ALL >> Computers >> View Article
Lets Understand The Event Logs
Event logs are compendium of system reports which explains the activities happening inside a computer. By referring these logs a user can cross check the events and respond to them as a part of network management. A user would have to configure the event log filter first for viewing the logs. After the configuration process a user can derive reports and use them for formulating the network strategies.
Steps to view the Event Log filter
Step 1: Select Start and go to the Control Panel.
Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.
Step 3: Select Event Viewer.
Step 4: Now view the logs at Event Viewer Window.
Monitor Event Logs:
Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.
Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.
Step 3: Click Event Viewer from the Console Tree.
Step 4: Select the logs containing desired information.
Step 5: View events from the details pane.
Step ...
... 6: Paste the content in MS Word and scroll the content.
Understand the Event Log
In an event log the Date stands for the Date of the event; Time means the actual time of the event; User stands for the user name; Computer stands for the computer name; Event ID stands for the event name; Source stands for the actual source of the event; Type stands for the Error type
Find the Events with these steps
Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.
Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.
Step 3: Click Event Viewer from the Console Tree.
Step 4: Select the logs containing desired information.
Step 5: View events from the details pane.
Step 6: Select Find>> Event name>> Find Next.
Steps to filter the log events
Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.
Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.
Step 3: Click Event Viewer from the Console Tree.
Step 4: Select the logs containing desired information.
Step 5: View events from the details pane.
Step 6: Select Filter Tab from View menu.
Set the log size for effective network management
Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.
Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.
Step 3: Click Event Viewer from the Console Tree.
Step 4: Select the logs containing desired information.
Step 5: View events from the details pane.
Step 6: Click Set the log size (in Log size) in Maximum log size box option.
Step 7: Overwrite>> Clear Log option and OK.
Besides typing these steps and commands the Lepide Event Log Manager tool can be used. This tool can help a user in easily viewing, monitoring, modifying and managing the event logs. Log files generated from Windows based systems and web servers can be easily tracked and collected in a centralized database for revew and analysis. Since, this tool helps in creating a large log archive, the retention time of the logs increase, thereby aiding in network audits and meeting network compliance standrds.
Author Bio
The author is a Technical Manager and carry years of experience in writing technical articles. He has mentioned steps to manage the event log filter for formulating strategies on Network Management .
Add Comment
Computers Articles
1. How To Build A Peer-to-peer Marketplace?Author: brainbell10
2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10
3. Everything You Need To Know About Web Development In 2026
Author: chetna
4. Create A Strong Online Presence Today
Author: FutureGenApps
5. User Experience Design
Author: brainbell10
6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10
7. The Thrilling World Of Geometry Dash Lite
Author: Hattie
8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas
9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas
10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC
11. Unreal Game Development
Author: brainbell10
12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp
13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management
14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify
15. Why Choose Sataware?
Author: brainbell10






