123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Lets Understand The Event Logs

Profile Picture
By Author: Lewis Bayer
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Event logs are compendium of system reports which explains the activities happening inside a computer. By referring these logs a user can cross check the events and respond to them as a part of network management. A user would have to configure the event log filter first for viewing the logs. After the configuration process a user can derive reports and use them for formulating the network strategies.

Steps to view the Event Log filter

Step 1: Select Start and go to the Control Panel.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Select Event Viewer.

Step 4: Now view the logs at Event Viewer Window.

Monitor Event Logs:

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step ...
... 6: Paste the content in MS Word and scroll the content.

Understand the Event Log

In an event log the Date stands for the Date of the event; Time means the actual time of the event; User stands for the user name; Computer stands for the computer name; Event ID stands for the event name; Source stands for the actual source of the event; Type stands for the Error type

Find the Events with these steps

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Select Find>> Event name>> Find Next.

Steps to filter the log events

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Select Filter Tab from View menu.

Set the log size for effective network management

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Click Set the log size (in Log size) in Maximum log size box option.

Step 7: Overwrite>> Clear Log option and OK.

Besides typing these steps and commands the Lepide Event Log Manager tool can be used. This tool can help a user in easily viewing, monitoring, modifying and managing the event logs. Log files generated from Windows based systems and web servers can be easily tracked and collected in a centralized database for revew and analysis. Since, this tool helps in creating a large log archive, the retention time of the logs increase, thereby aiding in network audits and meeting network compliance standrds.

Author Bio

The author is a Technical Manager and carry years of experience in writing technical articles. He has mentioned steps to manage the event log filter for formulating strategies on Network Management .

Total Views: 92Word Count: 539See All articles From Author

Add Comment

Computers Articles

1. How To Build A Peer-to-peer Marketplace?
Author: brainbell10

2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10

3. Everything You Need To Know About Web Development In 2026
Author: chetna

4. Create A Strong Online Presence Today
Author: FutureGenApps

5. User Experience Design
Author: brainbell10

6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10

7. The Thrilling World Of Geometry Dash Lite
Author: Hattie

8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas

9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas

10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC

11. Unreal Game Development
Author: brainbell10

12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

15. Why Choose Sataware?
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: