Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Configuration option "<argument for sp_configure stored procedure execution>" changed from <old value> to <new value>. Run the RECONFIGURE statement to install.
|English: This information is only available to subscribers. An example of English, please!|
This is an informational message recorded by SQL to indicate that a privileged user executed the SP_CONFIGURE stored procedure (typically used to change the SQL running parameters). The name of the user is recorded as the "User" for the recorded event. For example, executing the following command on SQL:
exec sp_configure 'affinity mask', 0x00000003
causes this event to be recorded as:
Configuration option 'affinity mask ' changed from 0 to 3 . Run the RECONFIGURE statement to install.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated