Take Advantage of Vista's Event Viewer and Task Scheduler Integration

Total Page:16

File Type:pdf, Size:1020Kb

Take Advantage of Vista's Event Viewer and Task Scheduler Integration Take advantage of Vista's Event Viewer Version 1.0 and Task Scheduler integration August 6, 2008 By Greg Shultz The EventTriggers command in Microsoft Windows XP would allow you to configure your system to provide notifications when certain events were recorded in one of the operating system's log files. While this was an extremely handy command to have in your troubleshooting arsenal, the fact that it was a command line tool that had to be configured with a bewildering number of special parameters made using it a bit daunting. However, if you were able to master and use the EventTriggers command in Windows XP, chances are that you really appreciated the convenience that it provided. If you have moved to Windows Vista, you may have shelled out to a command prompt and attempted to run the EventTriggers command. If you have, you have undoubtedly discovered that the EventTriggers command is not included with Vista. The reason that Microsoft removed the EventTriggers command from Vista is because they have replaced it with a totally new mechanism that integrates Task Scheduler with Event Viewer such that you can now attach a task directly to the event and then configure the task to perform any one of several operations whenever the event occurs and is logged in Event Viewer. In this edition of the Windows Vista Report, I'll show you how to take advantage of this new this Event Viewer and Task Scheduler integration feature. Getting started To begin, right click on the Computer icon and select the Manage command. When the Computer Management window appears, locate and open the Event Viewer branch in the Console Tree. Then, open the log that contains the event that you want to keep tabs on. Once you locate the event, simply right-click on it and select the Attach Task To This Event command as shown in Figure A. Figure A When you right click on any event, you'll see that the context menu allows you to associate the event with a task. Page 1 Copyright ©2008 CBS Interacitve. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration You'll then see the Create Basic Task wizard, as shown in Figure B. As you can see, this is pretty much the same wizard that Task Scheduler provides except that it is specifically targeted on events in Event Viewer. At this point, you can provide a name for the task as well as a detailed description. Figure B A version of Task Scheduler's Create a Basic Task wizard appears that is targeted on the event you selected. When you click Next, you'll see the When a Specific Event Is Logged screen, as shown in Figure C. Since the task is already targeted on the event that you selected, there are no settings that you can configure on this page, simply click the Next button. Page 2 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration Figure C The settings on this part of the wizard are preconfigured. You'll now see the Action screen, as shown in Figure D, and can choose from one of the three actions displayed. As you can see, you can Start a program, Send an e-mail, or Display a message. Figure D There are three actions that you can associate with the event in question. Page 3 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration Start a program If you select the Start a program option and then click Next, you'll see the Start a Program screen, as shown in Figure E. You can click the Browse button and then locate and select any executable file, a batch file, or a script. If you're running a command line tool, you can specify any parameters in the Add Arguments text box. You can even specify the directory in which you want the program to launch in the Start In text box. Figure E You can have the task run any executable file, batch file, or even a script. When you click Next, you'll see the Summary screen, as shown in Figure F, which lists all the details about the task that you just created. If you want to see the Properties dialog box for the task, be sure to select the check box. Figure F The Summary screen allows you to double check your settings before you commit. Page 4 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration When you click Finish, you'll see an informational message box like the one shown in Figure G. As you can see, this message tells you that the Event Task that you just created is stored in Task Scheduler and that if you want to alter the task, you can do so from within Task Scheduler. How's that for integration? Figure G The Event Task is stored and can be altered in Task Scheduler. Send an e-mail Now, if you select the Send an e-mail option and then click Next, you'll see the Send an E-mail screen, as shown in Figure H. As you can see, everything that you would need to compose a message in an e-mail is just where you would expect. You can even add an attachment if you want! Figure H Everything that you would expect in an e-mail client's compose a message window is available here. At the very bottom you can specify the name of the SMTP server to use to send the e-mail. Page 5 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration Display a message If you select the Display a message option and then click Next, you'll see the Display a Message screen, as shown in Figure I. As you can imagine, this feature allows you to essentially create your own warning dialog box. You simply give it a title and as detailed a massage as you want. Figure I You can now give those silent and often deadly events a real voice with a custom message box. If you've ever looked through the Event Viewer logs and discovered a dangerous event occurring at regular intervals but that you'd never know about unless you looked in Event Viewer, then you will immediately recognize the benefit of the Display a message option. Now, you can give those silent and often "deadly over time if left unattended" events a real voice. Page 6 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. Take advantage of Vista's Event Viewer and Task Scheduler integration Additional resources TechRepublic's Downloads RSS Feed Sign up for TechRepublic's Downloads Weekly Update newsletter Check out all of TechRepublic's free newsletters Version history Version: 1.0 Published: August 6, 2008 Tell us what you think TechRepublic downloads are designed to help you get your job done as painlessly and effectively as possible. Because we're continually looking for ways to improve the usefulness of these tools, we need your feedback. Please take a minute to drop us a line and tell us how well this download worked for you and offer your suggestions for improvement. Thanks! —The TechRepublic Downloads Team Page 7 Copyright ©2008 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://downloads.techrepublic.com. .
