Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 4295 Source: IPSEC

Source
Level
Description
The IPSec Driver is starting in Bypass mode. No IPSec security is being applied while this computer starts up. IPSec policies, if they have been assigned, will be applied to this computer after the IPSec services start.
Comments
 
The IPSec Driver (%SystemDirectory%\drivers\ipsec.sys) is loaded at system startup, regardless of the startup setting for the IPSEC Service (PolicyAgent). The Driver has an OperationMode registry entry (REG_DWORD) under HKLM\SYSTEM\CurrentControlSet\Services\IPSec, which determines how the driver will function until/if the IPSEC Service starts. One of three System events will be logged almost a minute after EventLog's 6009 startup event, depending on the OperationMode setting and startup type for the IPSEC Service. Here's the driver registry settings and resulting System events:

OperationMode 0- Permit(Bypass). Causes Event 4295.
OperationMode 1- Block. Causes Event 4296.
OperationMode 2- (Reserved). Causes Event 4295.
OperationMode 3- Stateful. Causes Event 4297.

Event 4294 will occur once the IPSEC Service starts, about 8 seconds after the event for the Driver if the Service's startup type is Automatic.
Event 4295 (Bypass) will occur if the Service is Disabled, regardless of the OperationMode registry setting.

See ME254949, and the links to “Understanding IPSec Driver Startup Modes” and “Thread - Error contacting the DC server” for additional information.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...