• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 4042
  • Last Modified:

Log Parser and finding Specifc Event ID's

I recently started playing around with Log Parser in an attempt to export specific login / logoff events to a txt file, which I will then use for data reporting later.

However, I am not finding the correct syntax, or am placing the incorrect syntax to find what I would like to see for results.

I would like to see the username that logs in, time / date they logged in, and the same for logging off.

Here is the syntax I have tried to use:

logparser "select timegenerated, sourcename, eventcategoryname into report.txt from security where eventid = 4624" -resolvesids:on

The .txt file results are this:

TimeGenerated       SourceName                          EventCategoryName
------------------- ----------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2010-08-27 16:47:24 Microsoft-Windows-Security-Auditing The name for category 12544 in Source "Microsoft-Windows-Security-Auditing" cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer

for every event it creates.

what is the query syntax I need to get the data I am looking for?  I am running Server 2008 r2.
0
dzirkelb
Asked:
dzirkelb
  • 3
  • 3
1 Solution
 
PakaCommented:
It's likely that logparser is actually finding the right events, but there's a problem with the registry entries for the 4624 event.  

Try:
logparser "select  eventid, timegenerated, sourcename, eventcategoryname into report.txt from security where eventid = 4624" -resolvesids:on

If it returns 4624 events as shown from the first column, our next step will be to figure out why the events aren't logging correctly.
0
 
dzirkelbAuthor Commented:
EventID TimeGenerated       SourceName                          EventCategoryName
------- ------------------- ----------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4624    2010-09-02 21:13:10 Microsoft-Windows-Security-Auditing The name for category 12544 in Source "Microsoft-Windows-Security-Auditing" cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer

That is the results from your suggestion.
0
 
PakaCommented:
It looks like logparser is pulling data from the security log correctly.  Usually the generic event message means that either the application that is writing the 4624 events is poorly written and won't log the information or the registry is corrupt.  Do you know what application is writing these events?

What data are you trying to get from the security logs?
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
dzirkelbAuthor Commented:
I am running the log parser on a 2008 r2 primary domain controller.  The application that is logging this information would be the default for domain controllers and active directory.

I am trying to create logs of when users logged in and out of their computer to use for reporting.
0
 
PakaCommented:
Try using wevtutil instead of logparser for W2008:
http://blogs.msdn.com/ericfitz/archive/2008/07/16/wevtutil-scripting.aspx 
0
 
dzirkelbAuthor Commented:
I tried the following per the article and it outputs an xml file with no data, do I have the task or event id or logontype wrong?  This is all in a .bat file:



@echo off

 

REM (C) 2008 Microsoft Corporation

REM All Rights Reserved


set outputfile=%temp%\interactive-logon-events.xml


if "%1" NEQ "" set outputfile=%1

 

REM The next command is all one line and has no carriage returns

REM The only spaces in the XPath are around the AND keywords


wevtutil qe Security /q:"*[System[Provider[@Name='Microsoft-Windows-Security-Auditing'] and Task=12544 and (EventID=4624)] and EventData[Data[@Name='LogonType']='2']]" /e:Events > %outputfile%


start %outputfile%


set outputfile=
0
 
Skibo187Commented:
"C:\Program Files\Log Parser 2.2\LogParser.exe" -i:EVT "SELECT * FROM  \\SystemName\Security,\\SystemName2\Security WHERE EventID In (529;534;529)" -resolvesSIDs -o:CSV >> Nameyourfile.csv


save that in a batch file and run it.
FYI- you can change the csv at the end to TXT but I think it will be better useful in csv format, ALSO the * pulls everything u can change that also to a specific tag u want.

Hope this is helpful i know its late, but better late then never...

skibo
0

Featured Post

Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now