Solved

event id 861 error

Posted on 2008-10-29
5
1,943 Views
Last Modified: 2013-12-01
under the event viewer (security) I'm getting failue aduit event ID # 861
How do I fix this and what does this mean. any help would be great


The Windows Firewall has detected an application listening for incoming traffic.
Name: -
Path: C:\WINDOWS\system32\inetsrv\w3wp.exe
Process identifier: 4496
User account: NETWORK SERVICE
User domain: NT AUTHORITY
Service: Yes
RPC server: No
IP version: IPv4
IP protocol: UDP
Port number: 4205
Allowed: No
User notified: No

 
0
Comment
Question by:secor2004
  • 3
5 Comments
 
LVL 9

Expert Comment

by:khaledf
ID: 22857831
do you have IIS installed?
0
 
LVL 12

Expert Comment

by:jazzIIIlove
ID: 22857852
please answer the khaledf...he is on the right track and check the below link for the following:
http://support.microsoft.com/kb/842493
0
 
LVL 12

Expert Comment

by:jazzIIIlove
ID: 22857857
edit: the khaledf->khaledf
0
 

Author Comment

by:secor2004
ID: 22873034
khaledf, Sorry about the delay on the response, This is my web server running server 2003 standard, I'm running IIS verison 5.2 and off loading the SQL traffic on to a different server.
0
 
LVL 12

Accepted Solution

by:
jazzIIIlove earned 500 total points
ID: 23072579

http://support.microsoft.com/kb/842493

I think the content of the ink will solve the issue:

To resolve this problem, manually set permissions on the folders for the IIS_WPG group, and then set permissions on the folders for the NT Authority\Network Service account.

To set permissions on the folders for the IIS_WPG group, follow these steps:
Start Windows Explorer, and then open the following folder:
%systemroot%\Help\iisHelp
In the right pane, right-click the Common folder, and then click Sharing and Security.
Click the Security tab, click Add, type IIS_WPG, and then click OK.
With IIS_WPG selected, click to select the following check boxes under the Allow column, and then click OK:
Read and Execute
List Folder Contents
Read
Open the following folder:
%systemroot%\system32\inetsrv
In the right pane, right-click the ASP Compiled Templates folder, and then click Sharing and Security.
Click the Security tab, click the IIS_WPG group, and then click to select the Full Control check box under the Allow column. Click OK.
Open the following folder:
%systemroot%
In the right pane, right-click the IIS Temporary Compressed folder, and then click Sharing and Security.
Click the Security tab, click the IIS_WPG group, and then click to select the Full Control check box under the Allow column. Click OK.
To set permissions on the folders for the NT Authority\Network Service account, follow these steps:
Start Windows Explorer, and then open the following folder:
%systemroot%\Help\iisHelp
In the right pane, right-click the Common folder, and then click Sharing and Security.
Click the Security tab, click Add, type NETWORK SERVICE, and then click OK.
With NETWORK SERVICE selected, click to select the following check boxes under the Allow column, and then click OK:
Read and Execute
List Folder Contents
Read
Open the following folder:
%systemroot%\system32\inetsrv
In the right pane, right-click the ASP Compiled Templates folder, and then click Sharing and Security.
Click the Security tab, click Add, type NETWORK SERVICE, and then click OK.
With the NETWORK SERVICE group selected, click to select the Full Control check box under the Allow column, and then click OK.
Open the following folder:
%systemroot%
In the right pane, right-click the IIS Temporary Compressed folder, and then click Sharing and Security.
Click the Security tab, click Add, type NETWORK SERVICE, and then click OK.
With the NETWORK SERVICE group selected, click to select the Full Control check box under the Allow column, and then click OK.
After you have completed these steps, restart the IIS Admin service from the Services snap-in or from the Computer Management snap-in.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
The viewer will learn common shortcuts with easy ways to remember them. The viewer will then learn where to find all of the keyboard shortcuts, how to create/change them, and how to speed up their workflow.
This video shows how use content aware, what it’s used for, and when to use it over other tools.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now