EventLog Analyzer makes event log forensic investigation very easy by allowing you to use its powerful search engine.
Network administrators can now search the raw Windows event logs and pinpoint the exact log entry which caused the security activity, find the exact time at which the corresponding security event had happened, who initiated the activity and also, the location from where the activity
With EventLog Analyzer Network administrators can narrow down their search based on specific event IDs or conduct
search on severity, source, username, IP address, etc.
or combination of all to meet their search requirement.
The search criteria can consist of Wild-cards, Phrases, and Boolean operators.
EventLog Analyzer also allows you to do Grouped searches and Range Searches.