Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 13 Source: Print

Document <number>, <document name> owned by <user name> was deleted on <printer name>.
Indicates that a user deleted a print job from the queue.
To disable the informational messages from the print server open the Printers folder, select "Print Server Properties" from the "File" menu and in the "Advanced" tab select the level of logging that you desire. Restart the computer.
As per Microsoft: "This problem occurs because a change was made to the spooler process in Windows Server 2003 SP1. When an application submits print jobs by calling the ImpersonateLoggedOnUser function, the application may not have access to duplicate handles. Duplicate handles are required by the Print Spooler service". See ME909906 for a hotfix applicable to Microsoft Windows Server 2003.
This issue can occur because certain models of IBM network printers require the LPD queue to have a specific name. If the LPD queue has a different name, the print job may not be successfully completed. See ME282420 to solve this problem.

See MSW2KDB for additional information on this event.
In a recent experience, my windows 2000 sp3 server was receiving this event although none of my users were deleting their print jobs. Some jobs were printing (majority came out incomplete), others were being deleted before the print run. Was also receiving event id 10 but with "pages printed: 0". The issue was due to the usb connection. I connected the printer via serial cable and the problem was solved.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.