Instant Event Log Insight

Analyse Windows Event Logs using best practices suggested by Microsoft and the NSA with a focus on security, reliability and error reporting.

LogViewPlus Screenshot
Play

Understand Windows with better Event Log analysis. (1:39)

Video Highlight

LogViewPlus has built-in reports to help you analyze your Windows Event Logs and EVTX files. Core reports show issues over time, user logins, system updates and more. Get valuable insights into system health and security with zero application configuration.


Windows Event Context

Windows Issues Over Time

The first reports you see after opening a Windows Event Log or EVTX file contain an overview of all the issues which have occured in the time period and list the most active log sources. These reports provide context that can be important for understanding the nature of the audited activity. For example, events occuring late in the evening or an active securty log may be an indication of a hacking attempt that requires further analysis before considering other audit events.

Issues Over Time

SELECT CAST(Timestamp AS smalldatetime) AS Time, 
	COUNT(*) AS Issues
FROM CurrentView
WHERE Level in ( 'WARN', 'ERROR','FATAL')
GROUP BY CAST(Timestamp AS smalldatetime)
ORDER BY Time

In-Depth Log Analysis

LogViewPlus is not an enterprise Windows Event Log solution because it provides no centralized data storage. Instead, LogViewPlus reads events directly from a log source and adds value by providing a more in-depth analysis than most enterprise solutions. All of our prebuilt reports work out of the box with minimal configuration and support the ability to drill-down into the data. LogViewPlus is a full featured log analysis tool and reporting is just one of many features you can use to better understand your Windows Event Logs.

Windows Event Activity Sources

Most Active Log Sources

SELECT TOP 5 Logger, COUNT(*) AS Entries
FROM CurrentView
GROUP BY Logger
ORDER BY COUNT(*) DESC

Issues by Log Source

SELECT TOP 5 [Logger], COUNT(*) AS Issues
FROM CurrentView
WHERE LEVEL in ('WARN', 'ERROR', 'FATAL')
GROUP BY [Logger]
ORDER BY Issues DESC

NSA Cybersecurity Directorate Audit

NSA Audit Overview

The NSA Cybersecurity Directorate maintains a repository of event forwarding guidance including a list of recommended events to monitor. With LogViewPlus you can scan your Windows Event log file for matching events and quickly generate reports which help you maintain a healthy Windows environment. The NSA recommends monitoring over two-hundred separate events, so it really helps to have this automated. LogViewPlus offers a low cost, easy alternative to more expensive enterprise solutions. Perfect for small businesses or individuals looking to improve Windows security or reliability.

NSA Audit Overview

select CASE WHEN RowNumber > 9 THEN 'Other' 
	ELSE Description END AS Description, 
	SUM(Count) AS Count 
FROM (
	SELECT W.Name AS Description, COUNT(*) AS Count,
	ROW_NUMBER() OVER(ORDER BY COUNT(*) DESC) AS RowNumber
	FROM CurrentView AS C
	JOIN LoadCsv('NSA Windows Event Categories.csv') 
		AS W ON W.id=C.Id
	GROUP BY W.Name
) AS qry
GROUP BY CASE WHEN RowNumber > 9 THEN 'Other' 
	ELSE Description END

NSA Audit Drill Down

LogViewPlus uses SQL to combine your Event Log data with the enriched event data provided by the NSA, offering a powerful and flexible approach to log analysis. By leveraging SQL queries, users can create personalized reports that show important trends, patterns, and security risks, helping you quickly find and focus on the most important issues. Adding NSA data gives more context to each event, giving you a better overall view of security. This method makes it easier to understand your logs and helps you make better decisions with more detailed information.

NSA Audit Detail

NSA Audit by Event

SELECT TOP 5 W.Name, COUNT(C.ID) AS Count
FROM CurrentView AS C
JOIN LoadCsv('NSA Windows Event Categories.csv') 
	as W on W.id=C.Id
GROUP BY W.Name
ORDER BY Count DESC

NSA Audit by Category

SELECT TOP 5 W.Category, COUNT(C.ID) AS Count
FROM CurrentView AS C
JOIN LoadCsv('NSA Windows Event Categories.csv') 
	as W on W.id=C.Id
GROUP BY W.Category
ORDER BY Count DESC

Microsoft Event Log Audit

Microsoft Windows Event Log Audit

LogViewPlus can also monitor Windows Event Logs in line with Microsoft's security audit policy settings. These settings help maintain a secure environment by monitoring various types of activities such as user logons, account management actions, access to Active Directory, folder accesses, policy changes, privilege use, process tracking, and system-related events like restarts or shutdowns. By adhering to these guidelines, the program can check for critical security events and help you detect potential security threats and address vulnerabilities before they can be exploited.

