Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Type: Success Audit|
The security log is now <value> percent full.
|English: Request a translation of the event description in plain English.|
To see event 523 in the Security event log the WarningLevel registry value must be added and set to the percentage threshold for the security event log at which the system will generate a warning:
This option is supported starting with Windows 2000 SP3, Windows XP, and Windows Server 2003.
The Windows XP security guide states that if log settings are configured for Overwrite events as needed or Overwrite events older than x days, event 523 will not be generated.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated