?
Solved

event 578

Posted on 2010-08-19
2
Medium Priority
?
422 Views
Last Modified: 2013-12-04
I am getting these alerts throughout the day.  i am assuming its some kind of a system process. doesn't seem right.

How do i find out which object was effected? today i setup a script to check which process is responsible for these alerts but which object is effected is more important.

Log: Security
Type: Success Audit
Event: 578
Source: Security
Category: Privilege Use
Username: fsiadmin
Computer: WAWEL01
Description: Privileged object operation:

        Object Server:  Security

        Object Handle:  1644

        Process ID:     5376

        Primary User Name:      fsiadmin

        Primary Domain: WAWELBR02

        Primary Logon ID:       (0x0,0xC8EBC)

        Client User Name:       -

        Client Domain:  -

        Client Logon ID:        -

        Privileges:     SeTakeOwnershipPrivilege
0
Comment
Question by:Kylo Ren
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 1000 total points
ID: 33479638
Please check this description. Maybe it would be useful
http://www.eventid.net/display.asp?eventid=578&eventno=199&source=Security&phase=1
0
 
LVL 17

Assisted Solution

by:Steve
Steve earned 1000 total points
ID: 33479700
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses
Course of the Month8 days, 17 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question