DESKTOP

Detecting and Resolving Windows Vista Errors

9/5/2010 9:24:43 AM
Any particular computer can have dozens, and in some cases hundreds, of different components, services, and applications configured on it. Keeping all these components working properly is a big job and the built-in diagnostics features discussed previously in this book do a good job of detecting common problems and finding solutions for them.  Like the built-in diagnostic features, this console attempts to provide solutions to problems where possible. Not all problems can be automatically detected and resolved, and this is where the errors reported by Windows components, applications, services, and hardware devices become useful.

Using the Event Logs for Error Tracking and Diagnosis

Windows Vista stores errors generated by processes, services, applications, and hardware devices in log files. Two general types of log files are used:

  • Windows Logs Logs used by the operating system to record general system events related to applications, security, setup, and system components

  • Applications And Services Logs Logs used by specific applications or services to record application-specific or service-specific events

Entries in a log file are recorded according to the warning level of the activity, which can include errors as well as general informational events. You'll see the following levels of entries:

  • Information An informational event, which is generally related to a successful action

  • Audit Success An event related to the successful execution of an action

  • Audit Failure An event related to the failed execution of an action

  • Warning A warning, details of which are often useful in preventing future system problems

  • Error An error, such as the failure of a service to start

In addition to level, date, and time, the summary and detailed event entries provide the following information:

  • Source The application, service, or component that logged the event.

  • Event ID An identifier for the specific event.

  • Task Category The category of the event, which is sometimes used to further describe the related action.

  • User The user account that was logged on when the event occurred. If a system process or service triggered the event, the user name is usually that of the special identity that caused the event, such as Network Service, Local Service, or System.

  • Computer The name of the computer where the event occurred.

  • Details In the detailed entries, this provides a text description of the event, followed by any related data or error output.

Viewing and Managing the Event Logs

You can access event logs using the Event Viewer node in Computer Management. To open Computer Management, click Start. Then select All Programs, Administrative Tools, and then Computer Management. If the Administrative Tools menu isn't accessible, you can access this tool by clicking Start and then selecting Control Panel. In Control Panel, click System And Maintenance, Administrative Tools, and then Computer Management.

You can access the event logs by completing the following steps:

  1. Open Computer Management. You are connected to the local computer by default. If you want to view logs on a remote computer, right-click the Computer Management entry in the console tree (left pane) and then select Connect To Another Computer. Then, in the Select Computer dialog box, enter the name of the computer that you want to access and click OK.

  2. Expand the Event Viewer node and then expand the Windows Logs, the Application And Services Logs node, or both to view the available logs.

  3. Select the log that you want to view, as shown in Figure 1.
Image from book
Figure 1: Event Viewer displays events for the selected log.

Warnings and errors are the two key types of events you'll want to examine closely. Whenever these types of events occur and you are unsure of the cause, double-click the entry to view the detailed event description. Note the source of the error and attempt to resolve the problem using the techniques discussed in this book. To learn more about the error and steps you can take to resolve it (if necessary), you can click the link provided in the error description or search the Microsoft Knowledge Base for the event ID or part of the error description.



Other  
  •  Scheduling Maintenance Tasks in Vista
  •  Backing Up and Recovering a Computer with Vista
  •  Troubleshooting Startup and Shutdown
  •  How an Access Control List Is Used
  •  Silverlight Tools: XML Editors
  •  Algorithms for Compiler Design: VARIOUS APPROACHES TO SYMBOL TABLE ORGANIZATION
  •  Algorithms for Compiler Design: REPRESENTING THE SCOPE INFORMATION IN THE SYMBOL TABLE
  •  Algorithms for Compiler Design: ACTIVATION OF THE PROCEDURE AND THE ACTIVATION RECORD
  •  Algorithms for Compiler Design: STACK ALLOCATION
  •  Algorithms for Compiler Design: ERROR RECOVERY IN LR PARSING
  •  Algorithms for Compiler Design: PREDICTIVE PARSING ERROR RECOVERY
  •  Algorithms for Compiler Design: LOOP OPTIMIZATION
  •  Algorithms for Compiler Design: ELIMINATING INDUCTION VARIABLES
  •  Algorithms for Compiler Design: ELIMINATING LOCAL COMMON SUBEXPRESSIONS
  •  Algorithms for Compiler Design:
  •  Algorithms for Compiler Design
  •  Algorithms for Compiler Design: THE MACHINE MODEL
  •  Algorithms for Compiler Design: STRAIGHTFORWARD CODE GENERATION
  •  Algorithms for Compiler Design: USING DAG FOR CODE GENERATION
  •  Algorithms for Compiler Design: USING ALGEBRAIC PROPERTIES TO REDUCE THE REGISTER REQUIREMENT
  •  
    Top 10
    Nexus 10 - A Worthy Challenger To The iPad
    Under The Surface (Part 2)
    Under The Surface (Part 1)
    Upgrade Your Apps (Part 3) - January 2013
    Upgrade Your Apps (Part 2) - January 2013
    Upgrade Your Apps (Part 1) - January
    How Secure Is Your Pin? (Part 2)
    How Secure Is Your Pin? (Part 1)
    5-Minute – How To Filter Spam in Apple Mail
    What's New In Visiual Studio 2012
    Most View
    The Best Entry Level Phones – November 2012 (Part 4) - Motorola Motosmart
    Surviving Changes to Columns
    Reliving the Commodore 64 Glory Days (Part 2)
    10 Things To Try Right Now (Part 1)
    Deal With A Malware Infected Notebook
    Android Security : Services
    Special FX - Bow Down To Industrial Light & Magic (Part 2)
    Olympus SH-21 - Attractive Features For Travelers
    The Speaker Stand: Logitech
    The New iPad: answer your questions
    SQL Server 2008 : Correlating Profiler and the Performance Monitor
    Nikon D600 - A Full-Frame Nikon For Your Full-Time Passion (Part 2)
    Algorithms for Compiler Design: OBTAINING THE REGULAR EXPRESSION FROM THE FINITE AUTOMATA
    Programming COM+ Security (part 2) - Creating the Serviced Component, Specifying the COM+ Application Type
    Executing Work on a Background Thread with Updates
    .NET Compact Framework : Drawing Text
    How To Specify And Build A Media PC (Part 3) - Step-By-Step Guide
    Windows Server 2008 R2 : Understand Backup and Recovery
    Windows Phone 7 Development : Media - Adding Sounds to an Application
    Tablet Toshiba AT200 - The World’s Thinnest Tablet