Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Type: Success Audit|
<user name> logged on as <user name> on database "<name>".
|English: Request a translation of the event description in plain English.|
As per Microsoft: "This event is seen when diagnostic logging has been turned up (to MAXIMUM) on the MSExchangeIS\Private Service on the LOGON category". See MSEX2K3DB, ME246248, ME260835, and ME274217 for information on this event.
Read McAfee solution nai30262 for more details on this event. Go to the McAfee Knowledge Search page and search for this solution to read it.
|Private comment: Subscribers only. See example of private comment|
|Links: ME246248, ME260835, ME274217, ME274317, McAfee Knowledge Search, MSEX2K3DB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated