Solved

event 578

Posted on 2010-08-19
2
396 Views
Last Modified: 2013-12-04
I am getting these alerts throughout the day.  i am assuming its some kind of a system process. doesn't seem right.

How do i find out which object was effected? today i setup a script to check which process is responsible for these alerts but which object is effected is more important.

Log: Security
Type: Success Audit
Event: 578
Source: Security
Category: Privilege Use
Username: fsiadmin
Computer: WAWEL01
Description: Privileged object operation:

        Object Server:  Security

        Object Handle:  1644

        Process ID:     5376

        Primary User Name:      fsiadmin

        Primary Domain: WAWELBR02

        Primary Logon ID:       (0x0,0xC8EBC)

        Client User Name:       -

        Client Domain:  -

        Client Logon ID:        -

        Privileges:     SeTakeOwnershipPrivilege
0
Comment
Question by:Kylo Ren
2 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 250 total points
ID: 33479638
Please check this description. Maybe it would be useful
http://www.eventid.net/display.asp?eventid=578&eventno=199&source=Security&phase=1
0
 
LVL 17

Assisted Solution

by:sgsm81
sgsm81 earned 250 total points
ID: 33479700
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question