Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 15 Source: i8042prt

Source
Level
Description
<error message>
Comments
 
This typically will occur on a "headless" server whose keyboard has been removed sometime between machine boot and windows boot. It usually logs 3 of these errors and then stops checking for the keyboard.
Often occurs when using manual kvm switch, and when booting up servers and switching those manual switch to other servers in focus. Resolution: reboot server and wait for the server to fully booted up before switching focus.
Error message: "The keyboard reset failed." - This error message occurs if you have a stuck key or are holding a key down and then the keyboard becomes unplugged or unresponsive. Eventually the 8042 port times out and this event is generated. Fortunately, unlike with a mouse port, you can plug the keyboard back in and hit a key and it'll become recognized again.
Error message: "The device, <device>, is not ready for access yet." - As per Microsoft: "Event ID 15 indicates that the device is not ready. This can be the result of SCSI host adapter configuration issues or other problems. Check with the manufacturer for updated firmware, drivers, or known issues. This could also indicate a malfunctioning device. This error occurs at the device level; the cluster software is not likely to be involved. Event ID 15 may also be accompanied by these error messages from the Cluster service:1038, 1036, 1069". See ME259237 for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...