Skip to main content

Filter MsiInstaller installation in Event viewer

How to filter or check successful msi installation on a Windows system?

There are quite a lot of ways to filter event viewer, it will solely depend on the taste of the person doing the event viewer audit.

It can be done via PowerShell, XML query, or use command line tools and other methods which the Sys Admin feels comfortable doing.

But when it comes to auditing logs, it’s a tedious task and takes a lot of time and depends on the raw data that you have so you exactly know what you’re searching for.

Command line still a useful tool since it comes handy, you just open the command prompt window and type the command and get the output.

The hardest part is how you digest or do another filtering on the output since it might be convoluted with lots of data. But don’t depend on a single tool, make use of whatever you have on your system and other tools available on the net.

This command line below filters the MsiInstaller for event ID 1033.

wevtutil qe application /q:"*[System[Provider[@Name='MsiInstaller'] and (EventID=1033)]]" > e:\outputmsi_events.txt

What the command does is look for event id 1033 in application event viewer and look for the source of msiinstaller. See the screen shot below for details.

The friendly view details of the event viewer will give you an idea how the command is being parsed and constructed to get the query or that output that we wanted.

If you have been doing json parsing in other programming languages it’s the same logic that is used to process the parsing of the data in event viewer.

The challenge here is the amount of data in the output and how you will process it further. But if you know what you’re looking for you can just open the text file in notepad or other editor then just search for that string or data.

Here’s an example of the data but I already formatted this manually, the output of the command above will just be in a single line, one line may contain up to 1,000 or more characters in a single line.


Popular posts from this blog

Copy a single file using robocopy

Copy a single file using robocopy from a local folder to a shared folder on the network.
A simple rule of thumb before any disaster strike, don't interchange the source and the destination.

If source and destination is mistakenly reverse, files might get overwritten. To avoid any loss of data do a test with a dummy file to ensure things work perfectly.
Robocopy [source][destination]   [file to be copied]
robocopy c:\local_c_folder  \\PC_network\shared_folder   file_to_be_copied_xx.txt
The command will be completed successfully provided the network access right has no issues.

Robocopy works quite good on large files. A simple copy or xcopy command will also work but the speed might vary.

Robocopy is free it can be accessed from command line. No need to install the resource kit tool if the operating system is Windows 7 or newer version.

Copy files with selected file extension using PowerShell and Robocopy:

$extension = ('.pdf', '.jpg', '.txt')
gci d:\WorkFolde…

WMIC get computer name

WMIC get computer model, manufacturer, computer name and  username.
WMIC is a command-line tool and that can generate information about computer model, its manufacturer, its username and other informations depending on the parameters provided.
Why would you need a command line tool if there’s a GUI to check?
If you have 20 or 100 computers, or even more. It’s quite a big task just checking the GUI to check the computer model and username.
If you have remote computers, you need to delegate someone in the remote office or location to check.
Or you can just write a batch file or script to automate the task.
Here’s the code below on how get computer model, manufacturer and the username.
Open an elevated command prompt and type:
wmic computersystem get "Model","Manufacturer", "Name", "UserName"
Just copy and paste the code above, the word “computersystem” does not need to be change to a computer name.
A sample output below will be generated if the co…