Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 4136 Source: Ci

Source
Level
Description
<service> failed to logon <user name> because of error <error code>.
Comments
 
The local indexing service includes a catalog that references a privileged or remote scope in which credentials have been supplied for access. The credentials entered are incorrect or are no longer valid for the scope. Look for EventID 4135 to identify the wrong configured scope or examine the properties of each directory in each catalog of the indexing service for credentials. Once identified, either delete the directory, remove it from the catalog or supply valid credentials.
As per Microsoft: "This event record usually means you have entered the wrong password for a universal naming convention catalog". See MSW2KDB for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...