Welcome to Part II of Event Log Monitoring tutorial. At the end of this tutorial, you will be able to successfully implement Windows Event Log monitoring in your network. If you are a beginner, you might want to check out Part I covering the basics of Event Logs.
Here is an outline of the topics covered in this tutorial:
The Event Logs record all the happenings on the device and bear clues to several security hacks and application performance issues. It is a tedious task for an administrator to manually check and track issues on each and every Windows device. Tracking specific events across all Windows devices with a unified console makes event management easy. A solution that is capable of monitoring event logs actually parses the Windows events and shows the processed events along with the other alerts triggered by the solution, providing the flexibility to the administrator to handle complete network fault management from one window.
OpManager is a network monitoring solution that monitors the performance of all the resources on your network and manages the network fault. Extending its network fault management capability, OpManager also monitors Windows and Unix logs. The following sections of the tutorial helps you configure monitoring of Windows Event logs using OpManager.

Here's a list of recommended security event logs that need monitoring. Make sure you identify other security issues that are specific to your enterprise and log them for monitoring.
| Windows Event ID | Windows Vista Event ID | Event Type | Description |
|---|---|---|---|
| (512 to 516), (518 to 520) | (4608 to 4612), (4614 to 4616) | System Events | Identifies local system processes such as system startup and shutdown and changes to the system time |
| 517 | 4612 | Audit Logs Cleared | Identifies all the audit logs clearing events |
| 528, 540 | 4624 | Successful User Logons | Identifies all the user logon events |
| (529 to 537), 539 | 4625 | Logon Failures | Identifies all the failed user logon events |
| 538 | 4634 | Successful User Logoff's | Identifies all the user logoff events |
| 560, (562 to 568) | 4656, (4658 to 4664) | Object Access | Identifies when a given object (File, Directory, etc.) is accessed, the type of access (e.g. read, write, delete) and whether or not access was successful/failed, and who performed the action |
| 612 | 4719 | Audit Policy Changes | Identifies all the changes done in the audit policy |
| (624 to 630), 642, 644 | 4720, (4722 to 4726), 4738, 4740 | User Account Changes | Identifies all the changes done on an user account like user account creation,deletion, password change, etc. |
| (631 to 641), 643, (645 to 666) | (4727 to 4737), (4739 to 4762) | User Group Changes | Identifies all the changes done on an user group such as adding or removing a global or local group, adding or removing members from a global or local group, etc. |
| 672, 680 | 4768, 4776 | Successful User Account Validation | Identifies successful user account logon events, which are generated when a domain user account is authenticated on a domain controller |
| 675, 681 | 4771, 4777 | Failed User Account Validation | Identifies unsuccessful user account logon events, which are generated when a domain user account is authenticated on a domain controller |
| 682, 683 | 4778, 4779 | Host Session Status | Identifies the session reconnection or disconnection |
Besides the above security related events, enable and track logging for mission critical applications and system resources.
The Event Logs are filtered for parsing into OpManager alerts based on the Event Log properties listed below. The table shows a loose mapping of the event log properties and the corresponding alert properties for easy understanding:
| Windows Event Log Properties | Corresponding OpManager Alert Properties |
|---|---|
| Event Types (Error, Warning, Information) | Alert Severity (Critical, Attention, Trouble, Clear) |
| Date | Date/Time |
| Time | Last Updated (time) |
| Source (the resource at fault) | Entity (the resource at fault but name not displayed in GUI) |
| Description | Message |
the password.
Example:- TestDomain\TestUser.

OpManager has over 50 Event Log monitors out-of-the-box. To monitor Windows event logs, you need to associate the event log monitors to the devices. To do so, follow the steps given below:
Alternatively, you can associate an event log rule with many devices at a time using Quick Configuration wizard.

To create a new event log monitor, follow the steps given below:

Click Save to save the event log rule.

You can monitor event logs under a custom category too. Some application events can be logged in a new category other than the default System/Applications/Security categories, enabling easy administration. You can now configure rules in OpManager to parse the events in such custom categories and trigger corresponding alerts in OpManager.

Here are the steps:
Click Save.

After you add the custom event category, you will find the category listed under Settings --> Monitoring --> Event Log Rules. Go on to add new rules to parse the events falling under this category.

After you associate the Event Log Monitors to the devices, OpManager monitors for events of the criteria defined in the Event Log Rule. When there are events matching the criteria, OpManager processes the Event Logs into OpManager Alerts. You can view these alerts in OpManager GUI:
Select the Event Log Alarms to view alerts with Event Logs as source.
