Advertisement
Guest User

Untitled

a guest
Jun 23rd, 2017
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.25 KB | None | 0 0
  1. 287664 Security Audit Success 10/28/2010 7:52:52 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  2. 287665 Security Audit Success 10/28/2010 7:52:52 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  3. 287666 Security Audit Success 10/28/2010 7:52:52 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  4. 287667 Security Audit Success 10/28/2010 7:52:52 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  5. 112028 System Information 10/28/2010 7:52:39 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 204 The Terminal Services service was successfully sent a start control.
  6. 112029 System Information 10/28/2010 7:52:39 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 196 The Terminal Services service entered the running state.
  7. 287634 Security Audit Success 10/28/2010 7:52:09 AM Security 6 848 SYSTEM FRANK-P8BU9CV3B 0 492 The following policy was active when the Windows Firewall started. Group Policy applied: No Profile used: Standard Interface: All interfaces Operational mode: On Services: File and Printer Sharing: Disabled Remote Desktop: Disabled UPnP Framework: Disabled Allow remote administration: Disabled Allow unicast responses to multicast/broadcast traffic: Disabled Security Logging: Log dropped packets: Disabled Log successful connections Disabled ICMP: Allow incoming echo request: Disabled Allow incoming timestamp request: Disabled Allow incoming mask request: Disabled Allow incoming router request: Disabled Allow outgoing destination unreachable: Disabled Allow outgoing source quench: Disabled Allow outgoing parameter problem: Disabled Allow outgoing time exceeded: Disabled Allow redirect: Disabled Allow outgoing packet too big: Disabled
  8. 287635 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 428 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Ares p2p for windows Path: C:\Documents and Settings\Iverson\My Documents\BuildCrissCross.asp_files\Ares\Ares.exe State: Disabled Scope: All subnets
  9. 287636 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 464 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: BitComet - a BitTorrent Client Path: C:\Documents and Settings\Iverson\My Documents\BuildCrissCross.asp_files\BitComet\BitComet.exe State: Disabled Scope: All subnets
  10. 287637 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 396 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: RavenShield Path: C:\Documents and Settings\Yemane\My Documents\My Pictures\system\RavenShield.exe State: Disabled Scope: All subnets
  11. 287638 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 312 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: AOL Instant Messenger Path: C:\Program Files\AIM\aim.exe State: Disabled Scope: All subnets
  12. 287639 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 316 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Ares p2p for windows Path: C:\Program Files\Ares\Ares.exe State: Disabled Scope: All subnets
  13. 287640 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 348 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: BitComet - a BitTorrent Client Path: C:\Program Files\BitComet\BitComet.exe State: Enabled Scope: All subnets
  14. 287641 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 292 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: iTunes Path: C:\Program Files\iTunes\iTunes.exe State: Enabled Scope: All subnets
  15. 287642 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_05\bin\java.exe State: Enabled Scope: All subnets
  16. 287643 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_05\bin\javaw.exe State: Enabled Scope: All subnets
  17. 287644 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_07\bin\javaw.exe State: Enabled Scope: All subnets
  18. 287645 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 304 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: LimeWire Path: C:\Program Files\LimeWire\LimeWire.exe State: Enabled Scope: All subnets
  19. 287646 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 344 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: MySpace Instant Messenger Path: C:\Program Files\MySpace\IM\MySpaceIM.exe State: Enabled Scope: All subnets
  20. 287647 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 320 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Opera Internet Browser Path: C:\Program Files\Opera\Opera.exe State: Enabled Scope: All subnets
  21. 287648 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 364 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: P2P service of Orbit Downloader Path: C:\Program Files\Orbitdownloader\orbitnet.exe State: Enabled Scope: All subnets
  22. 287649 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 424 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: RavenShield Path: C:\Program Files\Red Storm Entertainment\Raven Shield Multiplayer Demo\system\RavenShield.exe State: Disabled Scope: All subnets
