Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Windows Client OS

Can I quickly view other computer's Event Logs?

…Yes. There are at least 3 ways I can think of right now.

Method #1

The easiest way is to run the command

​eventvwr.exe ''computername

where computername is the name of the computer you want to view.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Method #2

Another way is to run eventvwr.exe and then right click Event Viewer (local) and choose Connect to another computer.

For some unknown reason, if you run eventvwr.msc (.MSC is the file type of most Administrative Tools, as they are mere Snap-Ins within an MMC console) you cannot perform the previous tip. You’ll need to enter it in a different way:

​eventvwr.msc /computer=computername

where computername is the name of the computer you want to view.

(Thank you Steven G. Yarnot for the add-on)

Method #3

A third way is to open a new MMC console, choose Add/Remove Snap-Ins, and add the Event Viewer Snap-In of all the required computers you want to look at.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: