Event Id 5378
Audit Security State Change Event 4608 S: Windows is starting up. Audit Other Privilege Use Events Event 4985 S: The state of a transaction has changed. Audit Other Policy Change Events Event 4714 S: Encrypted data recovery policy was changed. Event 4950 S: A Windows Firewall setting has changed. this contact form
Event 1104 S: The security log is now full. Audit Logon Event 4624 S: An account was successfully logged on. All Rights Reserved MenuExperts Exchange Browse BackBrowse Topics Open Questions Open Projects Solutions Members Articles Videos Courses Contribute Products BackProducts Gigs Live Courses Vendor Services Groups Careers Store Headlines Website Testing Event 4800 S: The workstation was locked.
Event 6403: BranchCache: The hosted cache sent an incorrectly formatted response to the client. EventID 5378 - The requested credentials delegation was disallowed by policy. Event 4615 S: Invalid use of LPC port. Event 4798 S: A user's local group membership was enumerated.
Download Question has a verified solution. However, at the moment this is production and they need to be online asap. Event 4751 S: A member was added to a security-disabled global group. https://technet.microsoft.com/en-us/library/cc726311(v=ws.10).aspx Manage Your Profile | Site Feedback Site Feedback x Tell us about your experience...
A rule was modified. Event 6419 S: A request was made to disable a device. Event 4985 S: The state of a transaction has changed. TheEventId.Net for Splunk Add-onassumes thatSplunkis collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Yes No Do you like the page design? http://mpwiki.viacode.com/default.aspx?g=posts&t=19577 Unique within one Event Source. Audit Removable Storage Audit SAM Event 4661 S, F: A handle to an object was requested. If you are experiencing a similar issue, please ask a related question Suggested Solutions Title # Comments Views Activity Windows Server 2008 R2 -Terminal Server - notifications of resource usage 6
Sample: The requested credentials delegation was disallowed by policy. http://getbetabox.com/event-id/event-id-225-event-source-microsoft-windows-kernel-pnp.html Event 4713 S: Kerberos policy was changed. Audit Application Generated Audit Certification Services Audit Detailed File Share Event 5145 S, F: A network share object was checked to see whether client can be granted desired access. Login Join Community Windows Events Ask Question Answer Questions My Profile ShortcutsDiscussion GroupsFeature RequestsHelp and SupportHow-tosIT Service ProvidersMy QuestionsApp CenterRatings and ReviewsRecent ActivityRecent PostsScript CenterSpiceListsSpiceworks BlogVendor PagesWindows Events Event ID 5378
Event 4625 F: An account failed to log on. Event 5068 S, F: A cryptographic function provider operation was attempted. Audit Network Policy Server Audit Other Logon/Logoff Events Event 4649 S: A replay attack was detected. navigate here Audit Directory Service Access Event 4662 S, F: An operation was performed on an object.
Event ID 5378 — COM+ General Functionality Updated: February 22, 2008Applies To: Windows Server 2008 COM+ applications use Microsoft Component Object Model (COM) technology in Microsoft Windows operating systems to communicate Event 5037 F: The Windows Firewall Driver detected critical runtime error. Event 5149 F: The DoS attack has subsided and normal processing is being resumed.
Event 4779 S: A session was disconnected from a Window Station.
You’ll be auto redirected in 1 second. Event 4724 S, F: An attempt was made to reset an account's password. Login here! his comment is here Event 6408: Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
Event 6400: BranchCache: Received an incorrectly formatted response while discovering availability of content. Event 4767 S: A user account was unlocked. Event 4656 S, F: A handle to an object was requested.