Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 10014 Source: DCOM

Source
Level
Description
The activation for CLSID {<GUID>} failed because remote activations for COM+ are disabled. To enable this functionality use the Configure Your Server wizard and select the Web Application Server role.
Comments
 
From a newsgroup post: “In Windows 2003 we need to manually enable the network COM+ access by going through Add/remove windows components in control panel.

Steps to enable network COM+ access:
1. Click "Start" point to "Control Panel" and then click "Add or Remove Programs".
2. Click "Add/Remove Windows Components".
3. Select "Application Server" and then click "Details".
4. Click "Enable network COM+ access" and then click "OK".
5. Click "Next" and then click "Finish".

Note that COM+ applications that use databases and that you install on separate computers may not work over the network unless you enable “Network DTC Access".

Steps to enable Network DTC access:

1. Click "Start" point to "Control Panel" and then click "Add or Remove Programs".
2. Click "Add/Remove Windows Components".
3. Select "Application Server" and then click "Details".
4. Select "Enable network DTC access" and then click "OK".
5. Click "Next".
6. Click "Finish".
7. Stop and then restart the Distributed Transaction Coordinator service.
8. Stop and then restart any resource manager services that participate in the distributed transaction (such as Microsoft SQL Server or Microsoft Message Queue Server).

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...