{"id":13371,"date":"2011-07-09T00:01:00","date_gmt":"2011-07-09T00:01:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/heyscriptingguy\/2011\/07\/09\/use-powershell-to-troubleshoot-windows\/"},"modified":"2011-07-09T00:01:00","modified_gmt":"2011-07-09T00:01:00","slug":"use-powershell-to-troubleshoot-windows","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/scripting\/use-powershell-to-troubleshoot-windows\/","title":{"rendered":"Use PowerShell to Troubleshoot Windows"},"content":{"rendered":"<p><b><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/2043.wes-7-9-11-02.png\"><\/a>Summary<\/b>: Learn how to use Windows PowerShell to troubleshoot Windows by working with ETW logs.<\/p>\n<p>&nbsp;<\/p>\n<h2>Weekend Scripter: Troubleshooting Windows<\/h2>\n<p>Microsoft Scripting Guy Ed Wilson here. I do not know about you, but I enjoy troubleshooting Microsoft Windows. There is something rewarding about seeing a problem, diagnosing the problem, and resolving the issue. With Windows 7, troubleshooting is quite a bit easier than it was in previous versions. One reason for this is because of all the new diagnostic logs that are available (these logs first became available with Windows Vista and Windows Server 2008; they are also available in Windows Server 2008 R2). The Event Tracing for Windows (ETW) logs are visible in Event Viewer as seen in the figure that follows.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/1440.HSG-7-9-11-01.png\"><img decoding=\"async\" style=\"border: 0px\" title=\"Image of ETW logs in Event Viewer\" alt=\"Image of ETW logs in Event Viewer\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/1440.HSG-7-9-11-01.png\" \/><\/a><\/p>\n<p>Two things must happen before using the analytic and debug logs. The first is to make them visible. To do this, open Event Viewer by typing eventvwr in Windows PowerShell; or, click the <b>Start<\/b> button, click <b>Control Panel<\/b>, click <b>Administrative Tools<\/b>, and then click <b>Event Viewer<\/b>. On the <b>View<\/b> menu in Event viewer, click <b>Show Analytic and Debug Logs<\/b>, which is shown in the following figure.<\/p>\n<\/p>\n<p>The second thing that must happen before using one of the analytic and debug logs is enabling the specific log. In most cases, these advanced analytic and debug logs are disabled because of performance reasons, so they must be specifically enabled. To enable a trace log, right-click the specific log and click <b>Enable Log<\/b> in the shortcut menu, as shown in the following figure.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/6433.wes-7-9-11-03.png\"><img decoding=\"async\" style=\"border: 0px\" title=\"Image of Enable Log option\" alt=\"Image of Enable Log option\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/6433.wes-7-9-11-03.png\" width=\"349\" height=\"604\" \/><\/a><\/p>\n<p><b>Note<\/b>&nbsp; &nbsp;Keep in mind that enabling a trace log requires administrator rights. If you attempt to enable the trace log without administrator rights, an &ldquo;Access is denied&rdquo; will be displayed. You must click <b>OK<\/b>, and restart Event Viewer with administrator rights. If the account you used to click <b>Show Analytic and Debug Logs<\/b> in the <b>View<\/b> menu is different from the one with administrator rights, you will need to reselect the option to show the analytic and debug logs.&nbsp; &nbsp;<\/p>\n<p>The best way to see how to work with the ETW logs is to &ldquo;play around&rdquo; with them. Enable the WMI-Activity Trace log by right clicking the log name and choosing <b>Enable Log<\/b> from the shortcut menu. A warning message appears that states that you might lose events when enabled, but there are no events in the log anyway, so the message doesn&rsquo;t apply in this case. The warning appears in the following figure.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/1033.wes-7-9-11-04.png\"><img decoding=\"async\" style=\"border: 0px\" title=\"Image of warning that doesn't apply in this case\" alt=\"Image of warning that doesn't apply in this case\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/1033.wes-7-9-11-04.png\" \/><\/a><\/p>\n<p>After the WMI-Activity Trace log is enabled, generate some WMI activity by performing a query via the <b>Get-WMIObject<\/b> cmdlet. Here is the command I use:<\/p>\n<p style=\"padding-left: 30px\">Get-WmiObject win32_bios<\/p>\n<p>Now disable the WMI-Activity Trace log by right clicking it in Event Viewer and then clicking <b>Disable Log<\/b>. Press F5 to refresh the view of the WMI-Activity Trace log, and the logging activity seen in the following figure is shown.