Event types, Registry editor – Grass Valley Profile XP Service Manual User Manual
Page 154

Appendix A Diagnostic Tools
154
Profile XP Service Manual
23 July 2004
The Security Log records events relating to system security, such as failed logons.
The Application Log records events generated by applications, such as “log file too
large.”
Logs can be saved for analysis, and with proper access rights, logs on remote
computers and be viewed over the network.
Event types
There are five different “types” of events, each with its own icon:
Information —
Significant but successful events that occur infrequently. For
example, “New cartridge has been inserted. From device: \Device\Tape0.”
Warning —
Warnings of possible future problems. For example, “The F: disk is
at or near capacity. You may need to delete some files.”
Error —
Existing problems. For example, “Failed to set the user’s home
directory d:\USERS\helend.”
Success Audit —
A successful attempt at a security-audit procedure. For
example, “Successful Logon: User Name: timk.”
Failure Audit —
An unsuccessful attempt at a security-audit procedure. For
example, “Logon Failure: Reason: Unknown user name or bad password. User Name:
rosea.”
The events display does not refresh automatically; you must press F5 for manual
refresh to see the latest events. In the
View
menu you can choose to view all events or
only events filtered by type and date, to list either the newest events first or the oldest
first, to search for events, and to display details about an event.
Diagnostic tip —
Analyze events closest to the last System Boot. Often errors that
occur later have failed because of dependency on events before them.
Registry editor
The registry editor lets you view and modify information in the registry files that
make up the configuration database. The registry structure is hierarchical, with the
HKey at the root level. The following table lists and describes the five HKeys:
Root Key Name
Description
HKEY_LOCAL_MACHINE
Contains information about local computer system including
hardware, operating system, memory, device drivers, and start-up
control data. This data effects all users.
HKEY_CURRENT_USER
Contains the user profile for the user currently logged on, including
environment variables, personal program groups, desktop settings,
network connections, printers, and applications preferences. This data
effects only current user.