programming4us
           
 
 
Windows Server

Windows Server 2003 : Auditing Events (part 2) - Setting the Size of Event Logs

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/14/2011 9:13:13 AM

Viewing Event Logs

Event logs must be viewed with regularity for auditing to have any effect. To view the security log, open Event Viewer from the Administrative Tools folder and then click Security. Double-click any entry to see more information about it. The security entries in Figure 3 occurred in the span of about a minute because the object being audited was set to audit successful events. Of course, you’ll generally learn more from auditing failed events than from auditing successful ones, but this does demonstrate the need to choose your auditing battles carefully.

Figure 3. Viewing the security log

Searching Event Logs

No matter how selective you are, the event logs will mix all sorts of information together, making searches for specific information difficult. To search for a specific type of event, select the log in Event Viewer, and choose Find from the View menu. In the Find dialog box, shown in Figure 4, select the type or types of events you want returned. Table 3 describes the filtering options for the event logs.

Figure 4. Searching for specific events in a log


Table 3. Options for filtering event logs
OptionUse to Search or Filter for
InformationNotification that some major operation has been performed successfully.
WarningNotification of some problem or potential problem. Warnings might or might not be significant. For example, replication performed after repeated tries will generate a warning.
ErrorNotification of an important event. Errors signify a loss of data or a loss of function. For example, failure of a service to start during bootup will generate an error.
Success AuditEvents audited for success.
Failure AuditEvents audited for failure.
Event SourceA source for an event, such as a system component or a program.
CategoryEvents by category, such as logon/logoff, policy change, or process tracking.
Event IDThe specific ID number assigned to each logged event.
UserA specific user.
ComputerA specific computer.
FromEvents after a specific date. The default is the first date in the log. You can click the drop-down box to select events on a specific date.
ToEvents before a specific date. The default is the last date in the file.

Filtering Event Logs

If you don’t have enough specific information to locate what you need, you can filter an event log for certain types of information. To use event log filtering, follow these steps:

1.
Launch Event Viewer from the Administrative Tools folder.

2.
Right-click the log you want to search, and choose Properties from the shortcut menu.

3.
Click the Filter tab. Table 3 describes the fields in this tab. Click OK when you’re ready to start filtering.

4.
The log appears, filtered as you requested. To view the full, unfiltered log again, return to the Filter tab and click Clear.

Setting the Size of Event Logs

When an event log is full, a dialog box pops up to notify you. If this happens often, you might want to reduce the number of items being reported or increase the size of the log. To set event log options, follow these steps:

1.
Launch Event Viewer from the Administrative Tools folder.

2.
Right-click the log you want to configure and choose Properties.

3.
In the General tab, set the options you want. Under When Maximum Log Size Is Reached, there are three options:

  • If you don’t archive this log, select Overwrite Events As Needed.

  • If you archive this log at regular intervals, you can select the Overwrite Events Older Than option. Fill in the appropriate number of days.

  • Do Not Overwrite Events, the last option, means that the log must be cleared manually. When the maximum log size is reached, new events are simply not recorded.

4.
Click OK when you’re finished.

Note

To set limits for a large number of machines—a department or a whole domain—use Group Policy.


Calling a Halt When the Log Is Full

Maybe you are so security-conscious that none of the event log options are acceptable. If you absolutely, positively must not lose a single security event, you can set the computer to halt when the security log is full. A registry change is necessary to make this happen. First, set Event Log Wrapping to either Do Not Overwrite Events or Overwrite Events Older Than n Days. Then start Regedit.exe, proceed to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\CrashOn AuditFail, and change the value to 1.

This setting takes effect after a reboot; then, when the log is full, the system simply stops. After restarting, only administrators are able to log on until the security log is cleared. This is obviously a drastic measure, but if you absolutely must retain an audit trail on a particular server, this is one way to ensure that.


Archiving Event Logs

If you will be using event logs to track system usage trends, you must save them. To archive an event log, launch Event Viewer from the Administrative Tools folder and click the log you want to archive. Then, from the Action menu, choose Save Log As. If you save the file in the event log format (.evt), it can be reopened in Event Viewer, and all the binary data for each event is retained. You can also save logs as .txt files or in comma-delimited format (.csv), but in those cases the binary data isn’t saved.

Other -----------------
- Windows Server 2003 : Using the Secondary Logon
- Windows Server 2003 : Using the Microsoft Management Console - Creating an MMC-Based Console with Snap-Ins
- Installing Windows Small Business Server 2011 : Selecting Network Components (part 2) - Preparing for the Installation
- Installing Windows Small Business Server 2011 : Selecting Network Components (part 1) - Selecting an Internet Service Provider
- Planning a Windows SBS 2011 Deployment
- Windows Small Business Server 2011 : A Networking Primer - Understanding Domains
- Windows Server 2008 : Using wbadmin (part 2) - Backing Up & Restoring Volumes with wbadmin
- Windows Server 2008 : Using wbadmin (part 1)
- Windows Home Server 2011 : Understanding Security Groups & Adding a New User
- Setting Up Your Windows Home Server 2011 Network : Handling Multiple Network Subnets & Making a Remote Desktop Connection to the Server
- Windows Small Business Server 2011 : A Networking Primer - Ethernet/IEEE 802.3 & TCP/IP Basics
- Windows Small Business Server 2011 : A Networking Primer - Networking Hardware
- Windows Server 2008 Server Core : Installing Applications with the MSIExec Utility
- Windows Server 2008 Server Core : Getting System Configuration Information with the SystemInfo Utility
- Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 2)
- Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 1)
- Windows Server 2008 : Working with Event Subscriptions - Managing Subscriptions with wecutil & Logging Events with eventcreate
- Windows Server 2003 : Managing Security Configuration with Security Templates (part 2)
- Windows Server 2003 : Managing Security Configuration with Security Templates (part 1)
- Setting Up Your Windows Home Server 2011 Network : Configuring Windows Home Server for Networking
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us