Collect, analyse, and act on Windows Event Logs from servers and workstations across your environment. Cloudmon surfaces security threats, application failures, logon activity, and system events in a unified dashboard, with built-in AI assistance to decode and contextualise each log entry.
Windows Event Log monitoring in Cloudmon collects logs from Windows servers and workstations using the Cloudmon agent installed on each target machine. Once configured, logs flow into a dedicated dashboard under Logs → Windows Event Logs, giving your team a consolidated view of events across your entire Windows infrastructure without needing to log into individual machines.
Cloudmon includes built-in rules that automatically monitor key security-related events such as failed logons, account lockouts, access violations, and log tampering. These run out of the box with no additional setup. For organisation-specific requirements, custom log rules can be defined to monitor any event pattern, tag entries, raise alarms, or discard irrelevant logs before they reach the database. Cloudmon also integrates with Azure OpenAI to provide AI-assisted log analysis, automatically interpreting and contextualising log entries so your team can understand and respond to events faster.
Before Windows Event Logs can be collected, the following must be in place:
To configure Windows Event Log collection, navigate to Settings → Configurations → Log Profiles and click Add. Fill in the fields as follows:
| Field | Description |
| Profile Name | A descriptive name to identify this log profile in Cloudmon. |
| Log Type | Select Windows Event Logs to collect Windows event log data. |
| Windows Event Type | The Windows log channel to collect from. Options include Application, System, and Security. Each can be profiled separately or combined across multiple profiles. |
| Target Servers | The agent-monitored Windows servers or workstations from which logs will be collected under this profile. |
Click Save to activate the profile. Once saved, the Windows Event Logs dashboard becomes available under Logs → Windows Event Logs. To view logs for a specific server, navigate to Agents → [Server Name] → WEL tab.
The Windows Event Logs dashboard presents a full picture of activity across your Windows estate. The summary counters at the top of the dashboard track high-priority event categories including Successful Application Installations, Failed Application Installations, Application Crashes, Bad Disk Sectors, Unexpected Shutdowns, Restart Required, Application Hangs, Failed Windows Updates, and Successful Logons.
Below the summary counters, events are further broken down by level and category. Event levels, covering Audit Success, Information, Warning, and Error, are displayed both as totals and as a donut chart showing the proportional distribution. Task Categories presents a pie chart of logon activity types including Logon, Logoff, Special Logon, Credential Validation, Security Group Management, and Windows Update Agent events.
The dashboard also surfaces the following panels to give deeper operational and security context:
Cloudmon integrates with Azure OpenAI to provide AI-assisted analysis of Windows Event Log entries. When viewing a log entry, click the AI button adjacent to the entry to trigger analysis. Cloudmon will return a structured breakdown covering an Overview of the event, its potential Impact, a plain-language Summary, and Troubleshoot and Analyse guidance to help your team understand and respond to the event quickly.
To enable this feature, an Azure OpenAI integration must be configured. Navigate to Settings → Configurations → Integrations, locate the Azure OpenAI Service widget, click Add, and enter your Target URI and API Key from your Azure OpenAI resource. Click Save to activate.
Log rules allow you to control how Cloudmon processes Windows Event Log entries as they arrive, before they reach the dashboard or database. Rules can tag entries for filtering, raise alarms on specific event patterns, discard irrelevant logs to reduce noise, stop further rule processing for a matched entry, or generate a custom event record. To configure log rules, navigate to Settings → Configurations → Log Rules, click Add, set the Log Type to Windows Event Logs, and define your conditions and actions.