Recommended publications
  • Attack Tactics 7! the Logs You Are Looking For
    Attack Tactics 7! The Logs You Are Looking For © Black Hills Information Security @BHInfoSecurity Brought To You By! © Black Hills Information Security| @BHInfoSecurity Brought To You By! Just type “‘Demo,<script>alert(document.cookie);</script> or ‘ 1=1;--” into the Questions box DEMO will work fine too…. © Black Hills Information Security| @BHInfoSecurity Brought To You By! https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to- active-defense-cyber-deception-and-hacking-back-14124 © Black Hills Information Security| @BHInfoSecurity © Black Hills Information Security| @BHInfoSecurity Problem Statement © Black Hills Information Security @BHInfoSecurity JPcert to the rescue… Sort of.. © Black Hills Information Security @BHInfoSecurity A helpful diagram Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Executive Problem Statement Basic Questions: ● Are our tools working? ● What can we detect? ● How can we test this? ● What are our gaps? ● What existing tools can fill them? ● What do we have to buy? ● Can we buy ourselves out of this problem? © Black Hills Information Security @BHInfoSecurity TryingA helpful to diagramtie it all together Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Adventures in (just enabling proper) Windows Event Logging Important Event IDs ● 4624 and 4634 (Logon / Logoff) ● 4662 (ACL’d object access - Audit req.) ● 4688 (process launch and usage) ● 4698 and 4702 (tasks + XML) ● 4740 and 4625 (Acct Lockout + Src IP) ● 5152, 5154, 5156, 5157 (FW
    [Show full text]
  • Teradici Remote Workstation Card Agent for Windows
    Teradici PCoIP Remote Workstation Card Agent for Windows Documentation Teradici PCoIP Remote Workstation Card Agent for Windows Documentation This documentation is intended for administrators who are installing the Remote Workstation Card Agent for Windows as part of a Teradici Remote Workstation Card system. It assumes thorough knowledge of conventions and networking concepts, including firewall configuration. Although many agent features and settings can be configured using the Windows user interface, some administrative tasks require use of Windows command line tools. Users should be familiar with both cmd and PowerShell. About the PCoIP Remote Workstation Card Agent for Windows The PCoIP Remote Workstation Card Agent for Windows introduces Teradici brokering to a Teradici Remote Workstation Card deployment, allowing the desktop to be managed by Teradici Cloud Access Manager or by third-party brokers like Leostream. A complete PCoIP Remote Workstation Card deployment includes these components: • A physical host machine, which provides the desktop to remote clients. See System Requirements for more information. • A PCoIP Remote Workstation Card installed on the host machine. • The PCoIP Remote Workstation Card software for Windows installed on the host machine. • The Remote Workstation Card Agent for Windows installed on the host machine. About PCoIP Licensing When the Remote Workstation Card Agent for Windows is installed, the Remote Workstation Card can be licensed using a Remote Workstation Card license. With this flexibility, you can
    [Show full text]
  • Accessdata Forensic Bootcamp
    Windows Forensics—Vista Forensic Toolkit, FTK Imager and Registry Viewer Advanced • One-day Instructor-led Workshop his one-day AccessData® workshop follows up on the AccessData T Windows® Forensic Training by covering the Microsoft® Windows Vista operating system. It provides the knowledge and skills necessary to use AccessData tools to conduct forensic investigations on Vista systems. Participants learn where and how to locate Vista system artifacts using AccessData Forensic Toolkit® (FTK®), FTK Imager, Registry Viewer®, and Password Recovery Toolkit® (PRTK®). During this one-day workshop, participants will review the following: GUID Partition Tables (GPT): Students will use FTK Imager to navigate the new GPT formatted drive partitioning scheme. File Structure Changes: Students will learn the mechanics of reparse and mount points in the Windows Vista file structure. BitLocker Full Volume Encryption (FVE): Students will use FTK Imager and Windows Vista technology to decrypt and acquire a sector-by-sector image of an FVE drive. Windows Vista feature changes such as: - Recycle Bin - Structure and Content Changes - Thumbcache - Reparse Points - Link and Spool Files - Vista File Structure - Windows Event Logs - Vista Registry Entries, PSSP, and IntelliForms data - Updated SuperFetch Structure - New Locations for Old Windows Artifacts - Enhanced Thumbs.db Functionality - Device Identification and Protection - Vista security model The class includes multiple hands-on labs that allow students to apply what they have learned in each module.
    [Show full text]
  • Red Teaming for Blue Teamers: a Practical Approach Using Open Source Tools
    SESSION ID: LAB4-W10 Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools Travis Smith Manager, Security Content and Research Tripwire, Inc @MrTrav #RSAC #RSAC Agenda 14:00-14:10 – Access Learning Lab Virtual Environment 14:10-15:00 – Run Through Red Team Activities 15:00-16:00 – Run Through Blue Team Activities #RSAC Accessing the Lab https://tripwire.me/vhX X will be you’re specific student number on your desk Password: rsalearninglab OS Credentials: rsa/learninglab OS Hostname: host-X OS IP Address: 10.0.0.X 3 #RSAC Log Into SkyTap https://tripwire.me/vh1 rsalearninglab #RSAC Launch Victim Host Console Username: rsa Password: learninglab #RSAC #RSAC Today’s Red Team Toolset #RSAC Today’s Blue Team Toolset Elastic Stack Windows Sysmon Kibana Beats Elasticsearch @SwiftOnSecurity #RSAC Disable Windows Defender* Start Menu > Settings > Update & Security Click Windows Security on left side menu Click Virus & threat protection Click Manage settings Turn Off: – Real-time protection – Cloud-delivered protection #RSAC Red Team Exercise #1 https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1088/T1088.md #RSAC Red Team Exercise #1 Launch Event Viewer, confirm it launches #RSAC Red Team Exercise #1 Run atomic command – reg add hkcu\software\classes\mscfile\shell\open\command /ve /d ”C:\Windows\System32\cmd.exe” /f #RSAC Red Team Exercise #1 Launch Event Viewer, confirm CMD.exe launches Launch other executables from here: • notepad • calc • whoami • ping #RSAC Red Team Exercise #2 https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1015/T1015.md
    [Show full text]
  • LIFENET® AED Event Viewer
    LIFENET ® AED Event Viewer User guide Contents Overview ..................................................................................................................2 What is LIFENET AED Event Viewer? ..........................................................................................2 How does it work? ..........................................................................................................................2 What can I do with it? ....................................................................................................................2 Before you start ....................................................................................................2 Use cases .........................................................................................................................................2 IT requirements ..............................................................................................................................2 Getting started ........................................................................................................2 Starting LIFENET AED Event Viewer ...........................................................................................2 Calibrating the screen .....................................................................................................................3 Working with LIFENET AED Event Viewer ........................................................3 Receiving cases ...............................................................................................................................3
    [Show full text]
  • Event Log Explorer Help
