O'Reilly logo

Microsoft® Windows® Security Resource Kit, Second Edition by The Microsoft Security Team, Brian Komar, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring Audited Events

A number of methods exist for monitoring events written to the security Event log. These methods range from reading the events manually by using the Event Viewer to using powerful automated event-consolidating and event-monitoring software such as Microsoft Operations Manager. Each method serves a specific purpose; you need to select a method that is most appropriate for your environment and particular situation. These are the four primary methods for monitoring events:

  • Event Viewer

  • Custom scripts

  • Event Comb

  • Fully automated tools, such as Microsoft Operations Manager

The discussion of fully automated event-monitoring tools is outside the scope of this book. This section covers the other three methods.

Using the Event ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required