Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 103 Source: SYMCScan

Source
Level
Description
[<date><time>] Error "Scanner returned status 40 scanning file: <ilename>".
Comments
 
According to Symantec article TECH90466 (EV100163) those events usually occurs when files are being scanned by another AV and by Scan Engine at the same time .

Cause:
One possible reason for these scan errors is that client machines have drives mapped on the storage device that is being scanned by SSE and at the same time have enabled network scanning options on the local antivirus client .

Solution:
In the Symantec Antivirus Corporate Edition, under the real time auto protect options, disable network scanning. If this is a managed client, uncheck this option through the control center.

For other antivirus clients, please refer to the vendor's manual.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...