Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1033 Source: MSExchangeActiveSync

Level
Description
The setting ExternalProxy in the Web.Config file was not valid. The previous value was null and has been changed to.
Details
- System
- Provider
[Name] MSExchange ActiveSync
- Event ID 1033
[Qualifiers] 32772
Level 3
Task 2
Keywords 0x800000000000000
- TimeCreated
[SystemTime] 2010-09-08T05:07:10.00000000000Z
EventRecord 7266
Channel Application
Computer
Security

-ExternalData
ExternalProxy
null
Comments
 
According to TB218026, this event indicates that the value specified for the Internet Information Services (IIS) setting referenced in the event description is not valid. See the article on how to to manually change the settings to the default settings.
From a Microsoft support engineer: "If this is not a partner-hosted environment, you can safely ignore this error. It is simply a warning that the ExternalProxy setting is not set in the web.config. We use a default value of null when we find this.

If you are not partner hosted and want to get rid of the warning, add a key under the <appSettings> key in your \Program Files\Microsoft\Exchange Server\V14\ClientAccess\Sync\web.config file:
<add key="ExternalProxy" value=""></add>

The warning should have only been appearing when the application pool was recycled and just spinning up.  You will need to either recylce the MSExchangeSyncAppPool or do an iisreset and then check your application log. You should no longer see the event."

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...