Microsoft Audit Overview

SELECT CASE WHEN RowNumber > 9 THEN 'Other' 
	ELSE Description END AS Description, 
	SUM(Count) AS Count 
FROM (
	SELECT M.Description AS Description, COUNT(*) AS Count,
	ROW_NUMBER() OVER(ORDER BY COUNT(*) DESC) AS RowNumber
	FROM CurrentView AS C
	JOIN LoadCSV('Microsoft Audit Events.csv') 
		as M on M.Id = C.Id
	GROUP BY M.Description
) AS qry
GROUP BY CASE WHEN RowNumber > 9 THEN 'Other'
	ELSE Description END

Event Log Drill Down

LogViewPlus let's you dive into the data. This helps you understand how multiple events are related and can help in piecing together the narrative behind security incidents or system anomalies. Multiple features combine to facilitate a deeper understanding of issues that might not be apparent from isolated events. Consequently, administrators are equipped with the necessary information to make faster, more informed decisions. This holistic view of events not only accelerates the troubleshooting and resolution process but also significantly enhances the ability to address potential issues.

Microsoft Windows Event Detail

Logon Detail

SELECT TOP 5 T.LogonTitle AS Type, C.Account, COUNT(*) AS Count
FROM CurrentView AS C
JOIN LoadCSV('Logon Types.csv') AS T 
     ON T.LogonType = C.LogonType
GROUP BY T.LogonTitle, C.Account
ORDER BY Count DESC

Policy Audit

SELECT TOP 5 M.Description AS Description,
COUNT(*) AS Count
FROM CurrentView AS C
JOIN LoadCSV('Microsoft Audit Events.csv') AS M on M.Id = C.Id
WHERE M.Category = 'Policy Change'
GROUP BY M.Description
ORDER BY Count DESC

Explore with SQL

LogViewPlus uses a custom SQL engine based on Transact-SQL which makes it is easy to transform your data. The SQL engine works with the parsed log entry data already in memory. So query execution is super fast while avoiding the need to put your data into another system. Fast query execution based on a standard query language makes LogViewPlus a great tool for exploring your logs to gain new insight.

Explore Windows Events with SQL

Account Management Audit

SELECT TOP 5 M.Description AS Description,
COUNT(*) AS Count
FROM CurrentView AS C
JOIN LoadCSV('Microsoft Audit Events.csv') AS M on M.Id = C.Id
WHERE M.Category = 'Account Management'
GROUP BY M.Description
ORDER BY Count DESC

Directory & Privilege Audit

SELECT TOP 5 M.Description AS Description,
COUNT(*) AS Count
FROM CurrentView AS C
JOIN LoadCSV('Microsoft Audit Events.csv') AS M on M.Id = C.Id
WHERE M.Category = 'Privilege Use' 
     OR M.Category = 'Directory Service'
GROUP BY M.Description
ORDER BY Count DESC

Best of all, you are in control.

LogViewPlus has some prebuilt reports, but these are just the start. With custom SQL and quick charting built-in, you can explore your Windows Event Logs any way you want. Check out our documentation for more information about creating custom reports.

Windows Event Log Reports

Plus tons of other useful features!

LogViewPlus can help you with a lot more than just Windows Event Logs. LogViewPlus is a full featured log file analysis program. Check out some of our other great features in our short video tutorials.

Checkmark
Archive your analysis and upload it into another system for tracking.
Checkmark
Directory Monitors automatically detect and open new log files.
Checkmark
Quick statistics help you understand your logs with zero configuration.
Checkmark
Advanced message parsing extracts data from log entry messages.
Checkmark
Bookmarks and comments help you track important log entries.
Checkmark
A custom directory browser that makes it easy to find your log files.
Checkmark
LogViewPlus has extensive settings options for easy configuration.
Checkmark
A highly customizable grid view that lets you control visible data.
Checkmark
Templates can help you quickly apply common filter chains.
Checkmark
Add filters to a search results view for easier log entry lookup.
Checkmark
Advanced text search with regex, highlights, and wildcards.
Checkmark
LogViewPlus can automatically tail log files as they are rolled.
Checkmark
Copied log entries are pasted with formatting for sharing over email.
Checkmark
Create a temporary log file from your clipboard for easy data import.
Checkmark
Open a new SSH session for any SFTP file being monitored.
Checkmark
The Parser Configuration Wizard simplifies log parser configuration.
Checkmark
Session tracking collects and groups new log entries over time.
Checkmark
Elapsed time column is calculated for all log entries in every view.
Checkmark
Workspaces can remember and reload your log files and views.
Checkmark
Navigation Reports let you filter your log file using simple reports.
Checkmark
Export log entry views into other formats such as CSV or HTML.
Checkmark
SMTP event notifications can monitor log files and send emails.

Level up your log files in 2 minutes.

See how we can help you read and analyze log files with our free trial.