Solved

remote viewing event log of another computer

Posted on 2004-08-24
5
2,019 Views
Last Modified: 2013-12-04
Currently, I have to net use a remote computer resource and able to view the event log of the remote computer under Computer Management (windows 2000)

For security reason, it is required to stop "remote registry service" in Windows 2000 which make remote event log viewing failure.

However, we have to monitor the event log of other computer to see whether there is any
application error.

Can it be achieved?
0
Comment
Question by:alexchiu
  • 3
5 Comments
 
LVL 3

Expert Comment

by:Julian_C
Comment Utility
Have you tried running psloglist out of the freeware pstools on www.sysinternals.com? It's not a nice clean solution but you could shell out to it and get it to dump the logs to a file. Worth a try. Unfortunately they don't list the source code for this tool as they do for many of the others. BUT if it does work it's using the Win32 API calls (not WMI etc I think) so you might find the following article helps you.

http://www.ftponline.com/archives/premier/mgznarch/vbpj/2001/11nov01/lj0111/lj0111-1.asp

Cheers
Julian
0
 
LVL 3

Expert Comment

by:Julian_C
Comment Utility
Sorry, I just reread your question and see that you aren't having to code this, just view the logs. In which case psloglist may well assist.

Cheers
Julian
0
 
LVL 5

Expert Comment

by:juliancrawford
Comment Utility
you could use eldump.exe to extract the remote event logs
http://www.ibt.ku.dk/jesper/ELDump/default.htm
0
 

Author Comment

by:alexchiu
Comment Utility
Thanks for your comment.
However, I have to switch off the "Remote Registry Service".   After switching off, both of the tools do not work to dump the log.
0
 
LVL 3

Accepted Solution

by:
Julian_C earned 50 total points
Comment Utility
Are you allowed to dump the logs on the machine, perhaps using a scheduled job and pick the files up or just running one of the tools remotely?
Cheers
Julian
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now