phone 983-651-5611
Home > Event Id > Event Id 1102 The Audit Log Was Cleared

Event Id 1102 The Audit Log Was Cleared

Contents

Subject: Security ID: %1 Account Name: %2 Domain Name: %3 Logon ID: %4 Log Type: Windows Event Log Uniquely Identified By: Log Name: Security Filtering Field Equals to Value OSVersion Windows Audit Directory Service Access Event 4662 S, F: An operation was performed on an object. Event 6405: BranchCache: %2 instances of event id %1 occurred. Corresponding events on other OS versions: Windows 2000, 2003 EventID 517 - The audit log was cleared Sample: The audit log was cleared. Check This Out

This tool uses JavaScript and much of it will not work correctly without it enabled. Resolution :This is an information event and no user action is required.Reference Links Did this information help you to resolve the problem? It makes it a bit easier when you're trying to find specific ones, e.g. Event 6144 S: Security policy in the group policy objects has been applied successfully. https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=1102

Windows Event Id 517

Like Show 1 Likes(1) Actions Go to original post Actions Remove from profile Feature on your profile More Like This Retrieving data ... © 2007-2016 Jive Software | © 2003-2016 On the test I ran it's coming up as HostIncident.EventInfo . Event 4952 F: Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall.

Event 5061 S, F: Cryptographic operation. Event 5051: A file was virtualized. Event 5034 S: The Windows Firewall Driver was stopped. Event Id 1102 Memory Diagnostic Event 4648 S: A logon was attempted using explicit credentials.

Event 4935 F: Replication failure begins. Windows Event Id 104 Event 4672 S: Special privileges assigned to new logon. Audit Distribution Group Management Event 4749 S: A security-disabled global group was created. https://technet.microsoft.com/en-us/library/dd315545(v=ws.10).aspx Thanks for this info Ƭᴇcʜιᴇ007 –Amine Zaine Dec 7 '15 at 15:00 add a comment| Your Answer draft saved draft discarded Sign up or log in Sign up using Google

Audit User/Device Claims Event 4626 S: User/Device claims information. Windows Event Code 104 Event 4735 S: A security-enabled local group was changed. Find more information about this event on ultimatewindowssecurity.com. Event 4658 S: The handle to an object was closed.

Windows Event Id 104

Audit Authentication Policy Change Event 4706 S: A new trust was created to a domain. Event 4733 S: A member was removed from a security-enabled local group. Windows Event Id 517 Event 4958 F: Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer. Event Id 104 Log Clear A rule was added.

Event 5168 F: SPN check for SMB/SMB2 failed. his comment is here Event 4738 S: A user account was changed. Event 4739 S: Domain Policy was changed. It's not like suddenly the event IDs grew a forth digit. /rantoff ;) Thanks, John Posted By John Dattalo Show: 10 25 50 100 items per page Previous Next Feed for Event Id 1102 Health Service

This event record indicates that the audit log has been cleared. Event 5062 S: A kernel-mode cryptographic self-test was performed. What's the best way to create this rule? this contact form Event 4658 S: The handle to an object was closed.

Event 6281 F: Code Integrity determined that the page hashes of an image file are not valid. The System Log File Was Cleared Event 5377 S: Credential Manager credentials were restored from a backup. Subject: Security ID: WIN-R9H529RIO4Y\Administrator Account Name: Administrator Domain Name: WIN-R9H529RIO4Y Logon ID: 0x169e9 Keep me up-to-date on the Windows Security Log.

Event 4819 S: Central Access Policies on the machine have been changed.

If the issue is a bunch of Windows events are coming up as unknown, you definitely want (1) apply the latest Microsoft Windows DSM and (2) make use of the latest Event 4864 S: A namespace collision was detected. ssei May 17, 2013 6:59 PM (in response to ttl) Someone else might have a better way to do it, but I detect these by a rule for ObjectDelete.EventInfo where the Event Id 1102 Msexchangeimap4 Event 4907 S: Auditing settings on object were changed.

Event 6400: BranchCache: Received an incorrectly formatted response while discovering availability of content. Audit Filtering Platform Policy Change Audit MPSSVC Rule-Level Policy Change Event 4944 S: The following policy was active when the Windows Firewall started. Application, Security, System, etc.) LogName Security Task Category A name for a subclass of events within the same Event Source. navigate here Is this rule not working for you or are you looking for a more clearly defined build in rule set based on Windows systems?

Keywords Category A name for an aggergative event class, corresponding to the similar ones present in Windows 2003 version. A rule was deleted. Event 4779 S: A session was disconnected from a Window Station. Event 4931 S, F: An Active Directory replica destination naming context was modified.

Event 4722 S: A user account was enabled. There is no need to manually clear the Security event log in most cases. Event 4866 S: A trusted forest information entry was removed. Event 6423 S: The installation of this device is forbidden by system policy.

It feels like the logs have been overwritten since the maximum log size is 10 MB –Amine Zaine Dec 7 '15 at 15:01 Then they may have destroyed them Level Keywords Audit Success, Audit Failure, Classic, Connection etc. Hot Scripts offers tens of thousands of scripts you can use. Event 4660 S: An object was deleted.

Lack of a backed-up audit log will help trace an unauthorized user.