Solved

Windows 2000 Event Log file structure

Posted on 2001-08-08
1
166 Views
Last Modified: 2013-12-28
Any one know where can i get the Windows 2000 Event Log file structure so that i can write a simple program to read the *.evt files?

Or any recommended tools instead of built-in-dummy Event Viewer?
0
Comment
Question by:chnelson
1 Comment
 
LVL 10

Accepted Solution

by:
Longbow earned 100 total points
ID: 6363609
Hi chnelson,

Already have a job wich does the job.
Put next text to a .vbs file.
It will run if VBScript Engine 5.x (or MSIE5)
 is installed.

You will find stmadmin.dll here :
http://cwashington.netreach.net/main_site/downloads/default.asp?topic=n-z

'Beginning of .vbs file
'Check EventLog and show each record to the screen
'It only work on a local workstation. Better to come later...
'This will work if ie 5.01 is installed and admin.dll
'   registered (VBScript and WSH are needed)
'Type "regsvr32 c:\winnt\system32\stmadmin.dll" in a DOS window

Set EventLog = CreateObject("STMAdmin.EventLog")
EventLog.Open("System")               'System or Application or Security

EventLog.ReportEvent "xxx", 123, "yyy"

List = List & "Number of Records: " & EventLog.NoRecords & VbCrLf
Wscript.Echo List

For Each rec In EventLog.Records(8)
     List = ""                    'Empty previous record
     PrintRecord(rec)
Next

Sub PrintRecord(rec)
     List = List & "EventID: " & rec.EventID & VbCrLf
     List = List & "Source Author: " & rec.SourceName & VbCrLf
     List = List & "Computer Author: " & rec.ComputerName & VbCrLf
     List = List & "Event String: " & rec.Event & VbCrLf
     
     List = List & "Strings: " & VbCrLf
     For Each str In rec.Strings
          List2 = List & " " & str & VbCrLf & VbCrLf
Wscript.Echo List2
     Next
End Sub
'End of .vbs file

0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
How to complete an 'Apply Security' to a drive 25 66
Creating discover image in WDS 13 26
move command 5 31
Disabling Admin account 1 40
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Possible fixes for Windows 7 and Windows Server 2008 updating problem. Solutions mentioned are from Microsoft themselves. I started a case with them from our Microsoft Silver Partner option to open a case and get direct support from Microsoft. If s…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now