|
Events and Event Log AdministrationHere are my notes on Administering Microsoft's Windows 2000 product. | Topics this page:
|
|
Windows Logging ArchitectureAudit logs are created by the Audit process monitoring behavior by applications. It creates logs for trigger events defined. Log entries can also be generated by Applications referring to filters which specify what to log. Triggers and filters are defined by Group Policies. Group policies are created and edited using the Group Policy MMC. Logs can be examined using the MMC Viewer. Microsoft Visual Studio 2007 (Orcas) features a high performance trace listener which logs XML to disk in the event schema. The System.Diagnostics. EventSchemaTraceListener is the first listener in the namespace which is highly tuned for logging performance. Similar to the XMLWriterTraceListenter, this trace listener logs XML to disk. In particular, this type logs in the event schema, which is shared by some other new technologies. This tracelistener has performance which is drastically improved over previous logging tracelisteners, especially on machines with multiple processors. Additionally, this is the first trace listener which allows many different disk logging options, such as circular logging across multiple files. | Download this Visio 2000 file. |
Event Log Analysis
To create a new log:
The default size of an audit log is 512KB. The Event Log Query Tool dumps to screen all entries in a user-specified log type (application, security, or system):
Dumpel.exe from the Resource Kit can selectively dump various event logs from a local or remote computer to a text file. These example dump to -file event.out ... the system event -log on remote -server \\EVENTSVR in the last 3 -days in default space delimited format:
the local system event -log named, filtering -events 2013 in -tab delimited format:
the local application -log, -filtering (-r) records named (-m) Garbase, in -comma delimited format:
| Frank Heyne's excellent Eventlog FAQ
Get informed about the 6572
Microsoft Windows 2000 Event Log Message Text by Event ID, Event Source, Event Type, in an
Winzapper selectively deletes event entries. The $159 Event Reader 2.0 downloads and organizes Windows Event Logs LanGuard Security Event Log Manager performs intrusion detection through network-wide security event log monitoring. Sunbelt's Security Event Log Monitor allows remote administration as well as automated notification while it monitors server event logs, system services, and active processes. |
Event Log PoliciesThe NSA recommends using its .inf file to set each type of log with the same policy:
DHCP Log handling, however, is controlled with registry entries |
Microsoft Enterprise Instrumentation Framework (EIF)The NSA recommends using its .inf file to set each type of log with the same policy:
Logging Application Block for .NET from Microsoft's Patterns & Practices
|
Unix LogSplunk is like Google for logs, but only in Unix environments (Solaris, Linux). Splunk.base community. |
Related Topics: |
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page
Thank you! |