EVENT LOG VIEWER

Remote Event Log Viewer.

Deep-scan string matching and rapid log retrieval—without leaving the dashboard. Instantly identify application crashes and kernel panics across the network using a highly resilient execution pipeline.

SEE HOW IT WORKS
WinRM Dispatcher ● CONNECTED

[UHDC] REMOTE EVENT LOG VIEWER

[i] Attempting connection to LAPTOP-US-4829 via WinRM...

> Deep searching last 10,000 events for keyword: 'bugcheck'...

[UHDC SUCCESS] Found 3 matching logs via WinRM.

Time Level Provider
14:22:01 Critical Kernel-Power
14:21:58 Error BugCheck
14:21:55 Info Windows Error Reporting

> Full dataset saved to: C:\UHDC\Logs\EventLogs_LAPTOP-US-4829_20260302.csv

Bypass the Event Viewer GUI

When an application silently crashes or a laptop blue-screens, standard protocol requires remote-controlling the machine and manually digging through the slow Windows Event Viewer. This engine extracts the exact faulting module in seconds.

Resilient Execution Pipeline

Establishes a remote session over Port 5985 (WinRM) to execute the query locally on the target. If endpoint firewalls block WinRM, the engine seamlessly falls back to a Base64-encoded payload deployed via PsExec.

Dynamic UI Injection

Packages the raw event objects into a compressed JSON string, transmits it back to the console, and pipes it into a dynamic HTML <table> for immediate, color-coded visual triage.

Silent CSV Backup

Simultaneously serializes the full, un-truncated dataset to a local, timestamped CSV file in your C:\UHDC\Logs directory to ensure deep forensic review is available if the UI snippet isn't enough.

INTERACTIVE TRAINING ENGINE
⭐ 200 XP

How Junior Techs Learn This Tool:

While the UHDC uses PowerShell to parse and format thousands of logs into a clean UI table, a junior technician should know how to pull event logs manually from the command line. The training engine teaches them how to utilize Sysinternals PsExec to remotely execute the native Windows Event Utility (wevtutil) to instantly grab the latest system events in plain text without needing to open the slow Event Viewer GUI.

psexec \\$Target wevtutil qe System /c:10 /f:text /rd:true

The In-Person Equivalent

Opening Event Viewer (eventvwr.msc), navigating to Windows Logs -> System, and filtering the log for Critical and Error events.

Technical Q&A

Q: What network ports are required for this tool to function?
The engine primarily relies on