Viewing Other Security-Related Logs
Some applications and services generate their own logs of security-related events. The security log format, location, and options are likely to be different for each application or service, so you'll need to do some sleuthing. We mention the possibility here so that you can start your own investigation. Here are a few clues to get you started:
If you use Windows Firewall, you can configure it to keep track of blocked (or successful) connections. It stores the log in %SystemRoot%\Pfirewall.log by default. Although it's a standard text file, it's difficult to read in its raw form.
For information about configuring the Windows Firewall log and instructions for displaying it in a more useful form, see Configuring ...