Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Process **\MCSHIELD.EXE pid (2676) contained unsigned or corrupted code and was blocked from performing a privileged operation with a McAfee driver.
|English: Request a translation of the event description in plain English.|
One user reported this event while having problems using USB devices. Uninstalling McAfee Total Protection 2010 fixed the problem.
EV100236 (McAfee KB71083) provides information on how to deal with this type of event (either authorize the unsigned code or identify it and preventing it from being loaded).
See also the information for event id 516 from mfehidk.
|Private comment: Subscribers only. See example of private comment|
|Links: Event id 516 from mfehidk|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated