Monitoring a Windows Event Log
You can define a data source to collect data from a Windows event log. You can configure it to filter the data. The resulting events are placed in the Event Log data set.
About this task
You can collect data from the Windows event log by using the type, source, or ID of events. You use these parameters to filter the log events that the Windows system gathered. The agent compares each new event in the monitored event log against the specified filter. If the event matches one of the event types, event sources, and event IDs specified in the filter, it passes.
For
example, if the Event log filter is for the Application log, specify Error as
the event type. This choice matches all events that are logged to
the Application log with an event type value of error
.
If you add the Diskeeper and Symantec
AntiVirus event sources, the agent matches all error events
from either of these sources. You can add specific event IDs to refine
the filter further. No direct association exists between the event
type, event source, and event ID. If one of the values for each matches
an event, the event matches.
By default, only events that are generated after the agent starts are processed. However, you can enable the agent when it restarts to process log events that are generated while the agent is shut down. For more information about enabling the agent to process events generated while the agent is shut down, see step 6.
Procedure
What to do next
For information about Windows remote connection configuration for Windows Event Log data sources, see Configuring a Windows remote connection.