Solved

How do you implement critical Event ID monitoring report

Posted on 2010-11-25
6
1,178 Views
Last Modified: 2012-05-10
Hi Everyone,

How do you monitor these event ID across your domain ?

can anyone give me suggestion or share the Powershell script to email / report this please ?

Thanks.
Application:

1002 Application Hang

1000 Application Error



Hardware Related:

7, 9, 11, 51, 52, 55 Potential HD related issue 

1053 Servers too hot. Sometimes our Air conditioning breaks. 



Security Log:

529 Logon Failure - Unknown user name or bad password

530 Logon Failure - Account logon time restriction violation

531 Logon Failure - Account currently disabled

532 Logon Failure - The specified user account has expired

533 Logon Failure - User not allowed to logon at this computer

534 Logon Failure - The user has not been granted  the requested logon type at this machine

535 Logon Failure - The specified account’s password has expired

539 Logon Failure - Account locked out



On the Domain Controller:

Event 675 on a domain controller indicates a failed initial attempt to logon via Kerberos at a workstation with a domain account usually due to a bad password but the failure code indicates exactly why authentication failed

Event 642 indicates a change to the specified user account such as a reset password or a disabled account being re-enabled. The event’s description specifies the type of change.

Events 632, 636, 660 - All 3 events indicate the specified user was added to the specified group. Group scopes Global, Local and Universal correspond to the 3 event IDs

Event 624 - New user account was created.

Event 644 - Specified user account was locked out after repeated logon failures

Event 517 - The specified user cleared the security log.

Open in new window

0
Comment
Question by:jjoz
  • 3
  • 3
6 Comments
 
LVL 27

Assisted Solution

by:KenMcF
KenMcF earned 500 total points
Comment Utility
How many servers do you want to monitor?

With all the events you want to get alerted on I do not think powershell would be the best choice. You would have to either pull servers from a text file or search AD. Then pull the event log and parse it out on all servers.

I think the better slution would be to get a product that is either able to pull the logs from the servers or has a client install that sends the logs to a central location. One product is splunk and there are several others. Here are a few links to look over.

http://www.nagios.org/products/enterprisesolutions/splunk
http://www.splunk.com/
http://nagios.org/

Microsoft has their own product to.

http://www.microsoft.com/systemcenter/en/us/operations-manager.aspx
0
 
LVL 1

Author Comment

by:jjoz
Comment Utility
ahh so at the moment i use splunk and nagios too, if i want to do this on my Windows Server then I must be installing syslog daemon plugin for windows to push the event ID to syslogd server for splunk to search.
0
 
LVL 27

Expert Comment

by:KenMcF
Comment Utility
it has been awhile since I have used nagios or splunk. But you should be able to setup the nagios agent on the servers and have them send the logs over. Then use splunk to better search for root cause or other events.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 1

Author Comment

by:jjoz
Comment Utility
well yes, i guess you're right
suppose I setup powershell script and then deploy using GPO into computer startup script then it will not run unless the user re-login the PC or the server restarted :-|
0
 
LVL 27

Accepted Solution

by:
KenMcF earned 500 total points
Comment Utility
Yes if you set it up as a startup script it would only run when the server is rebooted. You could set it up on a schuled task to run every hour. But with the amout of events the could get complicated. You could use the get-eventlog cmdlets to pull the event logs from the past x hours. Then parse through them for the events you are looking for. If it find any send an email using the send-mailmessage cmdlet. It would be easier and more proficient to have an agent running send all events to the nagios server or another system like that. Then that system can send you the alerts that you need.
0
 
LVL 1

Author Closing Comment

by:jjoz
Comment Utility
thanks man !
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Active Directory replication delay is the cause to many problems.  Here is a super easy script to force Active Directory replication to all sites with by using an elevated PowerShell command prompt, and a tool to verify your changes.
Create and license users in Office 365 in bulk based on a CSV file. A step-by-step guide with PowerShell script examples.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now