Generate summary with AI

If you’ve got weird issues going on with your PC like missing desktop icons, failed updates, or even security concerns, it can be difficult to know how to start diagnosing the problem. There are so many tools and features in Windows that help you run a PC diagnostics report, but you don’t always need to spend hours figuring out each one and troubleshooting a dozen possibilities to work out the problem. Sometimes all you need is an error code attached to a particular failure event and a quick Google search.
That’s why Windows Event Viewer is one of the best starting points because it gives you a breakdown of all the things that happened to your PC, including errors and critical failures. Here’s everything you need to know about accessing, filtering, and analyzing the logs in Windows Event Viewer.
What to know before opening Windows Event Viewer
Windows Event Viewer is a built-in utility in Microsoft Windows that allows users and IT professionals to view, manage, and analyze log data generated by the operating system and applications. These logs are essential for diagnosing errors, monitoring security activities, troubleshooting system crashes, and verifying successful installations or updates.
Windows Event Viewer generates five core log categories that each serve distinct diagnostic and auditing purposes:
Application: Captures events from installed software (e.g., Microsoft Office, SQL Server). Useful for debugging crashes or feature failures.
Security: Records login attempts, access control, and audit policies. Essential for compliance and forensic analysis.
System: Logs OS-level events like driver failures, service startups, and hardware issues.
Setup: Tracks installation and update processes, including Windows upgrades and feature deployments.
Forwarded Events: Aggregates logs from remote systems via event subscriptions. Ideal for centralized monitoring.
Accessing Security and portions of the System logs requires administrative privileges since they contain sensitive information like authentication records, privilege escalations, and kernel-level events that could expose vulnerabilities if misused.
IMPORTANT: Event Viewer logs performance-related events that have already happened. This means it can’t give you real-time performance monitoring or detailed metrics like current CPU utilization. It’s up to you to analyze the logs and draw conclusions; there’s no cause-and-effect explanation beyond what happened at that specific moment, such as an app failing to start or a service crashing.
» Don’t miss our guides to enabling Windows automatic updates and disabling Windows updates
How to access Windows Event Viewer logs
The process of opening Windows Event Viewer and viewing logs has barely changed since Windows XP until Windows 11. Just follow these steps:
1. Press Windows + R to open the run dialog, then type eventvwr.msc and hit Enter

2. Alternatively, search for “event viewer” in the Windows search box and open it that way

3. In Event Viewer, you can access specific logs from the 5 categories by expanding “Windows Logs” in the left pane, then clicking the specific log type you want to search through

4. From here, click “Filter Current Log” from the right panel, then adjust what’s displayed by changing the time events were logged or by threat level. In order of danger, the threat levels mean:
- Critical: Indicates a severe problem that might cause system instability or failure. Requires immediate attention.
- Error: A significant problem occurred, possibly leading to loss of data or functionality. Not critical but should be investigated.
- Warning: An issue that doesn’t immediately affect functionality but could indicate potential future problems or an abnormal condition (e.g., low disk space).
- Information: Successful operations or general system activities. Most events fall into this category and are usually not a concern.
- Verbose: Highly detailed diagnostic information, typically used by developers or IT professionals for deep troubleshooting.

5. Analyze the logs to find critical events, errors, or warnings. You can also shift between the “General” tab and “Details” tab to see an overview of key information or a detailed breakdown that you can use for complex troubleshooting

Key things to look for include:
- Source: The application, service, or component that generated the event (e.g., disk, Service Control Manager, application error, Windows update). This helps pinpoint where the problem originated.
- Event ID: A unique numerical identifier for the event. This ID is incredibly valuable as it can be used in search engines to find Microsoft documentation, forums, or community solutions related to that specific error.
- Task category: Provides additional context about the event within its source (e.g., shutdown, log on/log off).
The “general” tab offers a simple explanation of the event that occurred with these key points highlighted, while the “details” tab provides more technical information, often in XML format, which can be useful for advanced users or when troubleshooting with support.
How long does Event Viewer retain logs?
By default, Windows Event Viewer retains logs based on maximum file size and not duration. For example, the default size for the System or Application logs is often set to 20MB, which may only store 2–5 days of activity depending on system load. Once full, older entries are overwritten unless archiving is enabled.
This might be fine for single endpoints and users, but more complicated networks or machines under heavy workloads might need longer retention or even permanent storage. Here’s how you can adjust:
Directly in Event Viewer
1. Right-click the log you want to modify > Properties

2. Adjust the maximum log size in the properties to a value you think is reasonable. It’s set to about 20 MB by default

3. Alternatively, you can also adjust the system to archive the logs when full instead of overwriting them, or disable overwriting events completely
Keep in mind that disabling overwriting completely means logs will accumulate, continuously consuming more storage space. Be sure to clear them out every once in a while to stop your systems from getting clogged.
With PowerShell
PowerShell provides IT professionals with a powerful way to modify log retention settings across single systems or entire fleets. This is particularly valuable for MSPs managing multiple client environments who need consistent logging standards.
Follow these steps:
1. Open PowerShell as an Administrator

2. View the current configuration of a log by pasting this PowerShell command: Get-WinEvent -ListLog System | Select-Object LogName, MaximumSizeInBytes, LogMode

This returns key information including:
- LogName: The log category (System, Application, Security, etc.).
- MaximumSizeInBytes: Current size limit.
- LogMode: Retention behavior (Circular, AutoBackup, Retain).
3. Increase the maximum size of a specific log. For example, to increase the size of System logs, use this command: wevtutil sl System /ms:104857600
Note: Log sizes must be specified in bytes and should be multiples of 64KB (65536 bytes) for optimal PC performance.

