Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Comments for event ID 36 currently in the processing queue.

Note: We have not reviewed this information yet so it is unfiltered, exactly how it was submitted by our contributors.

Event ID: 36
Event Source: TerminalServices-PnPDevices
Event Type: Warning
Event Description: Redirection of additional supported devices is disabled by policy.
Comment: This is redirection to Mobile devices (MTP PTP POS) blocked by policy.
"media players based on the Media Transfer Protocol (MTP) and digital cameras based on the Picture Transfer Protocol (PTP) as well as devices that use Microsoft Point of Service (POS) for .NET 1.11."
Microsoft TechNet "Event ID 36 — Supported Plug and Play Device Redirection" Published: January 8 2010 URL:
Event ID: 36
Event Source: volsnap
Event Type: Error
Event Description: The shadow copies of volume C: were aborted because the shadow copy storage could not grow due to a user imposed limit.
Event ID: 36
Event Source: ccSvcHst
Event Type: Information
Event Description: Log Name:      Application
Source:        ccSvcHst
Date:          7/06/2012 12:54:46 PM
Event ID:      36
Task Category: None
Level:         Information
Keywords:      Classic
User:          SYSTEM
Computer:      DELL
The ''ccSetMgr'' service is stopping.
Event Xml:
<Event xmlns="">
    <Provider Name="ccSvcHst" />
    <EventID Qualifiers="16384">36</EventID>
    <TimeCreated SystemTime="2012-06-07T04:54:46.000Z" />
    <Security UserID="S-1-5-18" />

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.