cancel
Showing results for 
Search instead for 
Did you mean: 

SAP Application servers not starting.

adarsh_jainer
Participant
0 Kudos

Hi mates,

We restarted our application servers last week without restarting the main central production server. After that we tried to start the application servers they are not starting and load balancing is not happening in our PRD system and we are facing performance.

  However when i tried to start the services i am getting error:1067 which i have attached below. We had faced the same problem last time and that time the logon user of the service had changed to local admin anh hence we corrected the user and changed it to SAPservice user.However this time the user has not changed but the problem exists and the management console is also not starting. I am in serious need of some solution.Anyone who knows abou this error please do help..

Regards,

Adarsh

Accepted Solutions (0)

Answers (2)

Answers (2)

Sriram2009
Active Contributor
0 Kudos

Hi Adarsh

On your application go to folder under \usr\SAP\SID\Dxx\exe, You can find the two files

SAPStartSrv.exe & SAPStartSrv.exe.new

rename the file  from sapstartsrv.exe to sapstartsrv.exe.old

rename the file  from sapstartsrv.exe.new to sapstartsrv.exe

rename the file  from sapstartsrv.exe.old to sapstartsrv.exe.new

and then check the windows services

Regards

SS



adarsh_jainer
Participant
0 Kudos

Hi Sriram,

I checked the services files like you told.However sapstartsrv.exe.new is saved as tmp file.

Should i change it only.Please help.

adarsh_jainer
Participant
0 Kudos

Hi Sriram,

I checked the services files like you told.However sapstartsrv.exe.new is saved as tmp file.

Should i change it only.Please help.

Regards,

Adarsh

Sriram2009
Active Contributor
0 Kudos

Hi

Just open the command prompt and then do the steps as mention before.

Kindly refer the snapshot

BR

SS

Former Member
0 Kudos

Please try SAP Note 2004710 as suggested by Divyanshu earlier.

divyanshu_srivastava3
Active Contributor
0 Kudos

HI Adarsh,

Can you please share the logs from windows event viewer on why the startup of this service failed ?

Also, refer below KBA and see if that helps.

2155767 - SAP Service SAP<SID>_NN fails to start: Error 13 EACCES*: Permission denied OR: The data is invalid

Regards,

adarsh_jainer
Participant
0 Kudos

Hi Sir,

I am attaching the event log files.Please do go through this..

--------------------------------------------------------------------------------------------------------------------------------------------

LevelDate and TimeSourceEvent IDTask Category
Information22-06-2015 16:51:44Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Information22-06-2015 16:51:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:51:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACE245

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Error22-06-2015 16:51:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:51:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:51:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:51:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:51:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACE245

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:51:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACE245
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:51:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:51:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:51:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:51:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:50:43Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Information22-06-2015 16:50:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:50:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACA790

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Error22-06-2015 16:50:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:50:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:50:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:50:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:50:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACA790

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:50:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ACA790
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:50:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:50:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:50:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:50:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:49:42Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Information22-06-2015 16:49:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:49:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC3DC9

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Error22-06-2015 16:49:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:49:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:49:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:49:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:49:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC3DC9

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:49:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC3DC9
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:49:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:49:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:49:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:49:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:48:41Microsoft-Windows-WMI-Activity5857NoneCIMWin32 provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\cimwin32.dll
Information22-06-2015 16:48:41Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Information22-06-2015 16:48:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:48:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC18DD

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Error22-06-2015 16:48:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:48:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:48:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:48:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:48:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC18DD

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:48:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AC18DD
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:48:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:48:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:48:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:48:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:47:42Service Control Manager7036NoneThe WMI Performance Adapter service entered the running state.
Information22-06-2015 16:47:42Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7

Privileges:SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:47:42Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:47:42Service Control Manager7036NoneThe WMI Performance Adapter service entered the stopped state.
Information22-06-2015 16:47:42Service Control Manager7036NoneThe WMI Performance Adapter service entered the running state.
Information22-06-2015 16:47:42Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7

Privileges:SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:47:42Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:47:42Service Control Manager7036NoneThe WMI Performance Adapter service entered the stopped state.
Information22-06-2015 16:47:42vmStatsProvider256General"The ""vmStatsProvider"" is successfully initialized for this Virtual Machine. WMI namespace: ""root\cimv2""."
Information22-06-2015 16:47:42vmStatsProvider258Guest Library API"The ""vmGuestLibrary"" is successfully initialized for this Virtual Machine."
Information22-06-2015 16:47:42vmStatsProvider256General"The ""vmStatsProvider"" is successfully initialized for this Virtual Machine. WMI namespace: ""root\cimv2""."
Information22-06-2015 16:47:42vmStatsProvider258Guest Library API"The ""vmGuestLibrary"" is successfully initialized for this Virtual Machine."
Information22-06-2015 16:47:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:47:40Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Information22-06-2015 16:47:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABC86E

