Solved

Security Log

Posted on 2006-11-10
8
155 Views
Last Modified: 2012-05-05
-Cant see my logs

-I did this approx 5 hours ago:

http://www.experts-exchange.com/Security/Q_21950073.html (gave myself access)

-Red x by security Log still an error says:

unable to complete the operationon "security" .  A required privilidge is not held by the client
0
Comment
Question by:healthcheckinc
  • 7
8 Comments
 
LVL 5

Accepted Solution

by:
DhammikaWee earned 250 total points
ID: 17920701
0
 

Author Comment

by:healthcheckinc
ID: 17929973
thats not the error Im getting but Im going to do the fix anyways...
0
 

Author Comment

by:healthcheckinc
ID: 17933911
Did not work....unable to complete the operationon "security" .  A required privilidge is not held by the client

windows 2000 server
0
 

Author Comment

by:healthcheckinc
ID: 17956326
Still getting the red X on my security logs.  Its only the security logs affected
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 

Author Comment

by:healthcheckinc
ID: 18070948
Anyone else have any Ides?
0
 

Author Comment

by:healthcheckinc
ID: 18265979
Looks like this might be a reinstall or restore from backup.  Anyone heard of this corruption before?
0
 

Author Comment

by:healthcheckinc
ID: 18304356
Anyone know how to fix a Red X by a security log?
0
 

Author Comment

by:healthcheckinc
ID: 18342622
The previous Net admin had a group policy set where only exchange admins can see the logs.  I set it to domain admins too and its fixed
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now