Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How do you implement critical Event ID monitoring report

Posted on 2010-11-25
6
Medium Priority
?
1,205 Views
Last Modified: 2012-05-10
Hi Everyone,

How do you monitor these event ID across your domain ?

can anyone give me suggestion or share the Powershell script to email / report this please ?

Thanks.
Application:
1002 Application Hang
1000 Application Error

Hardware Related:
7, 9, 11, 51, 52, 55 Potential HD related issue 
1053 Servers too hot. Sometimes our Air conditioning breaks. 

Security Log:
529 Logon Failure - Unknown user name or bad password
530 Logon Failure - Account logon time restriction violation
531 Logon Failure - Account currently disabled
532 Logon Failure - The specified user account has expired
533 Logon Failure - User not allowed to logon at this computer
534 Logon Failure - The user has not been granted  the requested logon type at this machine
535 Logon Failure - The specified account’s password has expired
539 Logon Failure - Account locked out

On the Domain Controller:
Event 675 on a domain controller indicates a failed initial attempt to logon via Kerberos at a workstation with a domain account usually due to a bad password but the failure code indicates exactly why authentication failed
Event 642 indicates a change to the specified user account such as a reset password or a disabled account being re-enabled. The event’s description specifies the type of change.
Events 632, 636, 660 - All 3 events indicate the specified user was added to the specified group. Group scopes Global, Local and Universal correspond to the 3 event IDs
Event 624 - New user account was created.
Event 644 - Specified user account was locked out after repeated logon failures
Event 517 - The specified user cleared the security log.

Open in new window

0
Comment
Question by:jjoz
  • 3
  • 3
6 Comments
 
LVL 27

Assisted Solution

by:KenMcF
KenMcF earned 2000 total points
ID: 34214963
How many servers do you want to monitor?

With all the events you want to get alerted on I do not think powershell would be the best choice. You would have to either pull servers from a text file or search AD. Then pull the event log and parse it out on all servers.

I think the better slution would be to get a product that is either able to pull the logs from the servers or has a client install that sends the logs to a central location. One product is splunk and there are several others. Here are a few links to look over.

http://www.nagios.org/products/enterprisesolutions/splunk
http://www.splunk.com/
http://nagios.org/

Microsoft has their own product to.

http://www.microsoft.com/systemcenter/en/us/operations-manager.aspx
0
 
LVL 1

Author Comment

by:jjoz
ID: 34215006
ahh so at the moment i use splunk and nagios too, if i want to do this on my Windows Server then I must be installing syslog daemon plugin for windows to push the event ID to syslogd server for splunk to search.
0
 
LVL 27

Expert Comment

by:KenMcF
ID: 34215022
it has been awhile since I have used nagios or splunk. But you should be able to setup the nagios agent on the servers and have them send the logs over. Then use splunk to better search for root cause or other events.
0
Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

 
LVL 1

Author Comment

by:jjoz
ID: 34215076
well yes, i guess you're right
suppose I setup powershell script and then deploy using GPO into computer startup script then it will not run unless the user re-login the PC or the server restarted :-|
0
 
LVL 27

Accepted Solution

by:
KenMcF earned 2000 total points
ID: 34215099
Yes if you set it up as a startup script it would only run when the server is rebooted. You could set it up on a schuled task to run every hour. But with the amout of events the could get complicated. You could use the get-eventlog cmdlets to pull the event logs from the past x hours. Then parse through them for the events you are looking for. If it find any send an email using the send-mailmessage cmdlet. It would be easier and more proficient to have an agent running send all events to the nagios server or another system like that. Then that system can send you the alerts that you need.
0
 
LVL 1

Author Closing Comment

by:jjoz
ID: 34215134
thanks man !
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question