How I may help
LinkedIn Profile Email me!
Call me using Skype client on your machine

Reload this page Events and Event Log Administration

Here are my notes on Administering Microsoft's Windows 2000 product.

 

Topics this page:

  • Windows Logging Architecture
  • Event Logs
  • Event Log Analysis
  • Event Log Policies
  • Your comments???

  •  

    Site Map List all pages on this site 
    About this site About this site 
    Go to first topic Go to Bottom of this page


    Set this at top of window. Windows Logging Architecture

      Audit logs are created by the Audit process monitoring behavior by applications. It creates logs for trigger events defined.

      Log entries can also be generated by Applications referring to filters which specify what to log. Triggers and filters are defined by Group Policiesanother page on this site.

      Group policies are created and edited using the Group Policy MMC.

      Logs can be examined using the MMC Viewer.

      Microsoft Visual Studio 2007 (Orcas) features a high performance trace listener which logs XML to disk in the event schema. The System.Diagnostics. EventSchemaTraceListener is the first listener in the namespace which is highly tuned for logging performance. Similar to the XMLWriterTraceListenter, this trace listener logs XML to disk. In particular, this type logs in the event schema, which is shared by some other new technologies. This tracelistener has performance which is drastically improved over previous logging tracelisteners, especially on machines with multiple processors. Additionally, this is the first trace listener which allows many different disk logging options, such as circular logging across multiple files.




    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Set screen Event Logs

      Listed alphabetically as in the Event Viewer:

      Name Contains events such as
      Application Log program errors and missing data information.
      Security Log logon attempts and folder access.
      System Log startup information, shutdown information, and driver information.
      Directory Service .
      DNS Service .
      File Replication Service .


    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Set screen Event Log Analysis

      The Windows 2000 System Monitor Administrative tool replaces the NT 4 Performance Monitor with these improvements:
      • Log specific counters and instances of an object rather than an entire group. This will reduce the size of log files a LOT.
      • Use Performance Logs and Alerts to trigger events, such as send a message, start a performance data log, or run a program, if a counter exceeds a certain value.
      • New Performance objects have been added. Example: the Print Queue object allows print queue monitoring.
      • Sample log file included with Windows 2000 install.

      To create a new log:

        From Q248345 How to Create a Log Using System Monitor in Windows 2000

      1. Right-click Counter Logs, click New Log Settings, type a name for the log, and then click OK.
      2. On the General tab, click Add to add the counters you want.
      3. On the Log Files tab, click the logging options you want.
      4. On the Schedule tab, click the scheduling options you want.

      The default size of an audit log is 512KB.

      From the Resource Kit The Event Log Query Tool dumps to screen all entries in a user-specified log type (application, security, or system):

        ElogDmp.exe \\C1 application

      tool Dumpel.exe from the Resource Kit can selectively dump various event logs from a local or remote computer to a text file. These example dump to -file event.out ...

      the system event -log on remote -server \\EVENTSVR in the last 3 -days in default space delimited format:

        dumpel -f event.out -s eventsvr -l system -d 3

      the local system event -log named, filtering -events 2013 in -tab delimited format:
        dumpel -f event.out -l system -m rdr -e 2013 -t

      the local application -log, -filtering (-r) records named (-m) Garbase, in -comma delimited format:
        dumpel -f event.out -l application -m garbase -r -c

     

     
    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Set this at top of window. Event Log Policies

      The NSA recommends using its .inf file to set each type of log with the same policy:

      Policy.infRecommendedDefault
      MaximumLogSize4194240
      Restrict guest access to application logRestrictGuestAccess1=Yes
      Retain application log AuditLogRetentionPeriod 2=
      Retain RetentionDays 7
      Retention method for application log -
      Retention method for security log ?=Overwrite as needed
      Retention method for system log -

      another page on this site DHCP Log handling, however, is controlled with registry entries

      another page on this site Other Group Policies


    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Set this at top of window. Microsoft Enterprise Instrumentation Framework (EIF)

      The NSA recommends using its .inf file to set each type of log with the same policy:

      webpage article Logging Application Block for .NET from Microsoft's Patterns & Practices
      Building useful logging capabilities into your applications can be a significant challenge. At the very least, you need to determine what information is appropriate to log, design the events themselves, and make them available for analysis in an appropriate format. Effective logging is useful for troubleshooting problems with an application as well as provides useful data for analysis, helping to ensure that the application continues to run efficiently and securely. To help provide effective logging for enterprise applications, Microsoft has designed the latest patterns & practices applications block: The Logging Application Block. This block is a reusable code component that uses the Microsoft Enterprise Instrumentation Framework (EIF) and the Microsoft .NET Framework to help you design instrumented applications.


    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Set this at top of window. Unix Log


    Go to Top of this page.
    Previous topic this page
    Next topic this page

    Portions ©Copyright 1996-2014 Wilson Mar. All rights reserved. | Privacy Policy |

     

    Related Topics:

  • Win2000 Config.
  • Win2000 Installation
  • MMC
  • Security
  • TCP/IP
  • Active Directory
  • Troubleshooting
  • Performance Tuning

  • Free Training!
  • Tech Support

  • Go to Top of this page.
    Previous topic this page
    Next topic this page

    How I may help

    Send a message with your email client program


    Your rating of this page:
    Low High




    Your first name:

    Your family name:

    Your location (city, country):

    Your Email address: 



      Top of Page Go to top of page

    Thank you!