Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 287664 Security Audit Success 10/28/2010 7:52:52 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287665 Security Audit Success 10/28/2010 7:52:52 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 287666 Security Audit Success 10/28/2010 7:52:52 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287667 Security Audit Success 10/28/2010 7:52:52 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 112028 System Information 10/28/2010 7:52:39 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 204 The Terminal Services service was successfully sent a start control.
- 112029 System Information 10/28/2010 7:52:39 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 196 The Terminal Services service entered the running state.
- 287634 Security Audit Success 10/28/2010 7:52:09 AM Security 6 848 SYSTEM FRANK-P8BU9CV3B 0 492 The following policy was active when the Windows Firewall started. Group Policy applied: No Profile used: Standard Interface: All interfaces Operational mode: On Services: File and Printer Sharing: Disabled Remote Desktop: Disabled UPnP Framework: Disabled Allow remote administration: Disabled Allow unicast responses to multicast/broadcast traffic: Disabled Security Logging: Log dropped packets: Disabled Log successful connections Disabled ICMP: Allow incoming echo request: Disabled Allow incoming timestamp request: Disabled Allow incoming mask request: Disabled Allow incoming router request: Disabled Allow outgoing destination unreachable: Disabled Allow outgoing source quench: Disabled Allow outgoing parameter problem: Disabled Allow outgoing time exceeded: Disabled Allow redirect: Disabled Allow outgoing packet too big: Disabled
- 287635 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 428 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Ares p2p for windows Path: C:\Documents and Settings\Iverson\My Documents\BuildCrissCross.asp_files\Ares\Ares.exe State: Disabled Scope: All subnets
- 287636 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 464 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: BitComet - a BitTorrent Client Path: C:\Documents and Settings\Iverson\My Documents\BuildCrissCross.asp_files\BitComet\BitComet.exe State: Disabled Scope: All subnets
- 287637 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 396 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: RavenShield Path: C:\Documents and Settings\Yemane\My Documents\My Pictures\system\RavenShield.exe State: Disabled Scope: All subnets
- 287638 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 312 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: AOL Instant Messenger Path: C:\Program Files\AIM\aim.exe State: Disabled Scope: All subnets
- 287639 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 316 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Ares p2p for windows Path: C:\Program Files\Ares\Ares.exe State: Disabled Scope: All subnets
- 287640 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 348 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: BitComet - a BitTorrent Client Path: C:\Program Files\BitComet\BitComet.exe State: Enabled Scope: All subnets
- 287641 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 292 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: iTunes Path: C:\Program Files\iTunes\iTunes.exe State: Enabled Scope: All subnets
- 287642 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_05\bin\java.exe State: Enabled Scope: All subnets
- 287643 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_05\bin\javaw.exe State: Enabled Scope: All subnets
- 287644 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 360 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Java(TM) Platform SE binary Path: C:\Program Files\Java\jre1.6.0_07\bin\javaw.exe State: Enabled Scope: All subnets
- 287645 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 304 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: LimeWire Path: C:\Program Files\LimeWire\LimeWire.exe State: Enabled Scope: All subnets
- 287646 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 344 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: MySpace Instant Messenger Path: C:\Program Files\MySpace\IM\MySpaceIM.exe State: Enabled Scope: All subnets
- 287647 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 320 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Opera Internet Browser Path: C:\Program Files\Opera\Opera.exe State: Enabled Scope: All subnets
- 287648 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 364 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: P2P service of Orbit Downloader Path: C:\Program Files\Orbitdownloader\orbitnet.exe State: Enabled Scope: All subnets
- 287649 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 424 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: RavenShield Path: C:\Program Files\Red Storm Entertainment\Raven Shield Multiplayer Demo\system\RavenShield.exe State: Disabled Scope: All subnets
- 287650 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 368 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: KTF MUSIC AoD Server Path: C:\Program Files\Samsung\Samsung New PC Studio\npsasvr.exe State: Enabled Scope: All subnets
- 287651 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 368 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: KTF MUSIC VoD Server Path: C:\Program Files\Samsung\Samsung New PC Studio\npsvsvr.exe State: Enabled Scope: All subnets
- 287652 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 348 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Yahoo! Messenger Path: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe State: Enabled Scope: All subnets
