0% found this document useful (0 votes)
13 views5 pages

19BCE1311 Lab3

The document discusses Event Viewer and Event Log Viewer, which are tools used to view event logs on Windows systems. Event logs record system events and can be used for auditing and troubleshooting. Screenshots are provided of security-related log events like logon, logoff, and attempts to query blank passwords.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

19BCE1311 Lab3

The document discusses Event Viewer and Event Log Viewer, which are tools used to view event logs on Windows systems. Event logs record system events and can be used for auditing and troubleshooting. Screenshots are provided of security-related log events like logon, logoff, and attempts to query blank passwords.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ABHINAV VIJAYAKUMAR

19BCE1311
CSE4004 - DIGITAL FORENSICS LAB-3
DR. NAGARAJ S V (L3+L4)
--------------------------------------------------------------------------------------------
EVENT VIEWER AND EVENT LOG VIEWER

1. Event Viewer

Q. It is an important component of Microsoft’s Windows family of operating systems.


It lets administrators and users view event logs on a local or remote machine.
Applications and operating-system components can use this centralized log service
to report events that have taken place, such as a failure to start a component or to
complete an action. Event Viewer uses event IDs to define the uniquely identifiable
events that a Windows computer can encounter. Event logs record events taking
place in the execution of a system in order to provide an audit trail that can be used
to understand the activity of the system and to diagnose problems. It is often useful
to combine log file entries from several sources. This approach, in combination with
statistical analysis, may yield correlations between seemingly unrelated events on
different servers. Other solutions employ network-wide querying and reporting.
Windows Event Logs can potentially be used by a forensic examiner to show what a
user has done on a computer. They can be used to assist in answering the question
“could this happen?”
Use the Event Viewer tool in a Microsoft Windows computer and take screenshots
of THREE security related events such as
i) Logon

ii) Logoff

iii) Attempt made to query the existence of a blank password for an account
a) Logon:

b) Logoff:
c) Attempt made to query the existence of a blank password for an account:

2. Event Log Explorer


Q. Download this tool on a Windows computer and take screenshots of two security
related events such as those listed in the previous exercise.
a) Logon:
b) Logoff:
c) Account management:

You might also like