Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 9 Source: vmscsi

The device \Device\Scsi\vmscsi1 did not respond within the timeout period.
According to VMWare: "Windows guest operating systems that are using virtual disks on SAN LUNs might experience unexpected blue screens.
This problem occurs when the responses from the storage array take longer than the guest operating system expects to wait. The default disk timeout period in Windows is too short to handle the longer delays that can occur in a SAN environment and a blue screen error is the result of exceeding this timeout.

Increase the disk timeout to 60 in the Windows virtual machines by editing the Windows registry as described below:

In the registry go to HKEY_LOCAL_MACHINE/System/CurrentControlSet/Services/Disk.

Click Edit/Add value.
Set the value name to TimeOutValue.
Set the data type to REG_DWORD.
Set the data to 0x03c hex (or 60 decimal).
Reboot the virtual machine.

Contact your Storage vendor to confirm whether a specific TimeOutValue setting has been identified for your particular SAN environment.
Increasing this disk timeout setting does not affect the performance of the guest operating system or virtual machine under normal operating conditions but you should verify how the applications you are running in the guest operating system handle disk access delays". See "Windows Virtual Machine Blue Screens When I Use SAN LUNs" for the original article.

In my case, there was no TimeOutValue entry. I added the entry and set the value to 30 as a trial.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.