Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Security Log

Posted on 2006-11-10
8
Medium Priority
?
165 Views
Last Modified: 2012-05-05
-Cant see my logs

-I did this approx 5 hours ago:

http://www.experts-exchange.com/Security/Q_21950073.html (gave myself access)

-Red x by security Log still an error says:

unable to complete the operationon "security" .  A required privilidge is not held by the client
0
Comment
Question by:healthcheckinc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 7
8 Comments
 
LVL 5

Accepted Solution

by:
DhammikaWee earned 750 total points
ID: 17920701
0
 

Author Comment

by:healthcheckinc
ID: 17929973
thats not the error Im getting but Im going to do the fix anyways...
0
 

Author Comment

by:healthcheckinc
ID: 17933911
Did not work....unable to complete the operationon "security" .  A required privilidge is not held by the client

windows 2000 server
0
How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

 

Author Comment

by:healthcheckinc
ID: 17956326
Still getting the red X on my security logs.  Its only the security logs affected
0
 

Author Comment

by:healthcheckinc
ID: 18070948
Anyone else have any Ides?
0
 

Author Comment

by:healthcheckinc
ID: 18265979
Looks like this might be a reinstall or restore from backup.  Anyone heard of this corruption before?
0
 

Author Comment

by:healthcheckinc
ID: 18304356
Anyone know how to fix a Red X by a security log?
0
 

Author Comment

by:healthcheckinc
ID: 18342622
The previous Net admin had a group policy set where only exchange admins can see the logs.  I set it to domain admins too and its fixed
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Considering cloud tradeoffs and determining the right mix for your organization.
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question