Use this Knowledge Script to periodically scan the Windows Application event log for entries created by the System Restore service that match the criteria you specify. This script raises an event if an entry matches criteria you specify. The event detail message provides more information about the event.
In the first interval, the value you specify for the Start with events in past N hours parameter determines how far back in the log to check for matching entries. As the script continues to run at subsequent intervals, it checks for any new entries created since the last time the log was checked.
You can further restrict the types of log entries that generate an event in two ways:
Use the Monitor for events of type [...] parameters to search only certain types of events, such as Warning events.
Use the Filter the [...] field for parameters to search only for specific information, such as events associated with a specific user or computer name.
Each time this script runs, it checks the Windows Application event log for entries matching your selection criteria and raises an event if matching entries are found. The event detail message returns the text of the log entries found. When this script is set to collect data, it returns the number of log entries found, and the data point detail message returns the text of the log entries.
System Restore folder
The default interval for this script is Every 30 minutes.
Set the following parameters as needed:
Parameter |
How to Set It |
---|---|
Raise event if matching log entries found? |
Set to y to raise an event when the log contains entries that match your search criteria. The default is y. |
Collect data for matching log entries found? |
Set to y to collect data for charts and reports. If enabled, data collection returns the number of log entries found. The data point detail message returns the text of the log entries. The default is n. |
Start with events in past N hours |
Set this parameter to determine which part of the log to search the first time the job runs. Subsequent searches begin where the previous one finished. The following entries are valid:
The default is 0. |
Monitor for events of type: |
Set to y for each type of event you want to monitor:
If you disable any of these event types, that type of log entry does not raise an event, is not returned in an event detail message, and is not collected as data if you enabled Collect data for matching log entries found? The default is y. |
Filter the [...] field for |
To limit the types of entries that raise events and the type of data that is collected, enter a search string that filters the following fields in the event log:
The search string can contain criteria used to include entries, exclude entries, or both.
|
Maximum number of entries per event message |
Specify the maximum number of log entries to be included in each event's detail message. If this script finds more entries in the log than the specified maximum, it will return multiple events to report the number of entries you have specified. The default is 30 entries. |
Event severity when matching entries found |
Set the event severity level, from 1 to 40, to indicate the importance of an event in which the log contains entries that match your search criteria. The default is 8 (red event indicator). |