Securing your Event logs

by Mitch Tulloch [Published on 7 June 2007 / Last Updated on 7 June 2007]

Preventing rogue administrators from tampering with Event logs.

Event logs can easily be tampered with if a user belongs to the local Administrators group on a system. For example, you can disable the Event Log service, reboot your machine, and mess around with the event log files. Or even easier, you can download a tool like WinZapper (see which will let you delete individual events from your event logs even while your system is still running!

How can you prevent rogue Administrators then from modifying event logs on your system? By consolidating the logs on your systems to a safe and secure central location. One great way for doing this is to use Audit Collection Services (ACS), a part of Microsoft System Center Operations Manager 2007, see for details. Archiving your centralized logs offline at a secure site will add even more security to this scenario.

Mitch Tulloch was lead author for the Windows Vista Resource Kit from Microsoft Press, which is THE book for IT pros who want to deploy, maintain and support Windows Vista in mid- and large-sized network environments. For more information see

The Author — Mitch Tulloch

Mitch Tulloch is a well-known expert on Windows Server administration and cloud computing technologies. He has published over a thousand articles on information technology topics and has written, contributed to or been series editor for over 50 books.

Latest Contributions

Featured Links