ANAVEM
Languagefr
Windows Event Viewer displaying critical system events including Event ID 1042 on a monitoring dashboard
Event ID 1042CriticalKernel-PowerWindows

Windows Event ID 1042 – Kernel-Power: System Reboot Without Clean Shutdown

Event ID 1042 indicates the system rebooted without cleanly shutting down first. This critical event signals unexpected power loss, hardware failure, or forced restart scenarios.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 20269 min read 0
Event ID 1042Kernel-Power 5 methods 9 min
Event Reference

What This Event Means

Event ID 1042 represents one of Windows' most important system stability indicators. Generated by the Kernel-Power event provider, this critical-level event logs whenever the system boots after an unclean shutdown. The event creation occurs early in the boot sequence when the kernel's power management subsystem compares the current boot with the previous session's shutdown state.

Windows maintains shutdown state information in the registry and memory structures. When a clean shutdown occurs, specific flags get set indicating proper system termination. During the next boot, if these flags are missing or indicate an incomplete shutdown, Event ID 1042 fires. The event includes timing information, showing when the unexpected shutdown occurred and when the system restarted.

This event proves invaluable for troubleshooting intermittent stability issues, especially in server environments where unplanned downtime impacts business operations. System administrators use Event ID 1042 patterns to identify recurring problems, correlate with hardware monitoring data, and establish baseline system reliability metrics. The event also triggers automated monitoring systems and helps establish root cause analysis timelines for critical system failures.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • Sudden power loss or power supply unit failure
  • Hardware component malfunction causing system freeze
  • Blue Screen of Death (BSOD) with automatic restart enabled
  • Overheating causing thermal protection shutdown
  • Manual power button reset or forced shutdown
  • UPS battery depletion during extended outages
  • Memory errors causing system instability
  • Driver conflicts leading to system hangs
  • Motherboard or CPU hardware failures
  • Storage device failures preventing proper shutdown
Resolution Methods

Troubleshooting Steps

01

Check Event Viewer for Related Events

Start by examining events surrounding the Event ID 1042 to identify the root cause:

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSystem
  3. Right-click in the log pane and select Filter Current Log
  4. In the Event IDs field, enter: 1042, 41, 6008, 1074 to see shutdown-related events
  5. Click OK to apply the filter
  6. Examine events chronologically around each Event ID 1042 occurrence
  7. Look for preceding critical errors, warnings about hardware, or driver issues

Use PowerShell for automated analysis:

Get-WinEvent -FilterHashtable @{LogName='System'; Id=1042} -MaxEvents 20 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
Pro tip: Event ID 41 (unexpected shutdown) often appears alongside 1042, providing additional context about the shutdown cause.
02

Analyze System Reliability History

Windows Reliability Monitor provides a graphical timeline of system events including unexpected shutdowns:

  1. Press Win + R and type perfmon /rel to open Reliability Monitor
  2. Review the stability chart for red X marks indicating critical events
  3. Click on dates showing critical events to see detailed information
  4. Look for patterns in hardware failures, application crashes, or Windows failures
  5. Note any correlation between software installations and subsequent Event ID 1042 occurrences

Generate a reliability report using PowerShell:

Get-WinEvent -FilterHashtable @{LogName='System'; Id=1001} | Where-Object {$_.Message -like '*critical*'} | Select-Object TimeCreated, Message | Format-Table -Wrap

Export reliability data for analysis:

wevtutil epl System C:\temp\system_events.evtx "/q:*[System[EventID=1042]]"
wevtutil qe C:\temp\system_events.evtx /f:text > C:\temp\event_1042_analysis.txt
03

Check Hardware Health and Power Management

Investigate hardware-related causes of unexpected shutdowns:

  1. Open Device Manager by pressing Win + X and selecting Device Manager
  2. Look for devices with yellow warning triangles or red error marks
  3. Check System devices for power management controller issues
  4. Right-click problematic devices and select PropertiesEvents tab

Run hardware diagnostics using PowerShell:

# Check system temperature and power events
Get-WinEvent -FilterHashtable @{LogName='System'; ProviderName='Microsoft-Windows-Kernel-Power'} -MaxEvents 50

# Check for thermal events
Get-WinEvent -FilterHashtable @{LogName='System'; Id=37} -MaxEvents 10

# Verify power policy settings
powercfg /query SCHEME_CURRENT SUB_PROCESSOR PROCTHROTTLEMAX

Check power supply and UPS status:

# Check battery/UPS events if applicable
Get-WinEvent -FilterHashtable @{LogName='System'; ProviderName='Microsoft-Windows-Battery'} -MaxEvents 20

# Review power button events
Get-WinEvent -FilterHashtable @{LogName='System'; Id=109} -MaxEvents 10
Warning: Frequent Event ID 1042 occurrences may indicate failing hardware requiring immediate attention to prevent data loss.
04

Configure Advanced Shutdown Logging

Enable detailed shutdown logging to capture more information about unexpected reboots:

  1. Open Registry Editor by pressing Win + R, typing regedit, and pressing Enter
  2. Navigate to HKLM\SYSTEM\CurrentControlSet\Control\CrashControl
  3. Create or modify the DWORD value DisplayParameters and set it to 1
  4. Navigate to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability
  5. Create DWORD ShutdownReasonUI and set to 1 to prompt for shutdown reasons

Enable verbose shutdown logging via Group Policy or registry:

# Enable shutdown event tracker
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Reliability" -Name "ShutdownReasonOn" -Value 1 -Type DWord

# Configure automatic restart settings
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\CrashControl" -Name "AutoReboot" -Value 0 -Type DWord

Set up custom event log monitoring:

