Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 5605 Source: Microsoft-Windows-WMI

Access to the root\MicrosoftIISv2 namespace was denied. The namespace is marked with RequiresEncryption but the client connection was  attempted with an authentication level below Pkt_Privacy. Re try the connection using Pkt_Privacy authentication level.
I have received a number of these errors after implementing Microsoft System Center. The service will attempt to run WMI queries against systems to discover features and roles installed on the server. Another way to check is to run scriptomatic against a remote system to see if these errors pop up.

"The root\ServiceModel namespace is marked with the RequiresEncryption flag. Access to this namespace might be denied if the script or application does not have the appropriate authentication level. Change the authentication level to Pkt_Privacy and run the script or application again."

Following the instructions in ME2590230, I was able to disable encryption on a few of the mof files and successfully connect with WMI without encryption. Webadministration.mof is located in Windows\System32\inetsrv versus Windows\System32\wbem
No other symtoms observed, just the event. T727103 suggests to change the authentication level used by the WMI client to Pkt_Privacy and restart the script or application.
From EV100027, it could be that this erorr is caused by attempting to run on Windows XP a script that uses WMI and the v2 namespace that is only available on Windows Server 2003 (IIS 6.0).

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.