The Ultimate Guide to Windows Event Logging | Sumo Logic (2024)

The Ultimate Guide to Windows Event Logging | Sumo Logic (1)


In a perfect world, there would be no issues with the operating system and no problems with the applications. Unfortunately, this isn’t a perfect world. System failures can and will occur, and when they do, it is the responsibility of system administrators to diagnose and resolve the issues. But where can system administrators begin the search for solutions when problems arise? The answer is Windows event logs.

What are Windows event logs?

At their core, Windows event logs are records of events that have occurred on a computer running the Windows operating system. These records contain information regarding actions that have taken place on the installed applications, the computer, and the system itself. Windows event logs include both actions taken by users and those taken by processes executing on the computer. If there is an issue with the system, they can provide an admin with crucial context for reaching a resolution.

Imagine for a moment that an application on your Windows machine fails, and you’re presented with an obscure error message that is relatively useless for identifying the cause of the problem. In addition, let’s say there are no proprietary log files for this application that can assist you in identifying and fixing the issue. This is an example of an instance where the Windows event logs may be of use. Simply navigate to the Event Viewer (more on this later), and you will likely have a starting point for resolving the problem.

The elements of a Windows event log

When troubleshooting any operating system incident, it is crucial that you understand the information available to you — and to understand the information, you must first understand the format in which it is presented. One advantage of working with Windows event logs is that all event logs (whether collected for the system itself, for an application or for auditing purposes) are organized in a standardized and concise manner to make them as easy to understand as possible. Let’s take a look at the major elements of Windows event logs:

  • Log name/key - The key refers to each logging component's classification, indicating the log's name to which events from these components will be written. In this article, we will examine system, application, and security key values. The system event logs will include events logged by system-level components such as the Windows Update Client. The application event logs are slightly different; these include events related to different services as well as applications that are installed or being installed on the Windows machine. If an event log is recorded when an application fails while running or during set-up, it should be tied to the application key. Finally, security event logs typically include audit records of successful and failed login attempts.
  • Level - Is the event being logged strictly for informational purposes, or does it indicate a critical error? The event level will tell you the severity of the event being recorded. Event levels include critical, error, warning, information and verbose.
  • Date/time - This refers to the date and time when the event was recorded. If you were to log on to a Windows machine at 8:05 AM on July 30, 2019, then an audit event record is likely tied to this date and time.
  • Source - This is the name of the component that triggers the event log. In many cases, it will be the name of the application or process that writes the event log. For example, suppose the event is related to the failure of a database application on the machine. In that case, the event source may be the name of the database application that experienced the failure.
  • Event ID - This can be an extremely useful part of an event log for any administrator tasked with troubleshooting a failure. The event ID is meant to serve as an identifier for a distinct logged event. This identifier should tie to a message that points to the cause of the problem, which will enable the system admin to take action to get the issue resolved.
  • Task category - The task category serves as additional information to assist with debugging an application or system issue. The developers of a particular application can define the categories to help provide context for a particular event.
  • User - This can refer to the user logged in to a particular Windows machine at the time the event was recorded. For example, when installing an application, the username for the administrator logged into the machine will likely be reflected in the event log for the installation event.
  • Computer - The name of the machine that logged the event.

Using the Windows Event Viewer

So now that we know what Windows event logs are, let’s discuss Windows Event Viewer. Windows Event Viewer is a tool provided by Windows for accessing and managing the event logs associated with both local and remote Windows machines. This tool can be accessed by searching via the start menu or navigating to the administrative tools portion of the control panel on a Windows machine.

Viewing events logs in Event Viewer

Once Event Viewer is opened on your machine, accessing the log files is fairly straightforward. In the left navigation panel, you will see a drop-down labeled “Windows logs.” Expanding this drop-down will allow you to select the event log file that you wish to view. The major log files that will likely be used for most Windows troubleshooting are application, security, and system. Left-clicking on any of the keys beneath the “Windows logs” drop-down will open the selected log file in Event Viewer. Note: If you wish to view the Windows event log files on a remote machine, simply right-click on the Event Viewer link in the left pane and select the option to “connect to another computer.”

The Ultimate Guide to Windows Event Logging | Sumo Logic (2)

The display of the log file is divided into two panes located in the center of Event Viewer. The top pane displays the major details surrounding each event in a list format. This can be sorted by clicking on any of the headers located at the top of the top pane (see image below). The bottom pane displays the details associated with whichever event record is selected from the list of event logs above.

The Ultimate Guide to Windows Event Logging | Sumo Logic (3)

Finding and filtering events in Event Viewer

As mentioned earlier, the Event Viewer is typically utilized in response to reported system, application and security issues. It’s possible for the administrator to search through the logs randomly in hopes of identifying the problem; therefore, the Event Viewer is only useful if the administrator can find the event logs related to the issue being experienced. With that said, finding a particular event record requires context.

This context will almost certainly include the time at which the issue was encountered and the application or system process in which the problem occurred. In addition, the user and computer name will be valuable. This information can be leveraged to search for the event by selecting the correct log file and scrolling through the entries, or it can be used to filter the event records to find the relevant information more efficiently.

