Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 10400 Source: ACUConfig

Exit with code 32
Details: Intel(R) AMT Operation completed with warnings: System Discovery failed to get data from some of the interfaces on this system. Failed to get data from the MEI interface. This system does not have Intel(R) AMT (or it is disabled in the MEBx, or the correct drivers are not installed or enabled, or the current user does not have permissions to the drivers). The Intel(R) Management Engine Interface driver is not installed or cannot be accessed. Failed to get data from the OS Registry interface. Failed to read the registry value (LMS version). Failed to open the registry Key (SYSTEM\CurrentControlSet\Services\LMS). The system cannot find the file specified.
The registry key not found.(SYSTEM\CurrentControlSet\Services\LMS) Failed to get data from the AMT WSMAN Discovery interface. Initial connection to the Intel(R) AMT device failed. A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.
Exit with code 32 - According to EV100523 (Dell KB134810), this error appears on Windows systems with Intel processors if the Intel Management Engine Interface (MEI) driver is not installed. The MEI driver must be installed for the ACUConfig utility to perform discovery.

Exit with code 110 - This error appears if you do not have a vPro server configured in your environment and its associated certificate installed on your vPro hardware. See EV100523 (Dell KB134810).

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.