  23. 287650 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 368 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: KTF MUSIC AoD Server Path: C:\Program Files\Samsung\Samsung New PC Studio\npsasvr.exe State: Enabled Scope: All subnets
  24. 287651 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 368 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: KTF MUSIC VoD Server Path: C:\Program Files\Samsung\Samsung New PC Studio\npsvsvr.exe State: Enabled Scope: All subnets
  25. 287652 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 348 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Yahoo! Messenger Path: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe State: Enabled Scope: All subnets
  26. 287653 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 308 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Remote Assistance Path: C:\WINDOWS\system32\sessmgr.exe State: Enabled Scope: All subnets
  27. 287654 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 312 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Name Service Port number: 137 Protocol: UDP State: Disabled Scope: Local subnet only
  28. 287655 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 320 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Datagram Service Port number: 138 Protocol: UDP State: Disabled Scope: Local subnet only
  29. 287656 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 316 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Session Service Port number: 139 Protocol: TCP State: Disabled Scope: Local subnet only
  30. 287657 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: SMB over TCP Port number: 445 Protocol: TCP State: Disabled Scope: Local subnet only
  31. 287658 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 336 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: SSDP Component of UPnP Framework Port number: 1900 Protocol: UDP State: Disabled Scope: Local subnet only
  32. 287659 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 320 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: UPnP Framework over TCP Port number: 2869 Protocol: TCP State: Disabled Scope: Local subnet only
  33. 287660 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 288 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: Remote Desktop Port number: 3389 Protocol: TCP State: Disabled Scope: All subnets
  34. 287661 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: BitComet 16216 TCP Port number: 16216 Protocol: TCP State: Enabled Scope: All subnets
  35. 287662 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: BitComet 16216 UDP Port number: 16216 Protocol: UDP State: Enabled Scope: All subnets
  36. 287663 Security Audit Success 10/28/2010 7:52:09 AM Security 6 848 SYSTEM FRANK-P8BU9CV3B 0 352 The following policy was active when the Windows Firewall started. Group Policy applied: - Profile used: - Interface: - Operational mode: Off Services: File and Printer Sharing: - Remote Desktop: - UPnP Framework: - Allow remote administration: - Allow unicast responses to multicast/broadcast traffic: - Security Logging: Log dropped packets: - Log successful connections - ICMP: Allow incoming echo request: Disabled Allow incoming timestamp request: Disabled Allow incoming mask request: Disabled Allow incoming router request: Disabled Allow outgoing destination unreachable: Disabled Allow outgoing source quench: Disabled Allow outgoing parameter problem: Disabled Allow outgoing time exceeded: Disabled Allow redirect: Disabled Allow outgoing packet too big: Disabled
  37. 287631 Security Audit Success 10/28/2010 7:52:08 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  38. 287632 Security Audit Success 10/28/2010 7:52:08 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  39. 287633 Security Audit Success 10/28/2010 7:52:08 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: RASMAN
  40. 112022 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 232 The Network Location Awareness (NLA) service was successfully sent a start control.
  41. 112023 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 224 The Network Location Awareness (NLA) service entered the running state.
  42. 112024 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 236 The Application Layer Gateway Service service was successfully sent a start control.
  43. 112025 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 228 The Application Layer Gateway Service service entered the running state.
  44. 112026 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 232 The Remote Access Connection Manager service was successfully sent a start control.
  45. 112027 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 224 The Remote Access Connection Manager service entered the running state.
  46. 2032 Application Information 10/28/2010 7:52:06 AM SecurityCenter 0 1800 FRANK-P8BU9CV3B 0 124 The Windows Security Center Service has started.
  47. 287627 Security Audit Success 10/28/2010 7:51:52 AM Security 6 615 NETWORK SERVICE FRANK-P8BU9CV3B 0 212 IPSec Services: IPSec Services has started successfully.
