Solved

Security log is full

Posted on 2006-07-13
3
444 Views
Last Modified: 2013-12-04
Sometime I log in my computer, there is an message that my security log is full and only the administrator can clear it.

What does that mean and how do I clear it as an admistrator?
0
Comment
Question by:gw252
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
Comment Utility
under computer management - event viewer - choose your log and select properties

you shoul dhave it set to overwrite as needed but you can manually clear from there as well
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
Comment Utility
I don't see what version of Windows you are running, but the following link is an idea how to tweak your logging events to capture real security events:
http://support.microsoft.com/kb/q140058/
http://labmice.techtarget.com/troubleshooting/EventLog.htm

Also, you can manually delete the log files by going to:
Start-->Settings-->Control Panel-->Administrative Tools--Event Viewer
Right mouse over "Security Log"
Select "Clear All Events"
Say "No" to saving it

Now the log is not full.
0
 
LVL 38

Expert Comment

by:younghv
Comment Utility
If you security log is filling up, you need to figure out WHY by reviewing the types of activities you are monitoring.

If needed, you can increase the maximum size of the log (recommended) or reduce what you are watching for (probably not a good idea).

I would strongly recommend against "Overwrite as needed". Different kinds of attacks can fill up a log pretty quickly and your evidence of the attack will be 'overwritten'.

We use a fairly large maximum (about 20 MB) and NEVER 'overwrite'. If one of our security logs gets filled up, we want an Administrator to figure out why.

Security Administrators tend to be a little paranoid - with good reason.

Good Luck,
Vic
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Join & Write a Comment

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now