Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 4931 Source: Microsoft-Windows-Security-Auditing

An Active Directory replica destination naming context was modified.

Destination DRA: <guid>
Source DRA: CN=NTDS SettingsCN=<domain controller>CN=ServersCN=<site>CN=SitesCN=ConfigurationDC=domainDC=name
Destination Address: -
Naming Context: DC=domainDC=name
Options: 25
Status Code: 8449
This event is logged if DS Access security audit policy is enabled.
See TD941628 for the type of events that can be recorded if the detailed Audit Directory Service Replication is enabled.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.