  48. 287628 Security Audit Success 10/28/2010 7:51:52 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 172 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Secondary Logon Service
  49. 287629 Security Audit Success 10/28/2010 7:51:52 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  50. 287630 Security Audit Success 10/28/2010 7:51:52 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  51. 112020 System Warning 10/28/2010 7:51:46 AM Dhcp 0 1003 FRANK-P8BU9CV3B 4 148 Your computer was not able to renew its address from the network (from the DHCP Server) for the Network Card with network address 0050BA5D583E. The following error occurred: The operation was canceled by the user. . Your computer will continue to try and obtain an address on its own from the network address (DHCP) server.
  52. 112021 System Information 10/28/2010 7:51:46 AM Tcpip 0 4201 FRANK-P8BU9CV3B 40 248 The system detected that network adapter Realtek RTL8139 Family PCI Fast Ethernet NIC was connected to the network, and has initiated normal operation over the network adapter.
  53. 287626 Security Audit Success 10/28/2010 7:51:44 AM Security 6 806 SYSTEM FRANK-P8BU9CV3B 0 156 Per User Audit Policy was refreshed. Number of elements: 0 Policy ID: (0x0,0xEFF8)
  54. 287623 Security Audit Success 10/28/2010 7:51:42 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 136 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: CHAP
  55. 287624 Security Audit Success 10/28/2010 7:51:42 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  56. 287625 Security Audit Success 10/28/2010 7:51:42 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  57. 287621 Security Audit Success 10/28/2010 7:51:40 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  58. 287622 Security Audit Success 10/28/2010 7:51:40 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 312 Special privileges assigned to new logon: User Name: Domain: Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  59. 287605 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\LSASRV.dll : Negotiate
  60. 287606 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\kerberos.dll : Kerberos
  61. 287607 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 200 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\msv1_0.dll : NTLM
  62. 287608 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 284 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\schannel.dll : Microsoft Unified Security Protocol Provider
  63. 287609 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\schannel.dll : Schannel
  64. 287610 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 208 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\wdigest.dll : WDigest
  65. 287611 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 268 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\msv1_0.dll : MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  66. 287612 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: KSecDD
  67. 287613 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 144 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Winlogon
  68. 287614 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 156 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Winlogon\MSGina
  69. 287615 Security Audit Success 10/28/2010 7:51:39 AM Security 1 518 SYSTEM FRANK-P8BU9CV3B 0 140 An notification package has been loaded by the Security Account Manager. This package will be notified of any account or password changes. Notification Package Name: scecli
  70. 287616 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: DCOMSCM
  71. 287617 Security Audit Success 10/28/2010 7:51:39 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  72. 287618 Security Audit Success 10/28/2010 7:51:39 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 312 Special privileges assigned to new logon: User Name: Domain: Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  73. 287619 Security Audit Success 10/28/2010 7:51:39 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  74. 287620 Security Audit Success 10/28/2010 7:51:39 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
  75. 112016 System Information 10/28/2010 7:51:39 AM EventLog 0 6009 FRANK-P8BU9CV3B 0 200 Microsoft (R) Windows (R) 5.01. 2600 Service Pack 2 Uniprocessor Free.
  76. 112017 System Information 10/28/2010 7:51:39 AM EventLog 0 6005 FRANK-P8BU9CV3B 0 112 The Event log service was started.
  77. 112018 System Error 10/28/2010 7:51:14 AM ACPI 0 5 FRANK-P8BU9CV3B 40 204 AMLI: ACPI BIOS is attempting to write to an illegal IO port address (0x70), which lies in the 0x70 - 0x71 protected address range. This could lead to system instability. Please contact your system vendor for technical assistance.
  78. 112019 System Error 10/28/2010 7:51:14 AM ACPI 0 4 FRANK-P8BU9CV3B 40 204 AMLI: ACPI BIOS is attempting to read from an illegal IO port address (0x71), which lies in the 0x70 - 0x71 protected address range. This could lead to system instability. Please contact your system vendor for technical assistance.
  79. 287603 Security Audit Success 10/28/2010 6:57:22 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
  80. 287604 Security Audit Success 10/28/2010 6:57:22 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement