Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 2002 Source: EAPOL

The description for Event ID ( 2002 ) in Source ( EAPOL ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. The following information is part of the event: <description>.
Description: "EAPOL service was stopped successfully" - This message indicates that the service was stopped, so it cannot establish authenticated network connections. To re-enable its functionality, start the service.

If there are problems with the wireless connectivity, the ME894568 provides information on how to enable additional logging details, including the Eapol.log (in Windows XP).
The event log file is corrupt. - Disabling the "Wireless Configuration" (WINXP: Wireless Zero Configuration) Service fixed the problem for some users.
From a newsgroup post: "What I had done a week before this problem appeared was to use the Dell WLAN program to manage my network connections and not XP. Therefore, I just went to Services, disabled the Zero Wireless Configuration, re-booted and no more events were logged".
I got this message when I recycled the Wireless Connection Service. Here is what Microsoft says:
"The Extensible Authentication Protocol over Local Area Networks (EAPOL) (802.1X) service allows authenticated network connections for both wired and wireless networks. This message indicates that the service was stopped, so it cannot establish authenticated network connections."

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.