Solved

Is there any way to prevent the logging of startup failures of a certain service to system event log?

Posted on 2006-11-29
3
139 Views
Last Modified: 2010-04-13
I don't see any, but maybe anyone knows. Filtering is no solution.
0
Comment
Question by:McKnife
  • 2
3 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 250 total points
ID: 18045246
It's based upon the design of the application...if it faults, it's designed to report that fault to the event log.
So the direct answer is "no", but why not correct the problem?  Could it be that the order in the startup needs to be changed?
0
 
LVL 54

Author Comment

by:McKnife
ID: 18045444
"It's based upon the design of the application" - This is something I didn't know, so theoretically there could be services that fail and would never report to the event log?
more details: we use an ident daemon to authenticate users that have access to the proxy server. That old service identd does its job, but occasionally reports failures, although it is always running and internet access works. Since we do event log monitoring, I get an e-mail for every failure. I am tempted to install a different ident daemon, that should solve it.
Thanks for the info
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 18045622
"so theoretically there could be services that fail and would never report to the event log?"

"Theoretically", it's possible - but not probable...  You've got a sucky coder if that's the case... ;)

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question