Checks the Windows Event Log on remote machines for specified events.
The Windows Event Log Event Monitor is the best way to detect events and get alerts. It can monitor any event logs you choose including the extended event logs introduced with Windows Server 2008. It includes a wide variety of filtering options and can also export detected events to a SQL server database for archival, auditing, and data warehouse integration.
This event monitor provides the following options:
Select the event log that the event monitor will check. For event logs other than the standard three, go to the Event Viewer and right-click on the event log you want to monitor. Choose "Properties" from the menu. In the window that appears copy and paste the value from the "Full Name" text box.
Use this option to alert if the event monitor cannot connect to the network device.
Most event logs are configured to automatically overwrite older log entries. For event logs with this option disabled, use this option to get alerts when they are full.
Use this option to generate alerts based on the number of events in the event log.
Use this option to scan the contents of the event log for records that match the filters you specify.
Select the event log types that will be checked. You can select multiple event types.
Each event record contains an event ID. The event ID usually uniquely identifies an event from a particular source; however, this can vary depending on the application or service that generated the event. Different sources may use the same event ID; however, events from a particular source should have their own unique IDs.
Filter by event user name. Not many events have user names associated with them, but for those that do, it can be very useful to filter on it and track down what caused the event to be generated.
Enter one or more sources that the event monitor will use as a filter.
With this option, you can specify text strings that the event monitor will look for and use based on the filtering option that you choose.
With this option selected the event monitor will include the matching event log records in all notifications.
This option tells the event monitor to pick up where it last stopped and look only at new event log records. If you turn this option off the event monitor will scan the entire event log on every run.
With this option enabled, the event monitor will report the success status for all matching events. It is mostly useful for conditions where you want to detect informational events.
When this option is selected, the event monitor will search for Security Identifiers (SIDs) in the events and attempt to convert them into account names which are easier to read and understands.
Use this option to export the matching events to a SQL Server database. The event monitor will automatically create the necessary table and populate it with the event log data. Specify the server name, database name, and credentials to allow the event monitor to connect. The table will be called 'windowseventlog'.
The account used for authentication must be a member of the Event Log Readers group or have admin rights. To monitor the Windows Security event log, admin rights are required.
This event monitor does not generate any data points.
To view the tutorial for this event monitor, click here.
Add a comment