Solved

Error: the security log on this system is full.

Posted on 2006-07-15
3
878 Views
Last Modified: 2008-01-16
Windows XP SP2
DHCP network

Error: the security log on this system is full.

The security setting the default: maximum log size 512 kb, overwrite events older than 7 days.

I don't want to enter the adm. password everytime an user try to login and clear the security log. What can i do to solve this problem for good?
0
Comment
Question by:diegomolineaux
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
danishtahir earned 125 total points
ID: 17114535
You have few options.

You can increase the size of security log.

http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch06n.mspx

You can overwrite events earlier, but reducing the number of days to retrain from 7 to a lower number.

Or you can investigate why is it getting filled up, are you logging too many events that you do not need? Review the log to find out.
0
 
LVL 14

Expert Comment

by:ECNSSMT
ID: 17114602
You can increase the size of the logs to 100MB/102400kb (or a max of 400mb/419424KB).  But you should see what is beeing logged; if the items are serious enough, they should be addressed.  If its just a lot of 'junk' and the potential for attempts to compromise the XP is minimal, you can probably keep it about this config 100mb with overwrites for events older than 7 days.  On a normal machine that should be more than ample space to contain 7 days worth of logs.

Regards,
0
 
LVL 14

Expert Comment

by:ECNSSMT
ID: 17114618
darn! SSDD (same solution different dialogbox)
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now