Buy new:
$13.44$13.44
FREE delivery:
Tuesday, April 16
Ships from: Honest Bookstore Sold by: Honest Bookstore
Buy used: $8.27
Other Sellers on Amazon
& FREE Shipping
97% positive over last 12 months
& FREE Shipping
100% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool 1st Edition
Purchase options and add-ons
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.
System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
- ISBN-109781932266528
- ISBN-13978-1932266528
- Edition1st
- PublisherSyngress
- Publication dateFebruary 24, 2005
- LanguageEnglish
- Dimensions7 x 1.05 x 9 inches
- Print length464 pages
Popular titles by this author
Editorial Reviews
From the Author
Downloadable chapters from these best selling books:
Google Hacking for Penetration Testers
Dr. Tom Shinder's Configuring ISA Server 2004
Snort 2.1 Intrusion Detection, Second Edition
Nessus Network Auditing
About the Author
Mark Burnett (Technical Editor) is an independent researcher, consultant, and writer specializing in Windows security. Mark is author of Hacking the Code: ASP.NET Web Application Security (Syngress Publishing, ISBN: 1-932266-65-8), co-author of Maximum Windows 2000 Security (SAMS Publishing, ISBN: 0-672319-65-9), co-author of Stealing The Network: How to Own the Box (Syngress Publishing, ISBN: 1-931836-87-6), and is a contributor to Dr. Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks (Syngress Publishing, ISBN: 1-931836-66-3). He is a contributor and technical editor for Syngress Publishing's Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle (ISBN: 1-931836-69-8). Mark speaks at various security conferences and has published articles in Windows IT Pro Magazine (formerly Windows & .NET Magazine), Redmond Magazine, Information Security, Windows Web Solutions, Security Administrator, SecurityFocus.com, and various other print and online publications. Mark is a Microsoft Windows Server Most Valued Professional (MVP) for Internet Information Services (IIS).
Product details
- ASIN : 1932266526
- Publisher : Syngress; 1st edition (February 24, 2005)
- Language : English
- Paperback : 464 pages
- ISBN-10 : 9781932266528
- ISBN-13 : 978-1932266528
- Item Weight : 1.39 pounds
- Dimensions : 7 x 1.05 x 9 inches
- Best Sellers Rank: #3,393,657 in Books (See Top 100 in Books)
- #830 in Computer Operating Systems (Books)
- #1,194 in Microsoft OS Guides
- #3,050 in Computer Programming Languages
- Customer Reviews:
About the authors

Mark Burnett is a security consultant, author, and researcher based in South Weber, Utah. Mark specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. He has spent more than fifteen years working in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for various web sites, newsletters, and magazines.

Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. His educational credentials include a Bachelor's degree in Business Administration and a Master's degree in Cybersecurity and Information Assurance. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a “Renaissance man of IT” with over 25 years of real-world IT experience, he has become an expert in many areas including web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book is written by the author of the tool. The tool's interface appears simple. The power of it is revealed in the variety of uses to which it can be put -- those uses involve the sophisticated command variations possible. The book reveals precisely this.
If you're overwhelmed by system information and how to monitor that without a bunch of 3rd party tools, take a look at Log Parser. It may be just what you need.
Syngress was acquired by Elsevier Publishing. The source files are now available at [...]
Many of the examples are aimed at maintaining and improving security. I found the techniques described helpful for chasing linked defects in a multiple-machine server farm.
Unfortunately, the examples from the book are no longer available on the publisher's web site.
The data extract process has been completed and the gurus are now building the dashboards ... but so far everyone who has seen preliminary results of the analysis really likes what they see - and I'm recommended this book to several co-workers with similar tasks facing them.
I can't recommend this book highly enough - it's great!
If I were to write this book, I would make it easier to understand with ample examples. It's better than Log Paser's Help, but not by a whole lot. I believe that technical books should be reasonably easy to understand - even by the non-technical.
My 3 star rating is just my opinion/experience. Others may find this book to be just the ticket.
