
- 5In the top section of the event properties window, you'll see the account name of the person who signed-in. Also, below in the Logged section, you'll see the time and date this user signed-in.
- 10Next, enter a name for your custom view, then click "OK".