skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Windows Logging Service 3.0.058

Abstract

WLS gathers all known relevant contextual data along with standard event log information, processes it into an easily consumable format for analysis by 3rd party tools, and forwards the logs to any compatible log server.

Authors:
Publication Date:
Research Org.:
Kansas City Plant (KCP), Kansas City, MO (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
Contributing Org.:
Honeywell FM&T
OSTI Identifier:
1357182
Report Number(s):
WLS 3.0.058; 005277IBMPC00
DOE Contract Number:
NA0002839
Resource Type:
Software
Software Revision:
00
Software Package Number:
005277
Software CPU:
IBMPC
Source Code Available:
Yes
Country of Publication:
United States

Citation Formats

McCord, Jason. Windows Logging Service 3.0.058. Computer software. Vers. 00. USDOE National Nuclear Security Administration (NNSA). 13 Apr. 2017. Web.
McCord, Jason. (2017, April 13). Windows Logging Service 3.0.058 (Version 00) [Computer software].
McCord, Jason. Windows Logging Service 3.0.058. Computer software. Version 00. April 13, 2017.
@misc{osti_1357182,
title = {Windows Logging Service 3.0.058, Version 00},
author = {McCord, Jason},
abstractNote = {WLS gathers all known relevant contextual data along with standard event log information, processes it into an easily consumable format for analysis by 3rd party tools, and forwards the logs to any compatible log server.},
doi = {},
year = {Thu Apr 13 00:00:00 EDT 2017},
month = {Thu Apr 13 00:00:00 EDT 2017},
note =
}

Software:
To order this software, request consultation services, or receive further information, please fill out the following request.

Save / Share:
  • In today's well-connected environments of the Internet, intranets, and extranets, protecting the Microsoft Windows network can be a daunting task for the security engineer. Intrusion Detection Systems are a must-have for most companies, but few have either the financial resources or the people resources to implement and maintain full-scale intrusion detection systems for their networks and hosts. Many will at least invest in intrusion detection for their Internet presence, but others have not yet stepped up to the plate with regard to internal intrusion detection. Unfortunately, most attacks will come from within. Microsoft Windows server operating systems are widely usedmore » across both large and small enterprises. Unfortunately, there is no intrusion detection built-in to the Windows server operating system. The security logs are valuable but can be difficult to manage even in a small to medium sized environment. So the question arises, can one effectively detect and identify an in side intruder using the native tools that come with Microsoft Windows Server operating systems? One such method is to use Net Logon Service debug logging to identify and track malicious user activity. This paper discusses how to use Net Logon debug logging to identify and track malicious user activity both in real-time and for forensic analysis.« less
  • In today's well-connected environments of the Internet, intranets, and extranets, protecting the Microsoft Windows network can be a daunting task for the security engineer. Intrusion Detection Systems are a must-have for most companies, but few have either the financial resources or the people resources to implement and maintain full-scale intrusion detection systems for their networks and hosts. Many will at least invest in intrusion detection for their Internet presence, but others have not yet stepped up to the plate with regard to internal intrusion detection. Unfortunately, most attacks will come from within. Microsoft Windows server operating systems are widely usedmore » across both large and small enterprises. Unfortunately, there is no intrusion detection built-in to the Windows server operating system. The security logs are valuable but can be difficult to manage even in a small to medium sized environment. So the question arises, can one effectively detect and identify an in side intruder using the native tools that come with Microsoft Windows Server operating systems? One such method is to use Net Logon Service debug logging to identify and track malicious user activity. This paper discusses how to use Net Logon debug logging to identify and track malicious user activity both in real-time and for forensic analysis.« less
  • The ICCanvas 3D visualization program was developed to simplify the study and communication of the results of complex meteorological models and other 3D simulations by exploiting the increasing graphics capabilities of microcomputers. The program allows you to use your personal computer to view level surfaces on structured 3D data, much of which may have been produced by large hydrocodes running on workstations and supercomputers. ICCanvas has been used by DNA to display density distributions of dust and water vapor in 3D simulations of nuclear blast clouds. Together with sophisticated 3D rendering applications, ICCanvas has helped to produce high-quality animated viewsmore » of the development of a blast cloud featuring footprint projections and multiple semitransparent surfaces.« less
  • This document describes the system configuration management activities performed in support of the Windows Calorimeter Control (WinCal) system, in accordance with Site procedures based on Institute of Electrical and Electronic Engineers (IEEE) Standard 828-1990, Standard for Software Configuration Management Plans (IEEE 1990) and IEEE Standard 1042-1987, Guide to Software Configuration Management (IEEE 1987).

To initiate an order for this software, request consultation services, or receive further information, fill out the request form below. You may also reach us by email at: .

OSTI staff will begin to process an order for scientific and technical software once the payment and signed site license agreement are received. If the forms are not in order, OSTI will contact you. No further action will be taken until all required information and/or payment is received. Orders are usually processed within three to five business days.

Software Request

(required)
(required)
(required)
(required)
(required)
(required)
(required)
(required)