- 287653 Security Audit Success 10/28/2010 7:52:09 AM Security 6 849 SYSTEM FRANK-P8BU9CV3B 0 308 An application was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Name: Remote Assistance Path: C:\WINDOWS\system32\sessmgr.exe State: Enabled Scope: All subnets
- 287654 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 312 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Name Service Port number: 137 Protocol: UDP State: Disabled Scope: Local subnet only
- 287655 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 320 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Datagram Service Port number: 138 Protocol: UDP State: Disabled Scope: Local subnet only
- 287656 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 316 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: NetBIOS Session Service Port number: 139 Protocol: TCP State: Disabled Scope: Local subnet only
- 287657 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: SMB over TCP Port number: 445 Protocol: TCP State: Disabled Scope: Local subnet only
- 287658 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 336 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: SSDP Component of UPnP Framework Port number: 1900 Protocol: UDP State: Disabled Scope: Local subnet only
- 287659 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 320 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: UPnP Framework over TCP Port number: 2869 Protocol: TCP State: Disabled Scope: Local subnet only
- 287660 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 288 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: Remote Desktop Port number: 3389 Protocol: TCP State: Disabled Scope: All subnets
- 287661 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: BitComet 16216 TCP Port number: 16216 Protocol: TCP State: Enabled Scope: All subnets
- 287662 Security Audit Success 10/28/2010 7:52:09 AM Security 6 850 SYSTEM FRANK-P8BU9CV3B 0 296 A port was listed as an exception when the Windows Firewall started. Policy origin: Local Policy Profile used: Standard Interface: All interfaces Name: BitComet 16216 UDP Port number: 16216 Protocol: UDP State: Enabled Scope: All subnets
- 287663 Security Audit Success 10/28/2010 7:52:09 AM Security 6 848 SYSTEM FRANK-P8BU9CV3B 0 352 The following policy was active when the Windows Firewall started. Group Policy applied: - Profile used: - Interface: - Operational mode: Off Services: File and Printer Sharing: - Remote Desktop: - UPnP Framework: - Allow remote administration: - Allow unicast responses to multicast/broadcast traffic: - Security Logging: Log dropped packets: - Log successful connections - ICMP: Allow incoming echo request: Disabled Allow incoming timestamp request: Disabled Allow incoming mask request: Disabled Allow incoming router request: Disabled Allow outgoing destination unreachable: Disabled Allow outgoing source quench: Disabled Allow outgoing parameter problem: Disabled Allow outgoing time exceeded: Disabled Allow redirect: Disabled Allow outgoing packet too big: Disabled
- 287631 Security Audit Success 10/28/2010 7:52:08 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287632 Security Audit Success 10/28/2010 7:52:08 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 287633 Security Audit Success 10/28/2010 7:52:08 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: RASMAN
- 112022 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 232 The Network Location Awareness (NLA) service was successfully sent a start control.
- 112023 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 224 The Network Location Awareness (NLA) service entered the running state.
- 112024 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 236 The Application Layer Gateway Service service was successfully sent a start control.
- 112025 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 228 The Application Layer Gateway Service service entered the running state.
- 112026 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7035 SYSTEM FRANK-P8BU9CV3B 0 232 The Remote Access Connection Manager service was successfully sent a start control.
- 112027 System Information 10/28/2010 7:52:08 AM Service Control Manager 0 7036 FRANK-P8BU9CV3B 0 224 The Remote Access Connection Manager service entered the running state.
- 2032 Application Information 10/28/2010 7:52:06 AM SecurityCenter 0 1800 FRANK-P8BU9CV3B 0 124 The Windows Security Center Service has started.
- 287627 Security Audit Success 10/28/2010 7:51:52 AM Security 6 615 NETWORK SERVICE FRANK-P8BU9CV3B 0 212 IPSec Services: IPSec Services has started successfully.
- 287628 Security Audit Success 10/28/2010 7:51:52 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 172 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Secondary Logon Service
- 287629 Security Audit Success 10/28/2010 7:51:52 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287630 Security Audit Success 10/28/2010 7:51:52 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 112020 System Warning 10/28/2010 7:51:46 AM Dhcp 0 1003 FRANK-P8BU9CV3B 4 148 Your computer was not able to renew its address from the network (from the DHCP Server) for the Network Card with network address 0050BA5D583E. The following error occurred: The operation was canceled by the user. . Your computer will continue to try and obtain an address on its own from the network address (DHCP) server.
- 112021 System Information 10/28/2010 7:51:46 AM Tcpip 0 4201 FRANK-P8BU9CV3B 40 248 The system detected that network adapter Realtek RTL8139 Family PCI Fast Ethernet NIC was connected to the network, and has initiated normal operation over the network adapter.
