Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How do I get EventLogs via command Line

Posted on 2004-10-13
3
149 Views
Last Modified: 2010-04-13
I have a few win2k boxes that I would like to be able to grab the Evrnt Logs.

Is there a utility to do this?   What is the easiest way?

I have ran the uptime report and I have a couple units bluescreening and I hope the event logs will tell me why.   I can only access remotely via command line.  


Thanks!

Randy
0
Comment
Question by:rjohnsonjr
3 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 12298303
why via command line?

just open event viewer on your local machine and select action >connect to another computer?.
0
 
LVL 6

Author Comment

by:rjohnsonjr
ID: 12298629
They are accessed via dialup remotely.  

-Randy
0
 
LVL 86

Accepted Solution

by:
jkr earned 500 total points
ID: 12298642
'PsLogList' (free) can do that - see http://www.sysinternals.com/ntw2k/freeware/psloglist.shtml

-------------------------------------->8---------------------------------------

The default behavior of PsLogList is to show the contents of the System Event Log on the local computer, with visually-friendly formatting of Event Log records. Command line options let you view logs on different computers, use a different account to view a log, or to have the output formatted in a string-search friendly way.

usage: psloglist [[\\computer[,computer[,..] | @file [-u user [-p psswd]]] [-s [-t delimiter]] [-n #|-h#|-d #] [-x] [-c][-r][-a mm/dd/yy][-b mm/dd/yy][-f filter] [-i ID[,ID[,..]] [-o event source] [-l event log file] [eventlog]

-------------------------------------->8---------------------------------------
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Recovering backup .Qic files on Windows 7 6 2,268
Windows 2000, Ghost 2003, disk1 disk 2 mirroring 17 366
windows explorer 21 179
Running Baan iV on VMware 3 162
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question