Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 10024 Source: DCOM

The machine wide group policy <policy> Limits security descriptor is invalid. The security descriptor is defined as an invalid Security Descriptor Definitions Language (SDDL) string. The requested action was therefore not performed. Please contact your administrator to get the security descriptor corrected in the Group Policy settings.
From a newsgroup post: "The problem was in the "DCOM: Machine Access Restrictions" and "DCOM: Machine Launch Restrictions". These had been modified and not even the Admins could change them back through gpedit.msc. It caused all sorts of problems. I tried all the solutions from the web to no result. After a lot of research I found the registry settings that alter this. They are:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\windows NT\dcom\machineaccessrestriction
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\windows NT\dcom\machinelaunchrestriction

These 2 keys should not be there by default so on a PC they can be deleted. On the server I was afraid to delete them (it is a production server) so I added (A;;CCDCLC;;;WD) on the first key and (A;;CCDCLCSWRP;;;WD) on the second one. This change included the "Everyone" group on both restrictions. The best thing is to reboot (although on the production server I just left it to synchronise by itself). Everything is working smoothly now and no other problems have emerged (and I can now change policy settings and access DCOM and WMI applications)".

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.