Solved

Log Parser and finding Specifc Event ID's

Posted on 2010-09-01
11
3,818 Views
Last Modified: 2013-12-04
I recently started playing around with Log Parser in an attempt to export specific login / logoff events to a txt file, which I will then use for data reporting later.

However, I am not finding the correct syntax, or am placing the incorrect syntax to find what I would like to see for results.

I would like to see the username that logs in, time / date they logged in, and the same for logging off.

Here is the syntax I have tried to use:

logparser "select timegenerated, sourcename, eventcategoryname into report.txt from security where eventid = 4624" -resolvesids:on

The .txt file results are this:

TimeGenerated       SourceName                          EventCategoryName
------------------- ----------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2010-08-27 16:47:24 Microsoft-Windows-Security-Auditing The name for category 12544 in Source "Microsoft-Windows-Security-Auditing" cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer

for every event it creates.

what is the query syntax I need to get the data I am looking for?  I am running Server 2008 r2.
0
Comment
Question by:dzirkelb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
11 Comments
 
LVL 22

Expert Comment

by:Paka
ID: 33619496
It's likely that logparser is actually finding the right events, but there's a problem with the registry entries for the 4624 event.  

Try:
logparser "select  eventid, timegenerated, sourcename, eventcategoryname into report.txt from security where eventid = 4624" -resolvesids:on

If it returns 4624 events as shown from the first column, our next step will be to figure out why the events aren't logging correctly.
0
 

Author Comment

by:dzirkelb
ID: 33619587
EventID TimeGenerated       SourceName                          EventCategoryName
------- ------------------- ----------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4624    2010-09-02 21:13:10 Microsoft-Windows-Security-Auditing The name for category 12544 in Source "Microsoft-Windows-Security-Auditing" cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer

That is the results from your suggestion.
0
 
LVL 22

Expert Comment

by:Paka
ID: 33620065
It looks like logparser is pulling data from the security log correctly.  Usually the generic event message means that either the application that is writing the 4624 events is poorly written and won't log the information or the registry is corrupt.  Do you know what application is writing these events?

What data are you trying to get from the security logs?
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

 

Author Comment

by:dzirkelb
ID: 33620093
I am running the log parser on a 2008 r2 primary domain controller.  The application that is logging this information would be the default for domain controllers and active directory.

I am trying to create logs of when users logged in and out of their computer to use for reporting.
0
 
LVL 22

Accepted Solution

by:
Paka earned 500 total points
ID: 33620376
Try using wevtutil instead of logparser for W2008:
http://blogs.msdn.com/ericfitz/archive/2008/07/16/wevtutil-scripting.aspx 
0
 

Author Comment

by:dzirkelb
ID: 33621345
I tried the following per the article and it outputs an xml file with no data, do I have the task or event id or logontype wrong?  This is all in a .bat file:



@echo off

 

REM (C) 2008 Microsoft Corporation

REM All Rights Reserved


set outputfile=%temp%\interactive-logon-events.xml


if "%1" NEQ "" set outputfile=%1

 

REM The next command is all one line and has no carriage returns

REM The only spaces in the XPath are around the AND keywords


wevtutil qe Security /q:"*[System[Provider[@Name='Microsoft-Windows-Security-Auditing'] and Task=12544 and (EventID=4624)] and EventData[Data[@Name='LogonType']='2']]" /e:Events > %outputfile%


start %outputfile%


set outputfile=
0
 

Expert Comment

by:Skibo187
ID: 36331515
"C:\Program Files\Log Parser 2.2\LogParser.exe" -i:EVT "SELECT * FROM  \\SystemName\Security,\\SystemName2\Security WHERE EventID In (529;534;529)" -resolvesSIDs -o:CSV >> Nameyourfile.csv


save that in a batch file and run it.
FYI- you can change the csv at the end to TXT but I think it will be better useful in csv format, ALSO the * pulls everything u can change that also to a specific tag u want.

Hope this is helpful i know its late, but better late then never...

skibo
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question