I am working on one the client requirement where i need to read the event viewer logs on Windows machine using BigFix Analysis, Absolute path of the event log is Event Viewer → Applications and Services Logs → Microsoft → Windows → BitLocker-Management → Management, I want to search a keyword “TPM” if that keyword found then it should provide me the information of Level, Date & Time, Source, Event ID and it should provide the information mentioned inside the GENERAL tab. Kindly help me to achieve this task.
Word of a caution. This is the heaviest inspector that exist as far as I am concerned! Depending how big your event logs are and how many findings there are I would thread very very careful! I have seen a query to find a specific event ID in the system event log evaluate for 10+ mins and spike one core at 100% for the duration (and agent does nothing else for the duration) - granted the machine had 150mb event logs and that same freeze was observed with any other event log query tool but still I would never put a query like that in a property.
A while back I even compared the event log inspectors vs the wmi query against Win32_NTLogEvent and the former came off worse (faster to apply same exact query via WMI).
I used the relevance descriptions of it of records whose (event id of it = 840 and description of it as lowercase contains "A trusted WIM file has been added ") of event log “Microsoft-Windows-BitLocker-API/Management”
But it says The expression could not be evaluated: Windows Error 0x3a9f: The specified channel could not be found.
I can confirm the path,keyword and event id is absolutely correct mentioned in above relevance and I can see the same error from other machines too.
Here is a snippet of the analysis we use when we need it. But as it was stated in the event log inspectors are the most impactful from a performance aspect so be cautious when using them.
We have also parsed through event logs with powershell then reported on the exported event logs via property in webreports so that might be an option for you too.
(time generated of it, description of it) of records whose (time generated of it > now - day * 7 ) of event log “Microsoft-Windows-BitLocker/BitLocker Management”