Viewing Other Security-Related Logs

Some applications and services generate their own logs of security-related events. The security log format, location, and options are likely to be different for each application or service, so you'll need to do some sleuthing. We mention the possibility here so that you can start your own investigation. Here are a few clues to get you started:

  • If you use Windows Firewall, you can configure it to keep track of blocked (or successful) connections. It stores the log in %SystemRoot%\Pfirewall.log by default. Although it's a standard text file, it's difficult to read in its raw form.


    For information about configuring the Windows Firewall log and instructions for displaying it in a more useful form, see Configuring ...

Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.