Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 6036 Source: LsaSrv

The program <application name>, with the assigned Process ID <process id>, supplied a NULL or empty target name for the pszTargetName parameter when calling the InitializeSecurityContext API to initiate an outbound NTLM security context. This is a security risk when mutual authentication is required.
This event is logged in the System log when you connect to an instance of SQL Server 2005 or to an instance of SQL Server 2000 from a Windows Vista-based computer and indicates that you used NTLM authentication. You can safely ignore this event. This event is not logged if you use Kerberos authentication. See ME928780 for additional information about this event.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.