- 287626 Security Audit Success 10/28/2010 7:51:44 AM Security 6 806 SYSTEM FRANK-P8BU9CV3B 0 156 Per User Audit Policy was refreshed. Number of elements: 0 Policy ID: (0x0,0xEFF8)
- 287623 Security Audit Success 10/28/2010 7:51:42 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 136 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: CHAP
- 287624 Security Audit Success 10/28/2010 7:51:42 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287625 Security Audit Success 10/28/2010 7:51:42 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 360 Special privileges assigned to new logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 287621 Security Audit Success 10/28/2010 7:51:40 AM Security 2 528 LOCAL SERVICE FRANK-P8BU9CV3B 0 324 Successful Logon: User Name: LOCAL SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E5) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287622 Security Audit Success 10/28/2010 7:51:40 AM Security 4 576 LOCAL SERVICE FRANK-P8BU9CV3B 0 312 Special privileges assigned to new logon: User Name: Domain: Logon ID: (0x0,0x3E5) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 287605 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\LSASRV.dll : Negotiate
- 287606 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\kerberos.dll : Kerberos
- 287607 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 200 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\msv1_0.dll : NTLM
- 287608 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 284 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\schannel.dll : Microsoft Unified Security Protocol Provider
- 287609 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 212 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\schannel.dll : Schannel
- 287610 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 208 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\wdigest.dll : WDigest
- 287611 Security Audit Success 10/28/2010 7:51:39 AM Security 1 514 SYSTEM FRANK-P8BU9CV3B 0 268 An authentication package has been loaded by the Local Security Authority. This authentication package will be used to authenticate logon attempts. Authentication Package Name: C:\WINDOWS\system32\msv1_0.dll : MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
- 287612 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: KSecDD
- 287613 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 144 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Winlogon
- 287614 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 156 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: Winlogon\MSGina
- 287615 Security Audit Success 10/28/2010 7:51:39 AM Security 1 518 SYSTEM FRANK-P8BU9CV3B 0 140 An notification package has been loaded by the Security Account Manager. This package will be notified of any account or password changes. Notification Package Name: scecli
- 287616 Security Audit Success 10/28/2010 7:51:39 AM Security 1 515 SYSTEM FRANK-P8BU9CV3B 0 140 A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon requests. Logon Process Name: DCOMSCM
- 287617 Security Audit Success 10/28/2010 7:51:39 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287618 Security Audit Success 10/28/2010 7:51:39 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 312 Special privileges assigned to new logon: User Name: Domain: Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 287619 Security Audit Success 10/28/2010 7:51:39 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287620 Security Audit Success 10/28/2010 7:51:39 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
- 112016 System Information 10/28/2010 7:51:39 AM EventLog 0 6009 FRANK-P8BU9CV3B 0 200 Microsoft (R) Windows (R) 5.01. 2600 Service Pack 2 Uniprocessor Free.
- 112017 System Information 10/28/2010 7:51:39 AM EventLog 0 6005 FRANK-P8BU9CV3B 0 112 The Event log service was started.
- 112018 System Error 10/28/2010 7:51:14 AM ACPI 0 5 FRANK-P8BU9CV3B 40 204 AMLI: ACPI BIOS is attempting to write to an illegal IO port address (0x70), which lies in the 0x70 - 0x71 protected address range. This could lead to system instability. Please contact your system vendor for technical assistance.
- 112019 System Error 10/28/2010 7:51:14 AM ACPI 0 4 FRANK-P8BU9CV3B 40 204 AMLI: ACPI BIOS is attempting to read from an illegal IO port address (0x71), which lies in the 0x70 - 0x71 protected address range. This could lead to system instability. Please contact your system vendor for technical assistance.
- 287603 Security Audit Success 10/28/2010 6:57:22 AM Security 2 528 NETWORK SERVICE FRANK-P8BU9CV3B 0 328 Successful Logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Logon Type: 5 Logon Process: Advapi Authentication Package: Negotiate Workstation Name: Logon GUID: {00000000-0000-0000-0000-000000000000}
- 287604 Security Audit Success 10/28/2010 6:57:22 AM Security 4 576 NETWORK SERVICE FRANK-P8BU9CV3B 0 364 Special privileges assigned to new logon: User Name: NETWORK SERVICE Domain: NT AUTHORITY Logon ID: (0x0,0x3E4) Privileges: SeAuditPrivilege SeAssignPrimaryTokenPrivilege SeChangeNotifyPrivilege
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement