At least in Window Vista, in the Security Event log, any unauthorized attempted login show the originators IP address -- why is this field now removed from Windows 7? Is there a hack or fix to add that field back ?
Windows 7 Security log - lacking
Report abuse
Thank you.
Reported content has been submitted
Hi Ian2012,
This option still exists in Windows 7.
Application (program) events. Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate
a possible future problem. An information event describes the successful operation of a program, driver, or service.
· Security-related events. These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful.
Applications and Services Logs vary. They include separate logs about the programs that run on your computer, as well as more detailed logs that pertain to specific Windows services.
1. Open Event Viewer by clicking the Start button, clicking Control Panel, clicking System and Security, clicking Administrative Tools, and then double-clicking Event Viewer. If you're prompted for an administrator password or confirmation, type the password
or provide confirmation.
2. Click an event log in the left pane.
3. Double-click an event to view the details of the event.
For more help on Security logs refer to the articles below:
http://windows.microsoft.com/en-US/windows7/What-information-appears-in-event-logs-Event-Viewer
http://technet.microsoft.com/en-us/library/cc722404.aspx
http://technet.microsoft.com/en-us/library/dd772623%28WS.10%29.aspx
http://technet.microsoft.com/en-us/library/dd941592%28WS.10%29.aspx
Security Audit Events for Windows 7
http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=3a15b562-4650-4298-9745-d9b261f35814
You can use Windows security and system logs to record and store collected security events so that you can track key system and network activities to monitor potentially harmful behaviors and to mitigate those risks. You customize system log events by configuring auditing based on categories of security events such as changes to user account and resource permissions, failed attempts for user logon, failed attempts to access resources, and attempts to modify system files. The information in this download can help you analyze the data included in event log data.
Please let us know if this assists you in resolving the issue or if further assistance is needed.
Hope it helps.
Thanks and Regards:
Shekhar S - Microsoft Support.
Visit our Microsoft Answers Feedback Forum and let us know what you think. If this post helps to resolve your issue, please click the "Mark as Answer" or "Helpful" button at the top of this message. By marking a post as Answered, or Helpful you help others find the answer faster.
Shekhar Sharma
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Thanks - keep working the problem.
-Ian
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Report abuse
Thank you.
Reported content has been submitted
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Question Info
Last updated April 22, 2025 Views 5,573 Applies to: