Setting up Windows Event Log Reports
Last updated on:
EventLog Analyzer comes packaged with over 1,000 predefined reports that help organizations view consolidated security events, conduct security audits, and meet various compliance requirements. These reports help organizations visualize security events in their network and meet various security and compliance requirements.
In this help document, you will learn to set up Windows report generation.
Setting up Windows report generation
In EventLog Analyzer, most Windows reports get generated automatically when the device is added for monitoring and the event source is configured. To learn how to add a device, check out this page. To learn how to configure an event source, check out the How to configure event source files in a device? section in this page.
There are certain reports, mentioned in the table below, that will require manual creation of keys in your Windows Registry. To set up the generation of these reports, follow the steps given below.
- Please make sure event logging has been enabled by right clicking on the event source > Properties > checking the Enable logging box, in Event Viewer.
- Open the Registry Editor and navigate to HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Service > EventLog. Here, create the keys given in the New keys column of table below.
- Next, open Local Group Policy Editor and navigate to Computer Configuration > Windows Setting > Security Setting. Further paths and steps to enable the generation of reports are given in the Audit policies column.
| Reports | New keys | Audit policies | Other prerequisites |
|---|---|---|---|
| Application Whitelisting Reports |
|
Enable AppLocker under Application Control Policies |
|
| Windows Firewall Auditing Reports |
|
Enable Audit MPSSVC Rule - Level Policy change, under Advanced Audit Policy Configuration > Policy Change. | To Enable Windows Firewall logs, execute the below commands in the target device from where the logs are to be collected.
|
| Removable Disk Auditing |
|
Enable Audit Handle Manipulation, Audit Removable Storage and Audit File System (required for auditing delete operation in NT Version 6.2), under Advanced Audit Policy Configuration > Object Access. | To start logging removable storage events, navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage and add new DWORD registry key named as HotPlugSecureOpen and set value as 1. |
| Registry changes | Enable Audit Registry, under Advanced Audit Policy Configuration > Object Access. | Set SACL for the registry key by right-clicking on the required registry and navigating to Permission > Advance > Auditing in Registry Editor. | |
| Windows Backup & Restore Reports |
|
No modification required. | |
| Windows System Events |
|
No modification required. | |
| Hyper-V Server Events Hyper-V VM Management Reports |
|
No modification required. | |
| Program Inventory Reports |
|
No modification required. | |
| IIS |
|
No modification required. | To access IIS reports, open EventLog Analyzer and navigate to Reports > IIS W3C web server > IIS Admin Configuration Reports. |
| Print service |
|
No modification required. | |
| Terminal |
|
No modification required. |
EventLog Analyzer will now start generating the reports mentioned in the table.