    Welcome to Event Log Explorer Help This help system is a place to find information about Event Log Explorer. Introduction Concept Event Log Explorer basics License agreement © 2005-2018 FSPro Labs. All rights reserved. Introduction Event Log Explorer is a software for viewing, monitoring and analyzing events recorded in Security, System, Application and other logs of Microsoft Windows operating systems. It extends standard Event Viewer monitoring functionality and brings new features. Main features of Event Log Explorer: Multiple-document or tabbed-document user interface depending on user preferences Favorites computers and their logs are grouped into a tree Viewing event logs and event logs files Merging different event logs into one view Archiving event logs Event descriptions and binary data are in the log window Event list can be sorted by any column and in any direction Advanced filtering by any criteria including event description text Quick Filter feature allows you to filter event log in a couple of mouse clicks Log loading options to pre-filter event logs Switching between disk and memory for temporary data storing Fast search by any criteria Fast navigation with bookmarks Compatibility with well-known event knowledgebases Sending event logs to printer Export log to different formats Multiple-document or tabbed-document user interface depending on user preferences Event Log Explorer provides you with 2 user interface types. Multiple- document interface (MDI) allows you to open unlimited number of event logs and place them all inside the main window of Event Log Explorer. Tabbed-document interface (TDI) allows you to open unlimited number of event logs and features the best way of navigation between logs.
    [Show full text]
  • INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8
    INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8 INFORMATION TECHNOLOGY CONCEPTS (391) —OPEN EVENT— REGIONAL – 2019 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS _________ (100 points) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than sixty (60) minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition. INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 2 of 8 MULTIPLE CHOICE Identify the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. 1. Which of the following appears on the right side of any Windows 8 screen when you move your pointer to a right corner? A. Live tile B. Memory Manager C. Charms bar D. System tray 2. Which element of the Windows 7 GUI gives windows a glassy appearance, but also consumes more hardware resources? A. Control panel B. Aero user interface C. Charms interface D. Logic interface 3. The top of a top-down hierarchical structure of subdirectories is called which of the following? A.
    [Show full text]
  • Event Logs What Are Event Logs?
    Event Logs What are event logs? Windows keeps track of almost everything that happens in the operating system Microsoft defines an event as "any significant occurrence in the system or in a program that requires users to be notified or an entry added to a log." Examples of events are log ons, log offs, connections to wireless access points, improper shut downs of the computer, installations of programs, etc Windows Event Logs ● What is actually recorded in the event log is dependent on the applications involved and the system settings ● Security event logging is disabled by default on most freshly installed windows sysstems. ● If they exists, event logs cad be incredibly useful, they would provided both local and network context that is difficult to replicate with other artifacts. Event Log Analysis ● What Happened?: Event ID ->Event Category->Description ● Date/Time?: Time Stamp ● Users involved?: User Account->Description ● Systems Involved?:Hostname->IP Address ● Resources Accessed?: Files->Folders->Printers->Services Event Analysis Cont. ● What Happened? ○ Even logs are designed to provide very specific information about activities that occurred on the system. ○ Items like Event IDs and Event Categories help to find relevant events ○ Event Description can provide more information of its nature ● Date/Time? ○ Timestamps are key in event logs. ○ The provide a temporal context of the events ○ Can also help narrow an investigators focus. Event Log Analysis Cont. ● Users Involved? ○ Everything done within Windows is done using the context of an account ○ We can: ■ Identify references to specific users ■ Information about the Windows OS activities via special accounts like System and NetworkService.
