官术网_书友最值得收藏!

Collecting network logs

All machines on your network are not likely to be Linux; therefore, to keep a balance of things, we will use Windows as an example for this exercise.

To start Event Viewer, click on the start button and write Event Viewer, as shown in the following screenshot:

Collecting network logs

The Event Viewer will open up as shown in the following screenshot:

Collecting network logs

Event Viewer stores consists of the following components:

  • Custom Views
  • Windows Logs
  • Applications and Services Logs

The different views stores are as follows:

  • Custom Views:
    • Administrative Events: This contains the Critical, Error, and Warning events from all administrative logs, as shown in the following screenshot:

      Collecting network logs

    • Location Activity: As the name suggests, this contains the location activity, as shown in the following screenshot:

    Collecting network logs

  • Windows Logs: Windows log stores events from legacy applications and events that apply to the entire system:
    • Application: The Application log stores events logged by the applications or programs. For example, a database progmemory might record a file error in the application log. The developers of the progmemory module decide which events to log, as shown in the following screenshot:

      Collecting network logs

    • Security: The Security log stores events such as valid and invalid log on attempts as well as events related to resource use, such as creating, opening, or deleting files or other objects. Administrators can specify which events are recorded in the security log. For example, if you have enabled logon auditing, attempts to log on to the system are recorded in the security log, as shown in the following screenshot:

      Collecting network logs

    • Setup: The Setup log stores events related to application set up, as shown in the following screenshot:

      Collecting network logs

    • System: The System log stores events logged by the Windows system components. For example, the failure of a driver or other system component to load during startup is recorded in the System log. The event types logged by system components are predetermined by Windows, as shown in the following screenshot:

      Collecting network logs

    • Forwarded Events: The Forwarded Events logs store events collected from remote computers, as shown in the following screenshot:

    Collecting network logs

  • Application and Services Logs: These logs store events from a single application or component rather than events that might have system-wide impact:
    • Broadband Wireless LAN:

      Collecting network logs

    • Hardware Events:

      Collecting network logs

    • Internet Explorer:

      Collecting network logs

    • Key Management Services:

      Collecting network logs

    • Media Center:

      Collecting network logs

    • Windows event logs:

    Collecting network logs

主站蜘蛛池模板: 宁安市| 绥化市| 周口市| 仁怀市| 沿河| 新宁县| 沽源县| 镇原县| 东山县| 汝阳县| 玛纳斯县| 长宁区| 岚皋县| 滁州市| 辽宁省| 榆中县| 庄浪县| 鲜城| 芒康县| 达日县| 池州市| 泗水县| 方山县| 乐东| 天津市| 普定县| 如东县| 余庆县| 新泰市| 阿克苏市| 屏东县| 连山| 济南市| 平遥县| 庐江县| 宁国市| 吉水县| 友谊县| 江都市| 博爱县| 塘沽区|