How to Use Zabbix to Monitor Windows Login Success and Failure Events

This guide explains how to configure Zabbix to monitor Windows Server login events—both successful and failed—by using eventlog keys, creating templates, items, triggers, and testing alerts to quickly detect and respond to potential security incidents.

Ops Development Stories
Ops Development Stories
Ops Development Stories
How to Use Zabbix to Monitor Windows Login Success and Failure Events

Purpose

Zabbix is used to monitor local Windows users or RDP logins to Windows servers, preventing password leaks, malicious logins, and information leakage, and to promptly notify system administrators.

Operating System

Windows Server 2012 with Zabbix 4.4. Two users: songhongpeng and administrator.

Windows Server Security Log

Open Windows Event Viewer and view successful login events and failed login events.

Zabbix Server Configuration

Create a template.

Create an application set.

Create monitoring items.

Create triggers.

Test alerts.

Create Monitoring Item for Successful Login

Use Zabbix built‑in key eventlog[Security,,"SuccessAudit",,^4624$, ,skip]. Parameters: Security is the log name; "Success Audit" indicates successful audit events; ^4624$ matches event ID 4624; skip ignores historical logs. Monitoring interval is 60 s, history retention 7 days.

eventlog[Security,,"SuccessAudit",,^4624$, ,skip]

Create Monitoring Item for Failed Login

eventlog[Security,,"FailureAudit",,^4625$, ,skip]

Create Triggers

Example trigger for successful login:

{VEEAMBACKUP-SER:eventlog[Security,,"SuccessAudit",,^4624$, ,skip].nodata(60)}=0 and {VEEAMBACKUP-SER:eventlog[Security,,"SuccessAudit",,^4624$, ,skip].regexp(songhongpeng)}=1

The expression means: if data is received within 60 seconds and the content contains the string "songhongpeng", an alarm is raised; if no new data appears for 60 seconds, the trigger returns to OK. Continuous successful logins keep the trigger in problem state.

Similar trigger for failed login:

{VEEAMBACKUP-SER:eventlog[Security,,"FailureAudit",,^4625$, ,skip].nodata(60)}=0 and {VEEAMBACKUP-SER:eventlog[Security,,"FailureAudit",,^4625$, ,skip].regexp(songhongpeng)}=1

This works the same way, useful for detecting brute‑force login attempts.

Trigger Alarm Test

Test by logging in via mstsc or locally and observe the generated alerts.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

AlertingWindowsZabbixEvent LogLogin Monitoring
Ops Development Stories
Written by

Ops Development Stories

Maintained by a like‑minded team, covering both operations and development. Topics span Linux ops, DevOps toolchain, Kubernetes containerization, monitoring, log collection, network security, and Python or Go development. Team members: Qiao Ke, wanger, Dong Ge, Su Xin, Hua Zai, Zheng Ge, Teacher Xia.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.