123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Lets Understand The Event Logs

Profile Picture
By Author: Lewis Bayer
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Event logs are compendium of system reports which explains the activities happening inside a computer. By referring these logs a user can cross check the events and respond to them as a part of network management. A user would have to configure the event log filter first for viewing the logs. After the configuration process a user can derive reports and use them for formulating the network strategies.

Steps to view the Event Log filter

Step 1: Select Start and go to the Control Panel.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Select Event Viewer.

Step 4: Now view the logs at Event Viewer Window.

Monitor Event Logs:

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step ...
... 6: Paste the content in MS Word and scroll the content.

Understand the Event Log

In an event log the Date stands for the Date of the event; Time means the actual time of the event; User stands for the user name; Computer stands for the computer name; Event ID stands for the event name; Source stands for the actual source of the event; Type stands for the Error type

Find the Events with these steps

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Select Find>> Event name>> Find Next.

Steps to filter the log events

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Select Filter Tab from View menu.

Set the log size for effective network management

Step 1: Go to Start>> Click Control Panel>> Performance and Maintenance.

Step 2: Performance and Maintenance>> Administrative Tools>> Computer Management/ MMC inclusive of Event Viewer snap-in.

Step 3: Click Event Viewer from the Console Tree.

Step 4: Select the logs containing desired information.

Step 5: View events from the details pane.

Step 6: Click Set the log size (in Log size) in Maximum log size box option.

Step 7: Overwrite>> Clear Log option and OK.

Besides typing these steps and commands the Lepide Event Log Manager tool can be used. This tool can help a user in easily viewing, monitoring, modifying and managing the event logs. Log files generated from Windows based systems and web servers can be easily tracked and collected in a centralized database for revew and analysis. Since, this tool helps in creating a large log archive, the retention time of the logs increase, thereby aiding in network audits and meeting network compliance standrds.

Author Bio

The author is a Technical Manager and carry years of experience in writing technical articles. He has mentioned steps to manage the event log filter for formulating strategies on Network Management .

Total Views: 88Word Count: 539See All articles From Author

Add Comment

Computers Articles

1. Access Review Fatigue Is Not A People Problem. It Is A Design Problem
Author: Tushar Pansare

2. Which Is The Best Data Recovery Service Provider In Delhi?
Author: Stellar Data Recovery India

3. Microsoft Access 2024 Vs. Microsoft Excel 2024: Which Tool Should You Use?
Author: davudobuya55

4. When Identity Governance Becomes An Audit Ritual
Author: Mansoor Alam

5. Power Virtual Agents To Microsoft Copilot studio
Author: brainbell10

6. Dream11 Clone App Guide For The Upcoming Ipl Season
Author: Jorden James

7. Computer Network Tutorial: Step-by-step Guide To Networking Fundamentals
Author: Tech Point

8. Ai Video Creation Services In Chandigarh | Growchip Ai Technologies
Author: AI Video Creation Services

9. Why Online Privacy Matters More Than Ever In 2026
Author: Faraz

10. Spark Matrix™: Data Integration Tools
Author: Umangp

11. D365 Consultant Business Success
Author: brainbell10

12. Medical High-end Touch Monitor From Fortec Integrated
Author: FORTEC Integrated GmbH

13. Why Rugtek Ls3002 Is Best For Retail Barcode Scanning
Author: prime pos

14. Spark Matrix™: Conversational Commerce
Author: Umangp

15. Multi-path Cellular Aggregation | Cellular Sd-wan India | Smoad
Author: SMOD

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: