Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Security Event Log Size 2012 R2

Posted on 2016-11-02
4
Medium Priority
?
36 Views
Last Modified: 2016-11-21
There is conflicting information regarding the size of the security event log. Some articles mention that the file is always loaded into memory in full, others say that the way the event log is loaded into memory has changed and that setting a larger size is no longer an issue.

Let's say, that for example I have a 4GB event log, will the full file be loaded into RAM? OS version is Windows Server 2012 R2.
0
Comment
Question by:albatros99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 56

Assisted Solution

by:McKnife
McKnife earned 2000 total points
ID: 41871159
I would simply make a test to find out. Use a script that uses eventcreate.exe in a loop to fill up the log and at the same time, open task manager and watch your RAM consumption.
0
 
LVL 3

Accepted Solution

by:
albatros99 earned 0 total points
ID: 41872420
A 3.2 GB security log shows up in RamMap with 842'542 KB Total and 593'240 KB standby. Clearly it uses more memory but it doesn't load the whole file. I was just hoping this new behaviour would be documented somewhere.
0
 
LVL 56

Expert Comment

by:McKnife
ID: 41872433
Hm - when does it show up, right after a restart or after it has been loaded to memory after using eventvwr?
0
 
LVL 3

Author Closing Comment

by:albatros99
ID: 41895646
Solution discovered by testing.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question