Application log will comprise events logged by programs and on the basis of severity of events, they are majorly divided as; information, warning, or error. Information infers that the program or service operation is successful done. Warning indicate future crisis which is not significant at present but has to be noticed to avoid future issues.
Error completely shows that a problem has occurred for e. Events recorded in security logs are known as Audits and explains successful or unsuccessful attempts made to log on services like logging-in in Windows. The events associated with the usage of resources for instance; execution done of files delete, open, etc. When you make an attempt to log-on Windows as an Administrator or member of Administrator group, the attempts valid or invalid are also recorded here in this log.
This log comprises the events logged by Windows 7 components. In case any driver fails to load or execute when you start the system, this log system log will record this event. These are also recorded as; information, warning or error, and comprises the information about Windows 7 components. Setup Logs are available for computers with domain controllers. Windows 7 will show this Setup Logs along with the other logs in menu. Step 1 : Go to Start menu and then click Control Panel. Here in the Control Panel click on Administrative Tools.
Step 2 : Another Pop-up opens up with a menu of services. Event Viewer will be one of the options; double-click it to proceed. Step 3 : In the left panel console-tree of Event Viewer , go to Windows log and expand it.
Step 4 : Go for the Event log , you want to view and double-click it. For instance, here we will check the Application log. This will enlist all the events in Application log. Select any event and double click it to view Event Properties. Note : An online link is provided to tackle such kind of error events in the display of event properties in More Information section. Step 5 : Go to Details tab to view more details. The larger the size, the more events it can save, but at the same time, it takes up space and impacts performance.
We can also specify what to do when the maximum event log size is reached. The default is to overwrite events as needed. Only the administrator will be able to log on to the computer and clear the log. We can filter our logs by choosing the Filter Current Log option from the Actions menu.
In the filter we can specify the event level critical, warning, verbose, error, information. Also, we can enter IDs, task categories, keywords, users, and computer to filter using this criteria. Keep in mind that filters are only active only while we stay in the current log.
If we select another log, the filter will reset. If we want to define our own view with filters and preserve it, we can create a custom view from the Actions menu. The custom view has the same options as when creating a filter. In our case we will create a view which will only show us errors that happened in the last 24 hours in the Applications log. Note that when we choose the log, we can combine multiple logs if we wish.
We can even use the Applications and Services Logs which can show us events from hardware, Internet Explorer, and even more details events under the Microsoft section from other Windows services. Almost every major Windows service has its own log.
When we define our own view, we can name it and give it description. We can even organize our custom views in folders. We can always edit our custom view by right-clicking it and choosing the appropriate option, as well as export it.
This site uses Akismet to reduce spam. Learn how your comment data is processed. Event Properties Event properties give us more information about the event. Task Name On the next screen we can see that it will by default fill the log, source, and event ID information for us.
Event Logged On the next screen we can specify the action we want the task to perform. Task Action If we select a program, we will be able to select a program or script that the task will run.
Task Program or Script If we specify to send an e-mail, we can specify from whom the e-email should come from, who will receive it, subject, text, attachment, and we need to specify the SMTP server.
0コメント