Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1039 Source: MSExchangeISPrivate

The rule (11-8B8A27) with sequence number 50 was ignored because the user is not Out Of Office (OOF).

The distinguished name of the owning mailbox is <user name>.
According to MSEX2K3DB, this type of events can be ignored.
This event will be seen if diagnostics logging for the RULES category of the "MSExchangeIS\Private" Service is set to MAXIMUM. In this case this event can be safely ignored.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.