# Create scheduled task to log Event ID 1042 occurrences
$action = New-ScheduledTaskAction -Execute "powershell.exe" -Argument "-Command \"Add-Content -Path C:\\logs\\shutdown_events.log -Value \"$(Get-Date): Event ID 1042 detected\"\""
$trigger = New-ScheduledTaskTrigger -AtStartup
Register-ScheduledTask -TaskName "Monitor-Event1042" -Action $action -Trigger $trigger -RunLevel Highest
05

Implement Comprehensive System Monitoring

Deploy advanced monitoring to prevent and quickly identify causes of unexpected shutdowns:

  1. Configure Windows Performance Toolkit (WPT) for detailed system tracing
  2. Set up Performance Monitor counters for power management and thermal monitoring
  3. Implement PowerShell-based monitoring scripts for real-time alerting

Create a comprehensive monitoring script:

# Advanced Event ID 1042 monitoring and analysis script
$logPath = "C:\\logs\\system_monitoring.log"
$emailAlert = "admin@company.com"

# Monitor for Event ID 1042 and related events
$events = Get-WinEvent -FilterHashtable @{
    LogName='System'
    Id=1042,41,6008,1074
    StartTime=(Get-Date).AddDays(-1)
} | Sort-Object TimeCreated

foreach ($event in $events) {
    $logEntry = "$(Get-Date): Event ID $($event.Id) - $($event.LevelDisplayName) - $($event.TimeCreated)"
    Add-Content -Path $logPath -Value $logEntry
    
    if ($event.Id -eq 1042) {
        # Send alert for unexpected shutdown
        Send-MailMessage -To $emailAlert -Subject "Critical: Unexpected Shutdown Detected" -Body "Event ID 1042 logged at $($event.TimeCreated)" -SmtpServer "mail.company.com"
    }
}

Configure system health monitoring:

# Set up performance counters for power and thermal monitoring
$counterPath = "\\Thermal Zone Information(*)\\Temperature"
$powerCounters = "\\Power Management\\*"

# Create data collector set
logman create counter "SystemHealth" -f bincirc -max 500 -c $counterPath $powerCounters -si 60
logman start "SystemHealth"
Pro tip: Combine Event ID 1042 monitoring with hardware monitoring tools like HWiNFO64 or manufacturer-specific utilities for comprehensive system health tracking.

Overview

Event ID 1042 from the Kernel-Power source fires when Windows detects that the system rebooted without performing a clean shutdown sequence. This critical event appears in the System log after an unexpected restart and indicates the previous session ended abruptly. Unlike Event ID 1074 which logs planned shutdowns, Event ID 1042 specifically tracks unplanned reboots where the operating system could not execute its normal shutdown procedures.

This event becomes crucial for system administrators investigating stability issues, power problems, or hardware failures. The event fires during the boot process when Windows realizes the previous session terminated unexpectedly. Modern Windows versions enhanced this event's accuracy in 2025-2026 updates, providing better correlation with hardware telemetry and power management subsystems.

You'll find Event ID 1042 in environments experiencing power outages, hardware malfunctions, blue screen crashes followed by automatic restarts, or manual power button resets. The event helps distinguish between planned maintenance reboots and problematic system behavior requiring investigation.

Frequently Asked Questions

What does Event ID 1042 mean and why is it critical?+
Event ID 1042 indicates that Windows rebooted without performing a clean shutdown sequence. It's classified as critical because it signals potential hardware problems, power issues, or system instability that could lead to data corruption or loss. The event fires when Windows detects that the previous session ended unexpectedly, helping administrators identify and investigate system reliability issues that require immediate attention.
How can I distinguish between planned and unplanned reboots in Event Viewer?+
Planned reboots generate Event ID 1074 from the User32 source, which includes user information and shutdown reason codes. Event ID 1042 specifically indicates unplanned reboots. You can filter Event Viewer to show both events simultaneously: navigate to Windows Logs → System, then filter for Event IDs 1042 and 1074. Planned shutdowns will show user context and reason codes, while Event ID 1042 entries indicate unexpected terminations requiring investigation.
What should I check first when investigating frequent Event ID 1042 occurrences?+
Start by examining the System event log for events immediately preceding each Event ID 1042, particularly Event ID 41 (unexpected shutdown), critical errors, or hardware warnings. Check Device Manager for failing hardware, review system temperatures using built-in diagnostics, and verify power supply stability. Use PowerShell command 'Get-WinEvent -FilterHashtable @{LogName='System'; Id=1042,41,6008} -MaxEvents 50' to correlate related events and identify patterns that point to specific hardware or software issues.
Can Event ID 1042 cause data corruption, and how do I prevent it?+
Yes, Event ID 1042 indicates unexpected shutdowns that can cause data corruption, especially in databases, virtual machines, or applications with open file handles. Prevent data loss by implementing proper UPS systems, enabling automatic file system checking, configuring applications for crash recovery, and setting up regular backups. For critical systems, consider disabling automatic restart after blue screens to capture error information, and implement monitoring scripts that alert administrators immediately when Event ID 1042 occurs.
How do I set up automated monitoring and alerting for Event ID 1042?+
Create a scheduled task that triggers on Event ID 1042 using Task Scheduler or PowerShell. Navigate to Task Scheduler → Create Task → Triggers → Begin the task 'On an event' → Log: System, Source: Kernel-Power, Event ID: 1042. Configure actions to send email alerts, write to custom logs, or execute PowerShell scripts. Alternatively, use PowerShell with Register-WmiEvent to monitor for the event in real-time and trigger immediate notifications. Consider integrating with enterprise monitoring solutions like SCOM or third-party tools for centralized alerting across multiple systems.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...