03 - Log Fundamentals

18 May 2025 • 3 min read

Types

Log Type Usage Example
System Logs The system logs can be helpful in troubleshooting running issues in the OS. These logs provide information on various operating system activities. - System Startup and shutdown events
- Driver Loading events
- System Error events
- Hardware events
Security Logs The security logs help detect and investigate incidents. These logs provide information on the security-related activities in the system. -Authentication events
- Authorization events
- Security Policy changes events
- User Account changes events - Abnormal Activity events
Application Logs The application logs contain specific events related to the application. Any interactive or non-interactive activity happening inside the application will be logged here. - User Interaction events
- Application Changes events
- Application Update events
- Application Error events
Audit Logs The Audit logs provide detailed information on the system changes and user events. These logs are helpful for compliance requirements and can play a vital role in security monitoring as well. - Data Access events
- System Change events
- User Activity events
- Policy Enforcement events
Network Logs Network logs provide information on the network’s outgoing and incoming traffic. They play crucial roles in troubleshooting network issues and can also be handy during incident investigations. - Incoming Network Traffic events
- Outgoing Network Traffic events
- Network Connection Logs - Network Firewall Logs
Access Logs The Access logs provide detailed information about the access to different resources. These resources can be of different types, providing us with information on their access. - Webserver Access Logs
- Database Access Logs - Application Access Logs
- API Access Logs

Windows Event Logs

Event Viewer with one of the logs highlighted. This is how a Windows event log looks. It has different fields.

This is how a Windows event log looks. It has different fields. The major fields are discussed below:

  • Description: This field has a detailed information of the activity.
  • Log Name: The Log Name indicates the log file name.
  • Logged: This field indicates the time of the activity.
  • Event ID: Event IDs are unique identifiers for a specific activity.

Numerous event IDs are available in Windows event logs. We can use these event IDs to search for any specific activity. For example, event ID 4624 uniquely identifies the activity of a successful login, so you only need to search for this event ID 4624 when investigating successful logins.

Here is a table of some important Event IDs in Windows Operating System

Event ID Description
4624 A user account successfully logged in
4625 A user account failed to login
4634 A user account successfully logged off
4720 A user account was created
4724 An attempt was made to reset an account’s password
4722 A user account was enabled
4725 A user account was disabled
4726 A user account was deleted

Start searching

Enter keywords to search articles.