The summary of ‘How To Use The Windows Event Viewer For Cyber Security Audit’

This summary of the video was created by an AI. It might contain some inaccuracies.

00:00:0000:08:01

In the video, John Good delves into the Windows Event Log Viewer and its role in cybersecurity and system troubleshooting. He emphasizes the importance of manually inspecting logs in scenarios where automated tools fall short, particularly in forensic investigations or system compromises. Good provides a comprehensive walkthrough of the Event Log Viewer application, highlighting its various folders and logs, which include application, security, and system logs. He demonstrates essential tasks such as launching the Event Viewer, filtering logs by event IDs, and creating custom views for faster access and analysis. Moreover, he explains how to export and import custom views using XML files, which can streamline log monitoring across multiple systems. The video concludes with encouragement to further explore the capabilities of Event Viewer and directs viewers to additional training resources on the speaker's website.

00:00:00

In this part of the video, the speaker, John Good, introduces the topic of viewing Windows event logs using the built-in Event Log Viewer application. He explains the importance of being able to view these logs, especially in cybersecurity scenarios where individual system analysis is necessary, such as in cases of system compromise or forensic investigations. John highlights that while automated tools are crucial for handling large networks, there are times when detailed, manual inspection of logs on a single system is required.

He explains that the Windows Event Viewer is an essential tool for viewing events or alerts from applications, the system, and security events. It can also be used for troubleshooting system issues. John then demonstrates how to launch the Event Viewer via the start menu and provides a brief overview of different folders and logs within the Event Viewer, such as custom views and standard event logs.

00:03:00

In this part of the video, the presenter discusses three major logs for Windows: application, security, and system. Each log holds specific types of events, with application logs for software, security logs for relevant security events like logon and logoff, and system logs for operating system events. The presenter then shows how to open these logs through the computer management interface and the event viewer. The video explains how to filter logs by using event IDs, demonstrated by filtering a logon event ID. Additionally, the presenter covers how to create custom views to quickly see specific events, which can be exported and imported to other systems. The process includes filtering a system log and saving it as a custom view for easier access.

00:06:00

In this part of the video, the speaker explains how to create and import custom views in Windows Event Viewer using XML files. The steps include exporting a custom view to an XML file and then importing it on another computer. Another method detailed involves right-clicking on the custom views folder, selecting ‘create custom view’, and specifying criteria such as the security log and event ID. The example provided includes setting event ID 1102 to track when event logs are cleared. The segment ends with a brief discussion on the importance of Windows Event Viewer for reviewing system logs, encouraging interaction, and promoting the speaker’s website for more training resources.

Scroll to Top