If you want to, change the retention modes with these commands:
- Overwrite as needed: wevtutil sl System /rt:false /ab:false
- Archive log when full: wevtutil sl Security /rt:false /ab:true
- Don’t overwrite (requires manual cleaning): wevtutil sl Security /rt:true
The real benefit from PowerShell scripts comes from the ability to deploy them to all endpoints remotely across entire enterprise IT infrastructures. RMM platforms like Atera allow users to manage log retention policies at scale without touching individual machines.
Instead of manually configuring Event Viewer settings on each workstation, IT teams can push standardized PowerShell scripts to hundreds or thousands of endpoints simultaneously, ensuring consistent logging policies across the organization.
» Learn more: How to run PowerShell commands on a remote computer
How to analyze Windows Event Viewer logs
Now that you know how to find and view the logs, here’s what to look out for and what it means for each log type.
Application logs (software issues)
Application logs capture events from installed software, making them essential for diagnosing crashes, failed updates, and service interruptions. When users report software problems, Application logs are typically your first stop.
Common issues include:
- Crashes in applications like Outlook, SQL Server, or Adobe Reader
- Failed software installations or updates
- .NET runtime errors and service failures
- Application hangs or unresponsive behavior
- Database connection failures
- Third-party service errors
Event ID | Description | Example | Action |
1000 (application error) | Indicates an application crash with faulting module details | Faulting application name: outlook.exe, version: 16.0.5197.1000, faulting module name: KERNELBASE.dll | Review the faulting module path to identify corrupted DLLs or incompatible versions |
1001 (Windows error reporting) | Shows that an error report was generated and potentially sent to Microsoft | Application crash report for Excel.exe was queued for transmission | Check online to see if Microsoft has published fixes for the reported issue |
1002 (application hang) | Records when an application becomes unresponsive | Program chrome.exe version 118.0.5993.89 stopped interacting with Windows | Investigate resource constraints or extension conflicts |
2001 (.NET runtime error) | Critical for .NET application failures | .NET Runtime version 4.0.30319.0 – Fatal Execution Engine Error | Verify .NET Framework installation integrity and consider reinstalling |
10005 (MsiInstaller) | Tracks Windows Installer package operations | Product: Adobe Acrobat Reader DC – Update installation failed | Review installer logs for specific error codes and prerequisite failures |
System logs (OS and hardware problems)
System logs record operating system-level events, including driver failures, service startups, hardware issues, and kernel-level problems. These logs are critical when diagnosing boot issues, unexpected shutdowns, or hardware malfunctions.
Common issues include:
- Driver crashes and compatibility issues
- Disk I/O errors and storage failures
- Unexpected shutdowns or reboots
- Service startup failures (Windows Update, DHCP, DNS)
- Hardware errors (memory, disk controllers, network adapters)
- Time synchronization problems
Event ID | Description | Example | Action |
41 (kernel-power) | System rebooted without cleanly shutting down first | The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly | Investigate power supply issues, overheating, or hardware failures |
7000 (service control manager) | A service failed to start during boot | The Windows Update service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion | Check service dependencies and configuration; attempt manual service restart |
51 (disk) | Disk I/O timeout or failure warning | An error was detected on device \Device\Harddisk1\DR1 during a paging operation | Run disk diagnostics immediately; this often precedes drive failure |
10010 (DistributedCOM) | DCOM server timeout | The server {GUID} did not register with DCOM within the required timeout | Investigate application startup issues or system resource constraints |
219 (kernel-PnP) | Driver failed to load | The driver \Driver\WudfRd failed to load for the device | Update or reinstall the problematic driver; check Windows Update for driver updates |
» Here are our picks for the best hardware monitoring tools
Security logs (threat detection and compliance)
Security logs record authentication events, privilege usage, and audit policy enforcement. These logs are essential for detecting unauthorized access, brute-force attacks, and compliance monitoring.
Common issues include:
- Failed login attempts (potential brute-force attacks)
- Successful logins from unusual locations or times
- Privilege escalation events
- Account lockouts
- Changes to user accounts or security groups
- Access to sensitive files or registry keys
- Audit policy changes
Event ID | Description | Example | Action |
4625 (failed logon) | Records authentication failures | An account failed to log on. Subject: Account Name: SYSTEM. Failure Reason: Unknown user name or bad password. Logon Type: 3 (Network) | Multiple 4625 events from the same source within minutes indicates brute-force attempt; block source IP |
4624 (successful logon) | Documents successful authentication | An account was successfully logged on. Logon Type: 10 (RemoteInteractive), Account Name: administrator | Compare against authorized access times; Logon Type 10 outside business hours warrants investigation |
