Monitoring and filtering windows event logs
Posted: Thu Sep 22, 2016 1:05 am
Hi,
I am trying to monitor and filter windows event logs, i specificly need these below;
1. Events in the last hour
2. Security Related
I am trying this command but it does not give me any entry. Should i need more filtering here?
But when i used this below, i got some results. Is this correct usage?
I am trying to monitor and filter windows event logs, i specificly need these below;
1. Events in the last hour
2. Security Related
I am trying this command but it does not give me any entry. Should i need more filtering here?
Code: Select all
check_nrpe -H IPAdress -p Portnumber -c CheckEventLog -a file=security MaxCrit=1 "filter=generated > -1h AND "
OK: No entries found|'count'=0;0;1Code: Select all
[root@ieiotlvm02 ~]# /usr/lib64/nagios/plugins/check_nrpe -H IP -p Port-c CheckEventLog -a file=security MaxCrit=1 "filter=generated > -2d"
Microsoft-Windows-Security-Auditing, Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3E7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege, Microsoft-Windows-Security-Auditing, An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: X-2$ Account Domain: WORKGROUP Logon ID: 0x3E7 Logon Type: 5 Impersonation Level: Impersonation New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3E7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Au