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/0576.wes-7-9-11-05.png\"><img decoding=\"async\" style=\"border: 0px\" title=\"Image of logging activity\" alt=\"Image of logging activity\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/0576.wes-7-9-11-05.png\" \/><\/a>&nbsp;<\/p>\n<p>The <b>Get-WinEvent<\/b> Windows PowerShell cmdlet is used to query ETW logs. The first task is to find the WMI-Activity Trace log.<\/p>\n<p>It is possible to use wild cards to assist in finding trace logs. Unfortunately, when I attempt this nothing is returned. This command and its associated error output are shown here:<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; Get-WinEvent -ListLog *wmi* | select logname<\/p>\n<p style=\"padding-left: 30px\">Get-WinEvent : There is not an event log on the localhost computer that matches &#8220;*wmi*&#8221;.<\/p>\n<p style=\"padding-left: 30px\">At line:1 char:13<\/p>\n<p style=\"padding-left: 30px\">+ Get-WinEvent &lt;&lt;&lt;&lt;&nbsp; -ListLog *wmi* | select logname<\/p>\n<p style=\"padding-left: 30px\">&nbsp;&nbsp;&nbsp; + CategoryInfo&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : ObjectNotFound: (:) [Get-WinEvent], Exception<\/p>\n<p style=\"padding-left: 30px\">&nbsp;&nbsp;&nbsp; + FullyQualifiedErrorId : NoMatchingLogsFound,Microsoft.PowerShell.Commands.GetWinEventCommand<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt;<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p>An error appears because you must make analytic and debug logs visible to the <b>Get-WinEvent<\/b> cmdlet by using the <i>force<\/i> switched parameter. The revised command and associated output are shown here:<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; Get-WinEvent -ListLog *wmi* -force | select logname<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p style=\"padding-left: 30px\"><span style=\"text-decoration: underline\">LogName<\/span><\/p>\n<p style=\"padding-left: 30px\">Microsoft-Windows-EventLog-WMIProvider\/Debug<\/p>\n<p style=\"padding-left: 30px\">Microsoft-Windows-WMI-Activity\/Trace<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p>There are two logs that match the wildcard character pattern <b>*wmi*<\/b>. No problem! I add the word <b>trace<\/b> to the end of my wildcard character pattern, and now I retrieve only the log name I am interested in viewing. The command and associated output are shown here:<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; Get-WinEvent -ListLog *wmi*trace -force | select logname<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p style=\"padding-left: 30px\">LogName<\/p>\n<p style=\"padding-left: 30px\">&#8212;&#8212;-<\/p>\n<p style=\"padding-left: 30px\">Microsoft-Windows-WMI-Activity\/Trace<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p>Because the wildcard character pattern only returns a single item, it is possible to retrieve the log name directly by using a dotted notation. When completed, I can use the <b>Get-WinEvent<\/b> cmdlet to retrieve contents from the WMI trace log file. Unfortunately, an error occurs. The command and associated error are shown here:<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; $wmiLog = (Get-WinEvent -ListLog *wmi*trace -force).logname<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; Get-WinEvent -LogName $wmilog<\/p>\n<p style=\"padding-left: 30px\">Get-WinEvent : The Microsoft-Windows-WMI-Activity\/Trace event log can be read only in the forward chronological order because it is an analytical or a debug log. To see events from the Microsoft-Windows-WMI-Activity\/Trace event log, use the Oldest parameter in the command.<\/p>\n<p style=\"padding-left: 30px\">At line:1 char:13<\/p>\n<p style=\"padding-left: 30px\">+ Get-WinEvent &lt;&lt;&lt;&lt;&nbsp; -LogName $wmilog<\/p>\n<p style=\"padding-left: 30px\">&nbsp;&nbsp;&nbsp; + CategoryInfo&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : InvalidArgument: (Microsoft-Windows-WMI-Activity\/Trace:String) [Get-WinEvent], Exception<\/p>\n<p style=\"padding-left: 30px\">&nbsp;&nbsp;&nbsp; + FullyQualifiedErrorId : SpecifyOldestForLog,Microsoft.PowerShell.Commands.GetWinEventCommand<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p>The needed clue appears in the error message, &ldquo;&hellip;use the Oldest parameter in the command.&rdquo; After I modify the command, the command works. The revised command and associated output are shown here:<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt; Get-WinEvent -LogName $wmilog -Oldest<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p style=\"padding-left: 30px\"><span style=\"text-decoration: underline\">TimeCreated<\/span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; <span style=\"text-decoration: underline\">ProviderName<\/span>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<span style=\"text-decoration: underline\">Id Message<\/span><\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 398; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 402<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 403<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 401<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 404<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 405<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 406; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 406<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 407<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 GroupOperationId = 399; Op&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 408<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:03:51 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2 ProviderInfo for GroupOper&#8230;<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:04:01 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 400<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:04:42 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 387<\/p>\n<p style=\"padding-left: 30px\">7\/6\/2011 6:04:42 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Microsoft-Windows-WMI-Acti&#8230;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 Stop OperationId = 398&nbsp;<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p style=\"padding-left: 30px\">PS C:\\Windows\\system32&gt;<\/p>\n<p style=\"padding-left: 30px\">&nbsp;<\/p>\n<p>Well, that is enough for a Saturday. Tomorrow, I have a great guest article by James Brundage. On Monday, I will pick up where we left off today, and we will begin to analyze the WMI trace log. For more information about using the <b>Get-WinEvent<\/b> cmdlet, refer to <a href=\"http:\/\/blogs.technet.com\/search\/searchresults.aspx?q=Get-WinEvent&amp;sections=7618\">this collection of Hey, Scripting Guy! Blog posts<\/a>.<\/p>\n<p>I invite you to follow me on <a href=\"http:\/\/bit.ly\/scriptingguystwitter\" target=\"_blank\">Twitter<\/a> and <a href=\"http:\/\/bit.ly\/scriptingguysfacebook\">Facebook<\/a>. If you have any questions, send email to me at <a href=\"mailto:scripter@microsoft.com\" target=\"_blank\">scripter@microsoft.com<\/a>, or post your questions on the <a href=\"http:\/\/bit.ly\/scriptingforum\" target=\"_blank\">Official Scripting Guys Forum<\/a>. See you tomorrow. Until then, peace.<\/p>\n<p><b>Ed Wilson, Microsoft Scripting Guy <\/b><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Learn how to use Windows PowerShell to troubleshoot Windows by working with ETW logs. &nbsp; Weekend Scripter: Troubleshooting Windows Microsoft Scripting Guy Ed Wilson here. I do not know about you, but I enjoy troubleshooting Microsoft Windows. There is something rewarding about seeing a problem, diagnosing the problem, and resolving the issue. With Windows [&hellip;]<\/p>\n","protected":false},"author":596,"featured_media":87096,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[97,98,31,60,3,4,134,61,45,6],"class_list":["post-13371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scripting","tag-event-logs","tag-logs-and-monitoring","tag-operating-system","tag-performance","tag-scripting-guy","tag-scripting-techniques","tag-troubleshooting","tag-weekend-scripter","tag-windows-powershell","tag-wmi"],"acf":[],"blog_post_summary":"<p>Summary: Learn how to use Windows PowerShell to troubleshoot Windows by working with ETW logs. &nbsp; Weekend Scripter: Troubleshooting Windows Microsoft Scripting Guy Ed Wilson here. I do not know about you, but I enjoy troubleshooting Microsoft Windows. There is something rewarding about seeing a problem, diagnosing the problem, and resolving the issue. With Windows [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/13371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/users\/596"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/comments?post=13371"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/13371\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media\/87096"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media?parent=13371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/categories?post=13371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/tags?post=13371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}