After selecting the appropriate log file, you can filter by clicking on the “filter current log” link in the actions pane located on the right side of the Event Viewer. This opens the filter modal window (shown below), where the user can make the appropriate selections to filter the records that will be shown in the selected log file. For instance, if the administrator wishes to limit the results to “critical” events triggered by the user “jdoe,” then he/she would check the box labeled “critical” beside the event level and enter the username “jdoe” in the text area labeled “user.” After clicking “OK,” the Event Viewer would filter the event records accordingly.

The Ultimate Guide to Windows Event Logging | Sumo Logic (4)

Saving event logs

Another useful feature of the Event Viewer is the ability to save event logs for use outside of the component. This is done by selecting the appropriate log file in the left pane and then clicking the “save all events as” link in the Actions pane on the right. This link opens the traditional “save as” modal, which will allow the administrator to choose a location and filename for the exported event records.

The Ultimate Guide to Windows Event Logging | Sumo Logic (5)

Clearing event Logs

In some instances, it may make sense to clear the event logs. This can be done through Event Viewer as well. After selecting the appropriate log file to clear via the left navigation, there is a “clear log” link located in the Actions pane on the right. Clicking this link will open a confirmation dialog where the administrator will be asked to confirm the decision to clear the selected log file. Event Viewer gives the option to save the event logs upon clearing or to clear without saving.

Using event details to troubleshoot with Event Viewer

Above, I discussed the steps to identify, search, and filter the event log files in order to try to diagnose an issue with a Windows machine. This is a primary method of troubleshooting an issue using the event viewer. It is just as important to take the information the event log provides and use it appropriately. Many of the recorded events will have a corresponding event ID and message. The message may be enough to go on to resolve the issue; however, even if it isn’t, it is usually a good place to begin researching the issue. Performing a search online with the event ID, message and associated source will likely turn up something useful.

Windows event logs and Sumo Logic

While the Event Viewer is a good place to start when beginning to analyze Windows event logs, you may not like the interface. In this instance, consider Sumo Logic as a log management platform for collecting and monitoring your Windows event logs for easier log analysis and issue investigation. The process for setting up the Windows event log collection in Sumo Logic is pretty straightforward. After installing a Sumo Logic collector, you simply need to configure a Windows event log source for remote or local collection.

The process doesn’t take long and makes it easier to glean valuable insights from Windows event logs (something a system administrator will surely appreciate). This is helpful in cutting down on the time it takes to diagnose and resolve any bug, whether system, application or security-related.

You can also use Sumo Logic to assess the security of your Windows environments with cloud security monitoring and analytics apps for Windows, isolate and fix issues faster with OpenTelemetry-powered infrastructure monitoring, and spot cloud credential theft on Windows endpoints.

Learn more about how to streamline Windows monitoring for better security with Sumo Logic.

For a full rundown of the Sumo Logic configuration process, be sure to visit the Sumo Logic documentation for configuring local and remote Windows event log sources. Sumo Logic makes getting started even easier with a free trial, helping businesses test out the log management platform for themselves at no cost.

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.

Start free trial

The Ultimate Guide to Windows Event Logging | Sumo Logic (2024)

FAQs

What are the 5 main Windows event logs? ›

There are mainly five Windows event log types:
  • Application Events. These are connected to instances involving locally installed software. ...
  • Security Events. These keep data according to the audit policies of the Windows operating system. ...
  • Setup Events. ...
  • Forwarded Events. ...
  • System Events.

What is the point of Windows event log? ›

Windows event log is an in-depth record of events related to the system, security, and application stored on a Windows operating system. Event logs can be used to track system and some application issues and forecast future problems.

How do I configure Windows event logging? ›

Open a command prompt as an administrator. At the command line, type eventvwr and press Enter to start the Event Viewer. In Windows logs, right-click Security, and then click Properties. Verify the settings reflect a maximum log size of no less than 10240 KB (10 MB), and a selection of Overwrite events as needed.

How do I investigate Windows event logs? ›

Right click on the Start button and select Control Panel > System & Security and double-click Administrative tools. Double-click Event Viewer. Select the type of logs that you wish to review (ex: Application, System)

What are the three core Windows event logs? ›

The major log files that will likely be used for most Windows troubleshooting are application, security, and system. Left-clicking on any of the keys beneath the “Windows logs” drop-down will open the selected log file in Event Viewer.

Which Windows event logs to monitor? ›

Some important Event IDs to consider include:
  • 4103: PowerShell Module Logging.
  • 4104: PowerShell Script Block Logging.
  • 4656: Request to handle or access an object.
  • 4658: Handle to an object was closed.
  • 4659: Handle to an object was requested with intent to delete.
  • 4660: Object deleted.
  • 4663: Attempt to access object was made.
Jul 3, 2024

Can Windows event logs be deleted? ›

Before clearing the event logs, it is recommended that you save the current logs to a file. How to clear the event viewer log: Open Event Viewer and select the Windows log you wish to clear. Right-click on the log and select Clear Log.