4672 (special privileges assigned) | High-value account used | Special privileges assigned to new logon: SeDebugPrivilege, SeBackupPrivilege | Verify that administrative access was authorized and expected |
4720 (user account created) | New user account added to system | A user account was created. Account Name: newadmin, Security ID: S-1-5-21-… | Verify legitimate account creation; unauthorized accounts indicate compromise |
4728 (member added to security group) | User added to privileged group | A member was added to a security-enabled global group. Member: john.doe, Group: Domain Admins | Critical for detecting privilege escalation; validate all administrative group changes |
4740 (account locked out) | Account locked due to failed login attempts | A user account was locked out. Target Account: jsmith, Caller Computer Name: WORKSTATION-05 | Investigate whether lockout resulted from forgotten password or malicious activity |
4738 (user account changed) | Account properties modified | A user account was changed. Password Last Set: Never | Monitor for password policy bypasses or account permission changes |
» Double check those strange login attempts with Windows Activity History
Setup logs (installation and updates)
Setup logs track Windows installations, updates, and component configurations. These logs are invaluable when diagnosing failed Windows upgrades, driver installations, or system provisioning issues.
Common issues include:
- Windows feature update failures (e.g., Windows 10 to 11 upgrades)
- Cumulative update installation errors
- Driver installation conflicts
- System component registration failures
- Sysprep operation issues
Event ID | Description | Example | Action |
2 (servicing) | Windows Update component installation failure | Installation Failure: Windows failed to install the following update with error 0x80070643: Security Update for Microsoft .NET Framework | Review Windows Update logs in C:\Windows\Logs\CBS for detailed error codes |
1009 (WinlogonLogon) | User profile service failure | Windows cannot load the user’s profile but has logged you on with the default profile for the system | Indicates corrupted user profile; may require profile recreation |
1530 (user profile service) | Profile load failure with detailed error | Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. | Check for locked registry hives or services holding profile locks |
» Struggling with the registry? Here are the most common registry editor challenges & our solutions
Forwarded Events (centralized monitoring)
Forwarded Events aggregate logs from multiple remote systems into a centralized collector, enabling unified visibility across distributed environments. This log category only contains entries when Windows Event Forwarding (WEF) is configured.
Common issues include:
- Security incidents across multiple endpoints
- System-wide service failures
- Compliance violations requiring audit trails
- Correlated attack patterns spanning multiple machines
- Fleet-wide configuration drift
Unlike other log categories, Forwarded Events don’t have unique Event IDs–. Instead, they contain copies of events from source systems (Application, System, Security). The value lies in centralized correlation.
Transform Windows troubleshooting into proactive prevention
Mastering Windows Event Viewer means understanding log categories, critical Event IDs, and retention policies. It gives IT professionals the diagnostic foundation needed for effective troubleshooting. But at scale, manual log analysis becomes a bottleneck that prevents IT teams from focusing on strategic initiatives.
Atera transforms Event Viewer troubleshooting by enabling IT teams to deploy PowerShell scripts remotely across their entire fleet. Through Atera’s RMM platform, you can push log retention commands to hundreds of endpoints simultaneously, monitor system health, and respond to issues faster. For IT professionals and MSPs managing Windows environments across multiple clients, this centralized approach to remote management transforms reactive troubleshooting into systematic fleet-wide operations.
Frequently Asked Questions
Related Articles
What is IT Management
IT downtime costs thousands of dollars per minute, yet most companies don't realize they have a management problem until systems fail. Without structured IT management, you face productivity hemorrhage, security breaches from unpatched vulnerabilities, and technical debt that consumes IT budgets. Technology should be a business enabler, not a constant crisis.
Read nowWhat is infrastructure monitoring?
The difference between proactive IT and midnight firefighting comes down to visibility: seeing CPU saturation before it crashes services, catching disk failures before they lose data, and detecting anomalies hours before they become disasters. Effective infrastructure monitoring is the path that gets you there.
Read nowCapEx vs. OpEx
Misclassifying IT spending as CapEx or OpEx inflates profits short-term but distorts financial reporting, tax liability, and strategic decisions. Bad enough, this could be extremely costly and time-consuming to fix. Getting it right determines whether your IT investments align with cash flow, growth trajectory, and compliance requirements.
Read nowHow to restart a remote computer using Windows
Remote Windows restarts fail when network connectivity drops, permissions aren't configured correctly, or firewall rules block critical services. This guide covers every method (from Command Prompt and PowerShell to enterprise tools like Intune and SCCM) plus backup strategies for when systems freeze or disconnect from the domain.
Read nowEndless IT possibilities
Boost your productivity with Atera’s intuitive, centralized all-in-one platform