    [Show full text]
  • Monitoring Windows Event Logs
    Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific occurrence on the system, an application or the operating system. Be it an incorrect login attempt, a hack, an application failure, or a system failure- all these happenings are 'logged' here, helping troubleshoot a fault, and also monitor the system's health. All Windows events include information on the occurrence such as the event time, the source of the event, the type of fault, and a unique ID for the event type. The event logs contain a wealth of information, which helps an administrator troubleshoot and manage the system. The Event Viewer utility on the Windows device helps in viewing all the events on that machine. Why should Event Logs be monitored? Prevention is better than cure. This applies perfectly for network monitoring too! In this era of the Internet, where hacking is commonplace, being a smart proactive administrator is a must. Securing network information, ensuring data integrity, assuring 100% uptime of important services etc is critical to business. Juggling with multiple tools to address different monitoring needs only compounds to the stress. Let us consider the following two possibilities: 1. Daily Backup Periodic backup of your network data is the first step for disaster recovery. Assume you have an application like Veritas doing the backup job for you. Ensuring a smooth backup is a critical task, specially, in environments where you hold important customer data. It needs little imagination to say what will happen if the backup fails and you end up finding it out only the next morning! 2.
    [Show full text]
  • Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic
    ® CompTIA Security+ Lab Series Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic CompTIA Security+® Domain 3 - Threats and Vulnerabilities Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques Document Version: 2013-08-02 Organization: Moraine Valley Community College Author: Jesse Varsalone Copyright © Center for Systems Security and Information Assurance (CSSIA), National Information Security, Geospatial Technologies Consortium (NISGTC) The original works of this document were funded by the National Science Foundation’s (NSF) Advanced Technological Education (ATE) program Department of Undergraduate Education (DUE) Award No. 0702872 and 1002746; Center for Systems Security and Information Assurance (CSSIA) at Moraine Valley Community College (MVCC). This work has been adapted by The Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. The National Information Security, Geospatial Technologies Consortium (NISGTC) is authorized to create derivatives of identified elements modified from the original works. These elements are licensed under the Creative Commons Attributions 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. The Network Development Group (NDG) is given a perpetual worldwide waiver to distribute per US Law this lab and future derivatives of
    [Show full text]
  • Outputting Event Log Events to a Remote SQL Database Using Powershell
    Peter McEldowney Mark Waddington | Capstone CSNT 255 Outputting Event Log Events to a Remote SQL Database Using PowerShell Objective: After completing this lab, the Administrator will have the Event Log from the computer of their choice uploading information to a SQL database. The step-by-step outlines how to create the tables that will be used to organize the data and will cover how to create a basic SQL script to create these tables. Within the script to create the tables, indexes will be covered to ensure quick access to the data by a particular column that is indexed and will also cover items to be aware of. After creating these tables, a script to upload the event log items to the SQL server will be created so that the script can be run from any machine to ensure scalability. After the script is created and tested, this step-by-step will go through how to create a trigger that will run the script whenever a new event log entry is created. Requirements: PowerShell 3.0, Microsoft SQL Server [w/ Management Tools] Step 1 : Create a diagram of the tables that will be used to store the data Considerations when designing your tables: a) What data is available? b) How will you identify the machine once the data is in the database? c) What log did the data come from and how will this be stored in the database? d) Is there an efficient way to organize the data to make retrieving the data quicker? e) What columns will people be searching from? f) What should the Primary Keys for the table(s) be? What is a Primary Key? A primary key is basically an index number.
    [Show full text]
  • IBM Qradar: Wincollect User Guide V7.3.1 Chapter 1
    IBM QRadar WinCollect User Guide V7.3.1 IBM Note Before using this information and the product that it supports, read the information in “Notices” on page 99. Product information © Copyright International Business Machines Corporation 2011, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this WinCollect User Guide...........................................................................v Chapter 1. WinCollect overview............................................................................. 1 What's new in WinCollect............................................................................................................................ 4 MSEVEN6 protocol....................................................................................................................................... 5 Chapter 2. Installation prerequisites for WinCollect............................................... 7 Communication between WinCollect agents and QRadar..........................................................................8 Enabling remote log management on Windows.................................................................................... 9 Hardware and software requirements for the WinCollect host................................................................10 Prerequisites for upgrading WinCollect agents.........................................................................................12 Chapter 3. WinCollect installations.....................................................................
    [Show full text]