官术网_书友最值得收藏!

Collecting network logs

All machines on your network are not likely to be Linux; therefore, to keep a balance of things, we will use Windows as an example for this exercise.

To start Event Viewer, click on the start button and write Event Viewer, as shown in the following screenshot:

Collecting network logs

The Event Viewer will open up as shown in the following screenshot:

Collecting network logs

Event Viewer stores consists of the following components:

  • Custom Views
  • Windows Logs
  • Applications and Services Logs

The different views stores are as follows:

  • Custom Views:
    • Administrative Events: This contains the Critical, Error, and Warning events from all administrative logs, as shown in the following screenshot:

      Collecting network logs

    • Location Activity: As the name suggests, this contains the location activity, as shown in the following screenshot:

    Collecting network logs

  • Windows Logs: Windows log stores events from legacy applications and events that apply to the entire system:
    • Application: The Application log stores events logged by the applications or programs. For example, a database progmemory might record a file error in the application log. The developers of the progmemory module decide which events to log, as shown in the following screenshot:

      Collecting network logs

    • Security: The Security log stores events such as valid and invalid log on attempts as well as events related to resource use, such as creating, opening, or deleting files or other objects. Administrators can specify which events are recorded in the security log. For example, if you have enabled logon auditing, attempts to log on to the system are recorded in the security log, as shown in the following screenshot:

      Collecting network logs

    • Setup: The Setup log stores events related to application set up, as shown in the following screenshot:

      Collecting network logs

    • System: The System log stores events logged by the Windows system components. For example, the failure of a driver or other system component to load during startup is recorded in the System log. The event types logged by system components are predetermined by Windows, as shown in the following screenshot:

      Collecting network logs

    • Forwarded Events: The Forwarded Events logs store events collected from remote computers, as shown in the following screenshot:

    Collecting network logs

  • Application and Services Logs: These logs store events from a single application or component rather than events that might have system-wide impact:
    • Broadband Wireless LAN:

      Collecting network logs

    • Hardware Events:

      Collecting network logs

    • Internet Explorer:

      Collecting network logs

    • Key Management Services:

      Collecting network logs

    • Media Center:

      Collecting network logs

    • Windows event logs:

    Collecting network logs

主站蜘蛛池模板: 北川| 桓台县| 堆龙德庆县| 罗城| 桃江县| 鹤岗市| 仙桃市| 饶平县| 砚山县| 蚌埠市| 休宁县| 修水县| 泗水县| 邵东县| 伊川县| 清丰县| 满洲里市| 开封市| 东乌珠穆沁旗| 芦溪县| 临江市| 信阳市| 金溪县| 维西| 谢通门县| 双辽市| 长阳| 渝北区| 望城县| 沾益县| 双鸭山市| 阿尔山市| 马山县| 赫章县| 邳州市| 荔波县| 绵阳市| 诸暨市| 云林县| 剑川县| 阜宁县|