eventvwr
Cheatsheet
1. Opening Event Viewer
Use
eventvwr.msc
from the Run dialog or search for "Event Viewer" in the Start menu.
2. Filtering Events
Use the "Filter Current Log" option to narrow down events based on criteria like Event ID, Keywords, etc.
3. Creating Custom Views
Use "Create Custom View" to save specific filters for quick access.
4. Exporting Logs
Use the "Save All Events As" option to export logs in various formats (e.g., CSV, XML).
5. Clearing Logs
Use the "Clear Log" option to delete all events from a specific log.
6. Attaching Tasks to Events
Use the "Attach Task To This Event" option to perform specific actions when an event occurs.
7. Using Event Viewer with PowerShell
Leverage PowerShell cmdlets like
Get-EventLog
andGet-WinEvent
to query and manage event logs.
8. Understanding Event Levels
Familiarize yourself with event levels (Information, Warning, Error, etc.) to prioritize investigations.
9. Understanding Event Sources
Identify the source of events to understand which application or component logged them.
10. Analyzing Event Details
Dive into the "Details" tab of an event to understand its specifics and troubleshoot effectively.
Event IDs in Microsoft Event Viewer
1. Event ID 4624: Successful Logon
Indicates a user successfully logged on to a computer.
2. Event ID 4625: Logon Failure
Indicates a failed logon attempt.
3. Event ID 4634: Logoff
Indicates a user logoff.
4. Event ID 4648: Explicit Credential Logon
Indicates a logon using explicit credentials.
5. Event ID 4663: File/Directory Access
Indicates an attempt to access a file or directory.
6. Event ID 4672: Special Privileges Assigned
Indicates special privileges assigned to a new logon.
7. Event ID 4688: Process Start
Indicates a new process creation.
8. Event ID 4689: Process End
Indicates a process termination.
9. Event ID 4698: Scheduled Task Created
Indicates a scheduled task was created.
10. Event ID 4700: Scheduled Task Enabled
Indicates a scheduled task was enabled.
11. Event ID 4719: System Audit Policy Change
Indicates a change in audit policy.
12. Event ID 4720: User Account Created
Indicates a user account was created.
13. Event ID 4722: User Account Enabled
Indicates a user account was enabled.
14. Event ID 4725: User Account Disabled
Indicates a user account was disabled.
15. Event ID 4738: User Account Changed
Indicates a user account was changed.
16. Event ID 4740: User Account Locked Out
Indicates a user account was locked out.
17. Event ID 4776: Credential Validation
Indicates a domain controller attempted to validate credentials.
18. Event ID 4798: User Account Query
Indicates a query was issued for a user account.
19. Event ID 4904: Security Auditing Setting Modification
Indicates an attempt to modify the per-user auditing settings.
20. Event ID 4946: Windows Firewall Rule Added
Indicates a new Windows Firewall rule was added.
Example PowerShell Commands
Query Specific Event ID
Query Events within a Date Range
Query Events from a Specific Log Source
Last updated