Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Comments for event ID 142 currently in the processing queue.

Note: We have not reviewed this information yet so it is unfiltered, exactly how it was submitted by our contributors.

event id: 142 event source: windows remote management event type: error event description: psterminatingerror(import-pssession): "running the get-command command in a remote session reported the following error: processing data for a remote command failed with the following error message: winrm cannot complete the operation. verify that the specified computer name is valid that the computer is accessible over the network and that a firewall exception for the winrm service is enabled and allows access from this computer.
wsman operation signalshell failed error code 2150858793 comment:
event id: 142 event source: kernel-power event type: error event description: the system has rebooted without cleanly shutting down first. this error is caused because the system stopped responding and the hardware watchdog triggered a system reset. comment:

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.