Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

EventID.Net Documents

1
How to troubleshoot problems with the startup of Windows Event Log service
2
Instructions on how to remove the BetterSurf (aka WebCake, Media View, Media Playear adware).
3
Kerberos error codes as per RFC 4120.
4
Kerberos Ticket Options
5
This short article describes how to convert a negative error code to its hex equivalent
6
A paper outlining best practices for responding to security incidents. Recommended reading for anyone who will be handling security incidents.
7
Recommendations in implementing a security event log monitoring.
8
If you work with computers, in many occasions you have heard about binary, decimal and hex numbers. This article provides a description of these numbering systems in layman terms as well as how to convert them using the "Calculator" application that ships with Windows.
9
Most probably you have used Auditing policies set via the group policies. Do you know what do they mean and how to configure them?
10
TCP/IP protocol is now de facto standard for almost any organization. Network administrators need to manage the allocation of various IP subnets used within their organization. This document provides a summary of our methodology in dealing with this issue as well as an Excel spreadsheet template that we recommend to our customers.
11
A description of the ticket options field that appear in certain Windows security event logs
12
A list of logon processes that appear in Windows security event logs
13
A description of various Windows authentication packages that are listed in security event logs
14
Many Windows security events contain a field indicating the "logon type". This article explains what those numbers mean.
15
A template that can be used by network support people in their troubleshooting process and interaction with their customers
16
Ethernet terms like Half-duplex or questions like "Is 100 Mbs ten times faster than 10 Mbs?" are given oversimplified descriptions or answers as their intention is to give somebody an "idea" on what these terms mean by using comparisons with "non-technical" situations.
17
Information about event sources and how to obtain more information about them.
18
A short description of the most common types of errors encountered in the IT world.
19
As a firewall or VPN administrator, one may use the term "DES" or "3DES" daily. Cryptographers surely know what's behind it and Senior Security Consultants understand the principle. But have you ever wondered just how are the bits (1s and 0s) manipulated during the DES encryption? Just how are they moved around? Well, this article is just an attempt to provide a simple example of such encryption process.
20
A review of responsibilities taken by firewall administrators
21
This article describes the process of unlinking vs. deleting a Windows 2000 Group Policy.
22
Information about obtaining fixes listed on various Microsoft Q articles.
23
7 Principles On Troubleshooting Like A Pro
24
Obtain additional information about Windows NT/2000 network error codes
25
A discussion about the Security 677 Failure Audit Events.
26
Description of NT/2000 event logs and event types
27
Why do you see "The description for Event ID (....) in Source (...) could not be found." as event description and how to fix that.
28
How are the event log entries structured
29
Learn to use the proper keywords when searching the Internet

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...