What is the Purpose of the Application Event Log?

by Barry Dysert
(last updated May 22, 2017)

There are several types of event logs maintained by the Windows operating system. One of these is the Application event log. This log is used to record events written by applications and services. The applications may be commercial applications, like SQL Server or Exchange, or they may be custom applications that you've developed yourself. The events written to the Application event log can run the gamut from application startup events to shutdown events to "heartbeat" events to run-time error events. The same holds true for events written by Windows services.

Like events written to other event logs, some of the important elements written to the Application log include the date and time when the event occurred, the event ID, and the event source. (See Figure 1.)

Figure 1. Partial display of the Application event log.

Events can be viewed by using the Event Viewer. By default they are presented in reverse chronological order (i.e., the most recent event is on top). You can, however, sort the events by any of the event columns by clicking the column header.

 This tip (12886) applies to Windows 7, 8, and 10.

Author Bio

Barry Dysert

Barry has been a computer professional for over 35 years, working in different positions such as technical team leader, project manager, and software developer. He is currently a software engineer with an emphasis on developing custom applications under Microsoft Windows. When not working with Windows or writing Tips, Barry is an amateur writer. His first non-fiction book is titled "A Chronological Commentary of Revelation." ...

MORE FROM BARRY

How to Change Drive Letters

Windows is quite configurable. It even allows you to change the drive letters associated with your disk drives. Although ...

Discover More

Using Two Monitors with Windows

Windows is great about letting you work on multiple things at the same time. Often, however, you end up with so many ...

Discover More

Getting Rid of Hidden Thumbs.db Files

A hidden file that the system uses to speed performance of your viewing folders containing pictures is called Thumbs.db. ...

Discover More
More WindowsTips

What is the Purpose of the Security Event Log?

The Security event log captures success and failure audit events when auditing is turned on. This tip explains a bit more ...

Discover More

Viewing Event Logs

Event logs are automatically maintained by the operating system. By periodically viewing them, you'll have a better idea ...

Discover More

Changing How Event Log Overruns are Handled

By default, the event logs are implemented in a circular buffer, i.e., when its maximum size is reached, the oldest ...

Discover More
Subscribe

FREE SERVICE: Get tips like this every week in WindowsTips, a free productivity newsletter. Enter your address and click "Subscribe."

View most recent newsletter.

Comments

If you would like to add an image to your comment (not an avatar, but an image to help in making the point of your comment), include the characters [{fig}] in your comment text. You’ll be prompted to upload your image when you submit the comment. Maximum image size is 6Mpixels. Images larger than 600px wide or 1000px tall will be reduced. Up to three images may be included in a comment. All images are subject to review. Commenting privileges may be curtailed if inappropriate images are posted.

What is five minus 4?

There are currently no comments for this tip. (Be the first to leave your comment—just use the simple form above!)


Newest Tips
Subscribe

FREE SERVICE: Get tips like this every week in WindowsTips, a free productivity newsletter. Enter your address and click "Subscribe."

(Your e-mail address is not shared with anyone, ever.)

View the most recent newsletter.