EventLog Analyzer's Log Search Engine allows you to do a free form search on real-time and historical log data.
IT administrators can quickly detect network anomalies such as misconfigurations, viruses, user activities, system/applications errors, and more within seconds.
When a user enters a search criterion in the search bar, it rapidly drills down into the raw logs and retrieves the results for your search query.
The search criteria can consist of Wild-cards, Phrases, and Boolean operators.
It also allows you to do Grouped searches and Range Searches.
It does not limit you to a set of predetermined fields while conducting a search.
You can search using event ids, severity, source, username, log message, IP address, etc.
or combination of all.