Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 618 Source: Security

Encrypted Data Recovery Policy Changed: Changed By: User Name: ARHIMEDE$ Domain Name: ALTDOMAIN Logon ID:(0x0,0x3E7) Changes made:('--' means no changes, otherwise each change is shown as: <ParameterName>: <new value> (<old value>)) PolEfDat: <binary data> (none);
This event record indicates that a change has been made to the Security Account Manager (SAM) database. This database contains information for all user and group accounts. Make sure, only the person with administrative rights for the domain should be able to perform such tasks.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.