Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Overview  





2 Command-line interface  





3 Windows Vista  



3.1  Filtering using XPath 1.0  





3.2  Event subscribers  







4 See also  





5 References  





6 External links  














Event Viewer






Deutsch
Français


Русский
Українська
Tiếng Vit


 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Event Viewer Log
Developer(s)Microsoft
Operating systemMicrosoft Windows
Service nameWindows Event log (eventlog)
TypeUtility software

Event Viewer is a component of Microsoft's Windows NT operating system that lets administrators and users view the event logs, typically file extensions .evt and .evtx, on a local or remote machine. Applications and operating-system components can use this centralized log service to report events that have taken place, such as a failure to start a component or to complete an action. In Windows Vista, Microsoft overhauled the event system.[1]

Due to the Event Viewer's routine reporting of minor start-up and processing errors (which do not, in fact, harm or damage the computer), the software is frequently used by technical support scammers to trick the victim into thinking that their computer contains critical errors requiring immediate technical support.[2] An example is the "Administrative Events" field under "Custom Views" which can have over a thousand errors or warnings logged over a month's time.

Overview[edit]

Windows NT has featured event logs since its release in 1993.

The Event Viewer uses event IDs to define the uniquely identifiable events that a Windows computer can encounter. For example, when a user's authentication fails, the system may generate Event ID 672.

Windows NT 4.0 added support for defining "event sources" (i.e. the application which created the event) and performing backups of logs.

Windows 2000 added the capability for applications to create their own log sources in addition to the three system-defined "System", "Application", and "Security" log-files. Windows 2000 also replaced NT4's Event Viewer with a Microsoft Management Console (MMC) snap-in.

Windows Server 2003 added the AuthzInstallSecurityEventSource() API calls so that applications could register with the security-event logs, and write security-audit entries.[3]

Versions of Windows based on the Windows NT 6.0 kernel (Windows Vista and Windows Server 2008) no longer have a 300-megabyte limit to their total size. Prior to NT 6.0, the system opened on-disk files as memory-mapped files in kernel memory space, which used the same memory pools as other kernel components.

Event Viewer log-files with filename extension evtx typically appear in a directory such as C:\Windows\System32\winevt\Logs\

Command-line interface[edit]

eventquery.vbs, eventcreate, eventtriggers
Developer(s)Microsoft
Initial releaseOctober 25, 2001; 22 years ago (2001-10-25)
Operating systemMicrosoft Windows
TypeCommand
LicenseProprietary commercial software
Websitedocs.microsoft.com/en-us/windows-server/administration/windows-commands/eventcreate

Windows XP introduced set of three command-line interface tools, useful to task automation:

Windows Vista[edit]

Event Viewer consists of a rewritten event tracing and logging architecture on Windows Vista.[1] It has been rewritten around a structured XML log-format and a designated log type to allow applications to more precisely log events and to help make it easier for support technicians and developers to interpret the events.

The XML representation of the event can be viewed on the Details tab in an event's properties. It is also possible to view all potential events, their structures, registered event publishers and their configuration using the wevtutil utility, even before the events are fired.

There are a large number of different types of event logs including Administrative, Operational, Analytic, and Debug log types. Selecting the Application Logs node in the Scope pane reveals numerous new subcategorized event logs, including many labeled as diagnostic logs.

Analytic and Debug events which are high frequency are directly saved into a trace file while Admin and Operational events are infrequent enough to allow additional processing without affecting system performance, so they are delivered to the Event Log service.

Events are published asynchronously to reduce the performance impact on the event publishing application. Event attributes are also much more detailed and show EventID, Level, Task, Opcode, and Keywords properties.

Users can filter event logs by one or more criteria or by a limited XPath 1.0 expression, and custom views can be created for one or more events. Using XPath as the query language allows viewing logs related only to a certain subsystem or an issue with only a certain component, archiving select events and sending traces on the fly to support technicians.

Filtering using XPath 1.0[edit]

  1. Open Windows Event Log
  2. Expand out Windows Logs
  3. Select the log file that is of interest (In the example below, the Security event log is used)
  4. Right-click on the Event Log and select Filter Current Log...
  5. Change the selected tab from FiltertoXML
  6. Check the box to Edit query manually'
  7. Paste the query into the text box. Sample queries can be found below.

Here are examples of simple custom filters for the new Window Event Log:

  1. Select all events in the Security Event Log where the account name involved (TargetUserName) is "JUser"
    <QueryList><Query Id="0" Path="Security"><Select Path="Security">*[EventData[Data[@Name="TargetUserName"]="JUser"]]</Select></Query></QueryList>
  2. Select all events in the Security Event Log where any Data node of the EventData section is the string "JUser"
    <QueryList><Query Id="0" Path="Security"><Select Path="Security">*[EventData[Data="JUser"]]</Select></Query></QueryList>
  3. Select all events in the Security Event Log where any Data node of the EventData section is "JUser" or "JDoe"
    <QueryList><Query Id="0" Path="Security"><Select Path="Security">*[EventData[Data="JUser" or Data="JDoe"]]</Select></Query></QueryList>
  4. Select all events in the Security Event Log where any Data node of the EventData section is "JUser" and the Event ID is "4471"
    <QueryList><Query Id="0" Path="Security"><Select Path="Security">*[System[EventID="4471"]] and *[EventData[Data="JUser"]]</Select></Query></QueryList>
  5. Real-world example for a package called Goldmine which has two @Names
    <QueryList><Query Id="0" Path="Application"><Select Path="Application">*[System[Provider[@Name='GoldMine' or @Name='GMService']]]</Select></Query></QueryList>

Caveats:

Event subscribers[edit]

Major event subscribers include the Event Collector service and Task Scheduler 2.0. The Event Collector service can automatically forward event logs to other remote systems, running Windows Vista, Windows Server 2008orWindows Server 2003 R2 on a configurable schedule. Event logs can also be remotely viewed from other computers or multiple event logs can be centrally logged and monitored without an agent and managed from a single computer. Events can also be directly associated with tasks, which run in the redesigned Task Scheduler and trigger automated actions when particular events take place.

See also[edit]

References[edit]

  1. ^ a b "New tools for Event Management in Windows Vista". TechNet. Microsoft. November 2006.
  • ^ Anderson, Nate (October 4, 2012). ""I am calling you from Windows": A tech support scammer dials Ars Technica". Ars Technica.
  • ^ "AuthzInstallSecurityEventSource Function". MSDN. Microsoft. Retrieved October 5, 2007.
  • ^ LLC), Tara Meyer (Aquent. "Eventquery.vbs". docs.microsoft.com.
  • ^ LLC), Tara Meyer (Aquent. "Eventcreate". docs.microsoft.com.
  • ^ LLC), Tara Meyer (Aquent. "Eventtriggers". docs.microsoft.com.
  • ^ "Microsoft's Implementation and Limitations of XPath 1.0 in Windows Event Log". MSDN. Microsoft. Retrieved August 7, 2009.
  • ^ "Powershell script to filter events using an Xpath query". Retrieved September 20, 2011.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=Event_Viewer&oldid=1217579544"

    Categories: 
    Windows commands
    Windows components
    Computer logging
    Windows administration
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
    Use mdy dates from December 2022
    Articles needing cleanup from August 2019
    All pages needing cleanup
    Articles containing how-to sections
     



    This page was last edited on 6 April 2024, at 17:37 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki