Fleet logo
Menu An icon indicating that interacting with this button will open the navigation menu.
Fleet logo An 'X' icon indicating that this can be interacted with to close the navigation menu.
Multi platform
Device management   (+ MDM) Orchestration   (+ monitoring) Software management   (+ CVEs) Integrations

Docs
Stories
News Ask around Share your story COMPANY
The handbook What people are saying

Pricing Schedule a demo
Multi platform
Device management + MDM Orchestration + monitoring Software management + CVEs, usage, app library Integrations
Docs
Stories
News Ask around Schedule a demo Share your story COMPANY The handbook What people are saying
Pricing Try it yourself

Tables

Fleet uses osquery tables to query operating system, hardware, and software data. Each table provides specific data for analysis and filtering.

macOS Apple

Linux Linux

Windows Windows

Chrome ChromeOS

{{table.title}} evented table

windows_eventlog

click to open the table of contents
Windows logo

windows​_eventlog

Table for querying all recorded Windows event logs.

Column Type Description
channel text Source or channel of the event
Required in WHERE clause
computer_name text Hostname of system where event was generated
data text Data associated with the event
datetime text System time at which the event occurred
eventid integer Event ID of the event
keywords text A bitmask of the keywords defined in the event
level integer Severity level associated with the event
pid integer Process ID which emitted the event record
provider_guid text Provider guid of the event
provider_name text Provider name of the event
task integer Task value associated with the event
tid integer Thread ID which emitted the event record
time_range text System time to selectively filter the events
Not returned in SELECT * FROM windows_eventlog.
timestamp text Timestamp to selectively filter the events
Not returned in SELECT * FROM windows_eventlog.
xpath text The custom query to filter events
Required in WHERE clause
Not returned in SELECT * FROM windows_eventlog.

Example

Tracking user account changes is a key part of both detection & incident response. This query lists all Windows Eventlogs from the Security channel with an EventID of 4720 - A user account was created. There are many other relevant EventIDs that should be monitored as well:

  • 4722: Account enabled

  • 4724: Password reset

  • 4728: Added to a security-enabled global group

SELECT datetime,computer_name,data FROM windows_eventlog WHERE eventid=4720 AND channel='Security'

Notes

  • This is not an evented table - instead, it pulls directly from the local system's existing eventlogs.

  • The information returned in the data column will be JSON formatted, which will require additional parsing.

Edit page

Questions?

Ask us anything
{{table.title}} evented table
Fleet logo
Multi platform Device management Orchestration Software management Integrations Pricing
Documentation Support Docs API Release notes Get your license
Company About News Jobs Logos/artwork Why open source?
ISO 27001 coming soon a small checkmarkSOC2 Type 2 Creative Commons Licence CC BY-SA 4.0
© 2025 Fleet Inc. Privacy
Slack logo GitHub logo LinkedIn logo X (Twitter) logo Youtube logo Mastadon logo
Tried Fleet yet?

Get started with Fleet

Start
continue
×