Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 11000 Source: MicrosoftWebProxy

Microsoft Web Proxy failed to start. The failure occurred during Service initialization because the configuration property of the key SOFTWARE\Microsoft\Fpc\Arrays\{AC306676-5B1C-485F-8EFA-EBB73470C88A}\Servers\{A8C1636B-67AA-4AAD-8AE8-1771C4662F69}\Secure-Items could not be accessed. Use the source location <location> to report the failure. The error code in the Data area of the event properties indicates the cause of the failure. For more information about this event, see ISA Server Help. The error description is: The system cannot find the file specified.
This behavior might occur if an ISA Server Policy Element that is referenced in an ISA Server Rule is deleted. See ME839494 to solve this problem.
You might see this event if you rename the ISA Server computer after installing ISA 2000. Article ME819970 provides a resolution for this.
As per ME313369 to resolve this problem, obtain and install the latest Internet Security and Acceleration (ISA) Server 2000 service pack.

See ME836828 for additional information on this event.
This and similarly worded (different registry paths after the first GUID) appears if you have ISA 2000 running on Windows 2000 (in my case part of Small Business Server 2000) and have used software such as SurfControl to restrict access to certain web sites. This software creates Site and Content Rules that do not set up all the required registry paths (e.g. VendorParametersSets). See ME303019 for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.