There are several types of event logs maintained by the Windows operating system. One of these is the Security event log. Windows writes to this log when auditing is turned on. Writing to the Security log is reserved for Windows only. Other applications cannot write into this particular event log.
Like events written to other event logs, some of the important elements written to the Security log include the date and time when the event occurred, the event ID, and the event source. It's also important to note the Keywords in this log since they indicate what type of audit message the event represents (i.e., "Audit Success" or "Audit Failure"). (See Figure 1.)
Figure 1. Partial display of the Security event log.
Events can be viewed by using the Event Viewer, and by default they are presented in reverse chronological order (i.e., the most recent event is on top). You can, however, sort the events by any of the event columns by clicking the column header.
This tip (12923) applies to Windows 7, 8, and 10.
The Forwarded Events event log collects events that have been forwarded from other computers. In this way you can login ...
Discover MoreFiltering a log in the Event Viewer allows you quick access to those events you're interested in watching over time. This ...
Discover MoreManaging a computer system can often involve a good deal of detective work. This tip looks at how you can use your ...
Discover MoreThere are currently no comments for this tip. (Be the first to leave your comment—just use the simple form above!)
Copyright © 2024 Sharon Parq Associates, Inc.
Comments