What is the Purpose of the Forwarded Events Event Log?

by Barry Dysert
(last updated November 21, 2016)

1

There are several types of event logs maintained by the Windows operating system. One of these is the Forwarded Events event log. This log records events written by other computers in the same network ("source computers") that have forwarded their events to the "collector computer." By using the Forwarded Events log, you can keep track of the event logs of several other computers from one central location.

In order to make use of the Forwarded Events log, you have to configure the source computers and the collector computer. From each source computer, run the following command from an elevated-permissions command prompt:

C:\> winrm quickconfig

You must also add the computer account of the collector computer to the local Administrators group on each of the source computers.

Then on the collector computer run the following command from an elevated-permissions command prompt:

C:\> wecutil qc

Finally, you must establish a subscription so that the computers know which events are to be collected on the collector computer. Perform the following steps on the collector computer:

  1. As an administrator, launch the Event Viewer and click Subscriptions in the navigation pane.
  2. In the Actions pane, click Create Subscription.
  3. Fill in the details of your subscription per the following figure. (See Figure 1.)
  4. Figure 1. Creating a subscription.

Now the specified events that occur on the source computers will be forwarded to the Forwarded Events log, where you can analyze them all from one machine.

 This tip (12878) applies to Windows 7, 8, and 10.

Author Bio

Barry Dysert

Barry has been a computer professional for over 35 years, working in different positions such as technical team leader, project manager, and software developer. He is currently a software engineer with an emphasis on developing custom applications under Microsoft Windows. When not working with Windows or writing Tips, Barry is an amateur writer. His first non-fiction book is titled "A Chronological Commentary of Revelation." ...

MORE FROM BARRY

Using File History

Backing up your data is an important part of computer management. Enabling File History is a painless way to be able to ...

Discover More

Backing Up the Windows Registry

Windows wouldn't function if it weren't for the Registry. It's important, therefore, to back it up�"especially before ...

Discover More

Filtering Event Logs

Filtering a log in the Event Viewer allows you quick access to those events you're interested in watching over time. This ...

Discover More
More WindowsTips

Changing How Event Log Overruns are Handled

By default, the event logs are implemented in a circular buffer, i.e., when its maximum size is reached, the oldest ...

Discover More

Using the Event Viewer to Examine Remote Event Logs

Assuming you have proper access to remote computers, you can examine their event logs from your system without much ...

Discover More

Deleting Events in Your Event Logs

You don't need to worry about event logs filling up your disk, but you still may want to clean them out eventually. This ...

Discover More
Subscribe

FREE SERVICE: Get tips like this every week in WindowsTips, a free productivity newsletter. Enter your address and click "Subscribe."

View most recent newsletter.

Comments

If you would like to add an image to your comment (not an avatar, but an image to help in making the point of your comment), include the characters [{fig}] in your comment text. You’ll be prompted to upload your image when you submit the comment. Maximum image size is 6Mpixels. Images larger than 600px wide or 1000px tall will be reduced. Up to three images may be included in a comment. All images are subject to review. Commenting privileges may be curtailed if inappropriate images are posted.

What is 4 - 3?

2016-12-20 11:20:24

David Hill

I am new to setting up event log collection. I am wondering is the log data sent in real time as the event occurs to the collection server or is it a specified interval. I ask this because due to the nature of our work the security event log gets very big very fast due to watching file access.

Thank You


Newest Tips
Subscribe

FREE SERVICE: Get tips like this every week in WindowsTips, a free productivity newsletter. Enter your address and click "Subscribe."

(Your e-mail address is not shared with anyone, ever.)

View the most recent newsletter.