Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 11926 Source: MsiInstaller

Source
Level
Description
Product: <product name> -- Error 1926. Could not set file security for file M:\Config.Msi\. Error: <error code>. Verify that you have sufficient privileges to modify the security permissions for this file.
Comments
 
Error code 5 = "Access denied". See the link for Error code 5
I had a similar problem installing gpresult.exe on a workstation. According to a newsgroup post,   you have to give the system account full access to your hard drive. Here is how to do it:
1. Start Windows Explorer, right-click the computer''s root hard drive, and then click Properties.
2. Click the Security tab, and then click Add.
3. In the "Select Users, Computers, or Groups" dialog box, click the SYSTEM account, click Add, and then click OK.
4. Under Allow, click to select the Full Control check box, and then click OK.
5. Click the TEMP folder and then verify that the SYSTEM account has full control.

Verify the Registry Permissions
1. Click Start, click Run, then type "Regedt32" (without the quotation marks).
2. For each of the registry hives, follow these steps:
   a. Select the hive.
   b. For Windows XP, on the Edit menu, click Permissions.
      For Windows 2000 and Windows NT 4, on the Security menu, click Permissions.
3. Verify that the SYSTEM account has been added and that it has Full control.  If it does not, add the SYSTEM account with Full control.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...