What is the difference between a log and an event? ›

Unlike logs, events describe a unit of work, meaning they contain all of the information about what it took for a service to perform a certain job. And, not every log is an event in its entirety. Logs are usually only portions of events. A group of logs can compose a single event.

Is it OK to disable Windows event log? ›

Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity such as login attempts, process creation, and much more. This data is used by security tools and analysts to generate detections.

How do I troubleshoot Windows event log? ›

To do so, open Control Panel, select System and Security, and then, in the Administrative Tools section, select View event logs. The Event Viewer window opens. In the console tree, first navigate to Windows Logs, then Application. In the Actions pane, select Filter Current Log.

Can you modify Windows event logs? ›

Procedure. On the Collection tab, double-click the selected Log Source or just select it and click the Edit button. The Windows Events Log Source Edition tab is displayed. Click ON or OFF to define whether the current Log Source is enabled or disabled.

Where are Windows event logs stored? ›

In Windows, the event logs are stored in the C:\WINDOWS\system32\config\ folder. They are created for each system access, operating system blip, security modification, hardware malfunction and driver issue.

What is the format of the Windows event log? ›

The Windows Event Log (EVT) format is used by Microsoft Windows to store system log information. This specification is based on public available information and was enhanced by analyzing test data. This document is intended as a working document of the data format specification for the libevt project.

How do I capture Windows event logs? ›

How to export event viewer logs?
  1. Open Event Viewer (Run → eventvwr. ...
  2. Locate the log to be exported.
  3. Select the logs that you want to export, right-click on them and select "Save All Events As".
  4. Enter a file name that includes the log type and the server it was exported from.
  5. Save as a CSV (Comma Separated Value) file.

How do I get all Windows event logs? ›

To collect event logs from Windows, follow these steps:
  1. Click “Start,” then “Run,” then “eventvwr. msc.” This will open the Event Viewer.
  2. Next, go to “Windows Logs,” then “Application, Security, and System”
  3. Filter the current log by dates.
  4. Click “Save All Event As…”
  5. Save the logs.
Mar 17, 2021

What is logon type 5 in Windows event log? ›

Windows logs a type 5 logon when a service starts and the service account logs into the local system. This event is typically initiated by the Service Control Manager, responsible for handling different services on the system.

What are the different types of event logs? ›

Types of Event Logs

They are Information, Warning, Error, Success Audit (Security Log) and Failure Audit (Security Log). An event that describes the successful operation of a task, such as an application, driver, or service.

What is Event ID 5 in Windows Event Viewer? ›

Event ID 5: This error can be caused by a faulty SCSI card or a faulty SCSI termination. If this error occurs contact the hardware's manufacturer. Event ID 7: This error can be caused by an outdated tape device driver, faulty media, or dirty read/write heads on the tape drive.

What are the types of window event? ›

The window-activated event type. The window closed event. The "window is closing" event. The window-deactivated event type.

Top Articles
60+ Amazing Ways to Save More Money Every Month
Certificate of Deposit (CD)
Obituaries
Geometry Escape Challenge A Answer Key
Tokioof
Thotsbook Com
Baywatch 2017 123Movies
25Cc To Tbsp
Ups Access Point Lockers
Pekin Soccer Tournament
Vipleaguenba
Unity - Manual: Scene view navigation
H12 Weidian
Drago Funeral Home & Cremation Services Obituaries
Quest: Broken Home | Sal's Realm of RuneScape
Kcwi Tv Schedule
Clare Briggs Guzman
Where to eat: the 50 best restaurants in Freiburg im Breisgau
A Cup of Cozy – Podcast
Bill Remini Obituary
Fiona Shaw on Ireland: ‘It is one of the most successful countries in the world. It wasn’t when I left it’
Jesus Revolution Showtimes Near Regal Stonecrest
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Shelby Star Jail Log
Taylored Services Hardeeville Sc
Mobile crane from the Netherlands, used mobile crane for sale from the Netherlands
Tokioof
R/Sandiego
25Cc To Tbsp
Diggy Battlefield Of Gods
Ellafeet.official
Skroch Funeral Home
Lichen - 1.17.0 - Gemsbok! Antler Windchimes! Shoji Screens!
Police Academy Butler Tech
Synchrony Manage Account
Indiefoxx Deepfake
Trivago Myrtle Beach Hotels
Craigs List Palm Springs
Noaa Marine Weather Forecast By Zone
Discover Wisconsin Season 16
World Social Protection Report 2024-26: Universal social protection for climate action and a just transition
2023 Nickstory
Weather In Allentown-Bethlehem-Easton Metropolitan Area 10 Days
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Yale College Confidential 2027
Tacos Diego Hugoton Ks
Ups Customer Center Locations
Graduation Requirements
Grand Park Baseball Tournaments
Diccionario De Los Sueños Misabueso
Taterz Salad
Asisn Massage Near Me
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 6027

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.