1. many pages in the book use a dark gray background with black text to highlight ideas - its hard to read, not enough contrast.
2. Not found anything in the book that isn't already on the web - in large numbers, with hundreds (thousands) of sites churning the same information (welcome to the internet). But it is still a valuable resource for writing scripts.
I've read a ton of Kindle books, and have bought a number of Kindle versions of tech books, and never have I had this issue. I was so excited to get this book because I need to collect web traffic information for literally thousands of IIS servers. What a disappointment. The regular text of of the book is completely normal--you can resize it, change the color, etc. However, the log parser examples are apparently images, and many are absolutely, hilariously, MICROSCOPIC in the KIndle version. They don't enlarge when the text is enlarged and they don't copy. I tried a number of work arounds to enlarge them (mainly doing a screen capture and copying them into Word or a graphics program), and since they're so small they don't enlarge well--they just look like a bunch of pixels. I tried reading the book on a Kindle, my Samsung S5, and in Kindle for PC, and it's all the same. On my phone, which has a nice big screen, it's really hard to tell that the examples are actually text--they just look like fuzzy lines.
So, now I have to pay more for the physical book and lug it around with me rather than having the convenience and flexibility of a Kindle version. That really sucks, as I'm a huge fan of KIndle books (not to mention a fan of paying less).
Within minutes I had several scripts in production and was on my way to writing much more complex queries to squeeze every drop of valuable data from my logs. I'm querying IIS logs, Event Logs, CSV files and more with ease.
I've got this book at my side any time I go to write a new script. I would definitely recommend it to others.
Top reviews from other countries
Sehr gute Qualität.
Ware wie beschrieben.
Kontakt und Hersteller sind Empfehlenswert.
Jederzeit wieder.
5 Sterne. Vielen Dank.
Ps : the scripts parts are NOT selectable, so they must be hand-written without copy'n'paste : not very cool... :-/
Macht man dies, so sucht man sich einen Wolf auf der Seite, um den simplen Registrierungsprozess zu finden. Es gibt keinen mehr: "Thank you for your interest in the Syngress Solutions program. Unfortunately, we have discontinued this program. We thank you for your feedback and understand that it has been difficult to redeem codes. Please see our e-booklet site where we feature over 40 free e-booklets from our bestselling titles'available in pdf. Free content will be updated regularly."
Die kostenlosen "e-booklets" taugen nicht als Trostpreis. Kostenlos gibt es zum Thema des Buches lediglich ein e-Booklet, nämlich Kapitel 4. Das ist schon ärgerlich, heißt es doch, dass man die meisten Skripte und Beispiele mühsam abtippen muss.
Überhaupt scheint Kopieren die größte Angst des Verlags zu sein, womit wir beim Layout angelangt wären. Es gibt in den Kapiteln grau unterlegte Kästen mit speziellen Tipps. Der Hintergrund besteht aus einem feinpixeligen grauen Hintergrund-Muster, der sogar beim bloßen Anschauen schon den Moiré-Effekt erzeugt. Der Kontrast der hellgrauen Schrift auf diesem Hintergrund ist selten mies, so macht das Abtippen noch weniger Freude. Hauptsache das Kopieren wird erschwert. Danke!
Trotzdem habe ich das Buch, das bereits 2004 publiziert wurde (!), nicht zurückgehen lassen. Es gibt zu wenige Alternativen und der Log Parser ist immer noch ein sehr flexibles und mächtiges Programm in der Analyse verschiedenster Windowsdatenformate. Und dass der Entwickler des Programmes selbst, G. Giuseppini, als Autor genannt wird, nimmt einen auch etwas für das Buch ein, obwohl Programmierer selten gute Buchautoren sind.
Letztlich gibt es wenige mir bekannte Alternativen, zumindest in gedruckter Form und einige fruchtbare Anregungen kann einem das Buch schon noch geben. Der Preis für dieses Buch ist aber, siehe nicht eingelöste Versprechen und Layout, zu hoch!






