Event Log Explorer Help Prev Page Prev Page
Using Event Log Explorer (Basics)
Opening Event Log
Opening Event Log Files
Viewing Event Logs
Viewing Event Properties
Sending Event Log to Printer
Event Log Explorer Concept
Computers Tree
Log Views
Advanced use
Filtering events in Event Log Explorer
Pre-filtering events (log loading options)
XML Query Filter
General Filter
Quick Filter
Linked event filter
Bookmarking events
Exporting Event Logs
Backing up Event Logs
Save Event Log As File
Automatic Event Log Backup
Backup batch
Add Computers Wizard
Log properties
Credential manager
Credentials conflict
Analytical reports
Event Alerter
Custom columns
Computer properties
Color coding
Task scheduler
Direct access to files
Working with database
Command line options
Log View Defaults
Log Loading Options
Log files
User interface elements
Main menu and toolbar
Event Log View
Event list
Control toolbar
Description box
Event list context menu
Computers Tree
Add Computer to Tree
Add Group to Tree
Remove Computer or Group
Sorting Items in Tree
Computers tree context menu
Filter/Search Window
XML Query window
Linked Event filter window
Select computer dialog
Description server
Peer-to-peer network issues
Event log backup utility
Event Log Database Export utility
License Agreement

Peer-to-peer network issues

This topic is only for workgroup network users.

When connecting to another Windows computer some non-default security options need to be set on the target computers, or Event Log Explorer may return the message "Access is denied".

If the target Windows computer is a workgroup computer rather than a domain, then the default setting for remote log in is 'guest', which is not enough security level to manage event logs.

How to fix the problem.

Under Control Panels > Administrative Tools > Local Security Policy > Security Options > Network access: Sharing and security model for local accounts, change Guest Only - Local users authenticate as guest to Classic - Local users authenticate as themselves.

Here is the step-by-step instruction:

1. Log on to the target Windows computer with Administrator rights.
2 Click Start and select Control Panel.
3. Make sure that the Control Panel displays its icon in Classic View ( To switch Control Panel from Category view to classic view you should click Switch to Classic View on the left pane of Control Panel window)
4. Double click the Administrative Tools icon.
5. In the Administrative Tools window, double click Local Security Policy.
6. In the Local Security Settings window, in the left-hand pane, double click Local Policies then click Security Options.
7. In the right-hand pane,double click Network Access: Sharing and security model for local accounts.
8. In the dialog box, select option to Classic – local users authenticate as themselves.
9. Click OK button

Note. With classic security model your users should not have blank passwords because it will be possible to crack into the workstation by unauthorized persons. If your users will have blank passwords anyway double click Accounts: Limit local account use of blank passwords to console logon only. In the dialog box, select option to Disabled.

Repeat this procedure on each Windows computer in the workgroup.


UAC remote restrictions

Starting from Windows Vista, Windows operating system is protected by User Account Control (UAC).

When a user who is a member of the local administrators group on the target remote computer establishes a remote administrative connection, they will not connect as a full administrator. The user has no elevation potential on the remote computer, and the user cannot perform administrative tasks.


Remote Registry

Remote Registry Service must be running on the target machine.


© 2005-2019 FSPro Labs. All rights reserved.

Converted from CHM to HTML with chm2web Pro 2.85 (unicode)