-
You click on the event viewer and you'll see the help inside.
It's convenient for you to paste a little bit for you to see.。。
Overview of the Event Viewer.
In Event Viewer, you can gather information about hardware, software, system issues, and monitor Windows security events by using the event log.
Windows logs events with three types:
Application logs.
Application logs contain events that are logged by an application or a general program. For example, a database program uses an application log to log file errors. The developer decides which events to be logged.
System logs. The system log contains events that are logged by Windows system components. For example, record failures of drivers or other system components to be loaded during boot in the system log. The types of events that are logged by system components are predetermined.
Security logs. Security logs can record security events such as valid and invalid login attempts, as well as events related to resource usage, such as creating, opening, or deleting files. Administrators can specify the events that are logged in the security log.
For example, if you have login auditing enabled, system login attempts are logged in the security log.
The Event Viewer displays the following event types:
Mistake. Important issues such as data loss or loss of functionality. For example, if a service fails to load during startup, an error is logged.
Warn. Not very important but potentially problematic events in the future. For example, if there is less disk space, a warning is logged.
Information. An event that describes the successful operation of an application, driver, or service. For example, an informational event is logged when a network driver is successfully loaded.
Successful audits. Audit the success of the secure access attempt. For example, a user's attempt to successfully log on to the system is logged as a "success audit" event.
Failed audits. Audit security access attempts failed. For example, if a user attempts to access a network drive and fails, that attempt is logged as a Failure Audit event.
When you start Windows, the Event Log service starts automatically. All users can view application logs and system logs, but only administrators have access to security logs.
Security logs are turned off by default. You can use Group Policy to enable security logging. Administrators can also set an audit policy in the registry to stop the system when the security log is full.
For more information, see related topics.
-
Keep a record of the security of the system and the start and stop of applications and services.
Error messages are also logged to help the user diagnose the system.
-
Method 1: You can right-click the mouse to "My Computer" ("Computer" in Windows 7), select "Manage" under the pop-up shortcut menu, the computer management menu will pop up, select "Event Viewer" under the menu, click to appear three options, in which the system can help users check the last time the computer was turned on and off.
Method 2: Click "Start Run", enter eventvwr, and click "OK" to open the event viewer.
Method 3: Click Start - Settings - Control Panel - Administrative Tools - Event Viewer to open the Event Viewer window.
Method 4: Type %systemroot% system32 s in the Run dialog box to open the Event Viewer window.
Method 5: The fastest way is to click Start and enter Event or Event Viewer.
-
Win7 Event Viewer is a Microsoft Windows operating system tool that is used to view information, search for events, and store logs to solve system-related problems. Microsoft has integrated an event viewer in all operating systems with Windows NT as the kernel.
The role of the Win7 Event Viewer.
1.View the information.
Select the log type (Application, Security, or System) in the tree diagram on the left side of the Event Viewer, and the details pane on the right will display all the logs for that class in the system, and you can view its details by double-clicking on one of them.
Select the log type (Application, Security, or System) in the tree diagram on the left, right-click View, and select Filter. The log filter will start.
3.Keep logs.
System logs, security logs, application logs, and the corresponding information, warnings, or errors are stored.
-
The Event Viewer is all about viewing logs of system and software runs.
-
Once you have identified the incidents that are causing the system problems, you need to find a solution to them. There are two main ways to find solutions to these problems: Microsoft's Technical Support Knowledge Base and EventId net**。
Microsoft Technical Support Knowledge Base (KB): The articles in the Microsoft Knowledge Base are composed of official Microsoft materials and technical articles written by Microsoft MVP (Microsoft Most Valuable Experts), mainly to solve the problems and failures of Microsoft products.
When a bug and error-prone application point of each Microsoft product is discovered, there will be a corresponding KB article analyzing the solution to the error.
Enter the relevant keywords in the "Search (Knowledge Base)" section on the left side of the Microsoft Knowledge Base webpage to query the source and ID of the event. Of course, it's also a good idea to enter keywords in the detailed description, and if there is an error number in the log, it's not a bad idea to enter that error number to query.
Once logged in, click on the "Search Events" link and the event search page will appear. Enter the Event ID and Event Source as prompted, and click Search. ** The system will find all relevant resources and solutions.
Best of all, enjoying these solutions is completely free. Of course, ** paid users can enjoy better services, such as direct access to a collection of knowledge base articles for an event.
In addition to these two, the Microsoft Chinese community provides free technical support and regular expert chats, which can be a valuable resource for solving system problems with a little utilization.
1. Disable the event log service: Open the "Control Panel--- Performance and Maintenance --- Management Tool --- Services" (or run it directly, double-click the "Event Log" service and select Disable.) >>>More
Sniffer, a little inconvenient to use, but very powerful, a way to view the traffic of LAN machines from winbox. >>>More
For XP, let's talk about it in a nutshell.
Local security policy: It is to set the policy, for example: password policy, specify the minimum number of passwords; Internet access policy, closing a certain port, etc. >>>More
There are many reasons why the Internet is slow, and it doesn't have to be the router. You should first check if your computer has any viruses; Among the users who use this router, there is no P2P software, such as Thunderbolt, QQ Whirlwind, BT, etc. Then you can plug the main line into a single computer and use it first. >>>More
I don't really understand what you mean, you mean that your dormitory has a fixed IP for each network cable, and you want to connect to a wireless router, and then the router assigns this IP to the computer,? >>>More