Windows Logs You can use Windows Logs to store events from legacy applications and to store events that apply to the entire system itself. In Windows 7 and Vista, these logs include five basic types: The system log contains events logged by system components.
For example, the system log records when a driver or other system component like a service fails to load during startup. The operating system predetermines the type of events that are recorded. The security log can contain valid and invalid login attempts, as well as events related to resource use, such as creating, opening, or deleting files or other objects.
For example, if you're using the User Manager for login and logout auditing, the security log records attempts to log into the system. The administrator of the computer chooses what the security log monitors. The application log contains events logged by applications. For example, a database program might record a file error in the application log. Application developers decide which events to monitor. The Setup log contains events related to application setup. The ForwardedEvents log stores events collected from remote computers.
All users can view the system and application logs, but only system administrators can access the security logs.
Indiana University policy Security of Information Technology Resources IT requires that you normally refrain from running your Windows computer as an administrator. For more, see About the principle of least privilege.
These logs contain events from single programs or components rather than events that impact the entire system. There are five types of Applications and Services logs: These logs record problems that directly affect end users and have well-defined solutions. These logs record events that aren't necessarily problems, but are simply records of occurrences e.
Analytic logs record problems that Windows notes, but that most users will not be able to solve easily on their own. They tend to record specialized issues with Windows, such as providing debugging information for problems with enabling and using the Encrypted file system, or issues with missing elements of the user interface. Debug events are records of problems that programmers can use for troubleshooting.
This application log appears only when Internet Explorer 7 or later is installed; for the majority of users it remains empty and can be ignored. However, for administrators and developers who have installed the Microsoft Application Compatibility Toolkit, the Internet Explorer log is necessary. Internet Explorer 7 and later contain many security features not included in previous versions, and some content or web applications will not function as they did previously.
With the toolkit installed and Application Compatibility Logging enabled, this log will record events that relate to whether content is displayed or executed in Internet Explorer.
Developers or administrators can then diagnose content problems in Internet Explorer. This will allow them to either reconfigure the browser or application, or rewrite problematic code. Administrators can therefore construct XML queries against information found in Event Viewer, and then parse the output for display in other applications.
If this doesn't match what you see, refer to Getting around in Windows. For example, when a driver or other system component like a service fails to load during startup, this is recorded in the system log. The operating system predetermines the type of events kept in the system log. For example, if you are using the User Manager to enable login and logout auditing, attempts to log into the system are recorded in the security log.
This application log only appears when Internet Explorer 7 is installed; for the majority of users it remains empty and can be ignored. Internet Explorer 7 contains many security features not included in previous versions, and some content or web applications will not function as they did previously. With the toolkit installed and Application Compatibility Logging enabled, this log will record events that relate to whether content is displayed or executed in Internet Explorer 7.
All users can view the system and application logs. The security logs are accessible only to the system administrators. Double-click Administrative Tools, and then select Event Viewer. This is document aivi in the Knowledge Base. Last modified on Please note that you must be affiliated with Indiana University to receive support.
All fields are required. Full name Email address Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address. If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.
Relationship to Indiana University My comment concerns this document Your comments.