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Error22-06-2015 16:47:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:47:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:47:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:47:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:47:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABC86E

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:47:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABC86E
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:47:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:47:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:47:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:47:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:46:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABAD11

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:46:40Microsoft-Windows-WMI-Activity5857NoneCIMWin32 provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\cimwin32.dll
Information22-06-2015 16:46:40Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:46:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:46:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:46:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:46:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:46:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABAD11

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:46:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8ABAD11
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:46:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:46:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:46:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:46:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:45:42Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:45:41Microsoft-Windows-WMI-Activity5857NoneWMIProv provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 2508; ProviderPath = %systemroot%\system32\wbem\wmiprov.dll
Information22-06-2015 16:45:41Service Control Manager7036NoneThe WMI Performance Adapter service entered the running state.
Information22-06-2015 16:45:41Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7

Privileges:SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:45:41Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:SYSTEM
Account Name:SYSTEM
Account Domain:NT AUTHORITY
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:45:41vmStatsProvider256General"The ""vmStatsProvider"" is successfully initialized for this Virtual Machine. WMI namespace: ""root\cimv2""."
Information22-06-2015 16:45:41vmStatsProvider258Guest Library API"The ""vmGuestLibrary"" is successfully initialized for this Virtual Machine."
Information22-06-2015 16:45:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AB62C4

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:45:39Microsoft-Windows-WMI-Activity5857NoneCIMWin32 provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\cimwin32.dll
Information22-06-2015 16:45:39Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:45:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:45:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:45:28Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:45:28Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:45:28Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AB62C4

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:45:28Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8AB62C4
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:45:28Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:45:28Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:45:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:45:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:44:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:44:40Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A88272

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:44:38Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:44:28Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Error22-06-2015 16:44:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:44:28SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:44:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:44:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:44:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:44:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A88272

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:44:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A88272
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:44:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:44:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Information22-06-2015 16:43:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:43:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A85FFD

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:43:37Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:43:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:43:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:43:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:43:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:43:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A85FFD

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:43:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A85FFD
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:43:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:43:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:43:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:43:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:42:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:42:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A82A85

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:42:36Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:42:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:42:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:42:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:42:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:42:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A82A85

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:42:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A82A85
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:42:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:42:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:42:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:42:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:41:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:41:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A8062C

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:41:35Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:41:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:41:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:41:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:41:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:41:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A8062C

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:41:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A8062C
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:41:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:41:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:41:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:41:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:40:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:40:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7E1CE

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:40:35Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:40:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:40:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:40:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:40:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:40:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7E1CE

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:40:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7E1CE
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:40:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:40:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:40:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:40:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:39:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:39:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7BE19

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:39:34Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:39:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:39:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:39:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:39:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:39:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7BE19

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:39:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7BE19
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:39:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:39:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:39:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:39:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:38:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:38:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A79662

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:38:33Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:38:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:38:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:38:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:38:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:38:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A79662

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:38:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A79662
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:38:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:38:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:38:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:38:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:37:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:37:39Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7572B

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler102Task completed"Task Scheduler successfully finished ""{7C1BBD23-9AAA-4471-B93C-A6BB6A8D0C35}"" instance of the ""\Microsoft\Windows\CertificateServicesClient\UserTask"" task for user ""MIGPRDAPP2\Administrator""."
Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler201Action completed"Task Scheduler successfully completed task ""\Microsoft\Windows\CertificateServicesClient\UserTask"" , instance ""{7C1BBD23-9AAA-4471-B93C-A6BB6A8D0C35}"" , action ""Certificate Services Client Task Handler"" with return code 0."
Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler200Action started"Task Scheduler launched action ""Certificate Services Client Task Handler"" in instance ""{7C1BBD23-9AAA-4471-B93C-A6BB6A8D0C35}"" of task ""\Microsoft\Windows\CertificateServicesClient\UserTask""."
Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler100Task Started"Task Scheduler started ""{7C1BBD23-9AAA-4471-B93C-A6BB6A8D0C35}"" instance of the ""\Microsoft\Windows\CertificateServicesClient\UserTask"" task for user ""MIGPRDAPP2\Administrator""."
Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler129Created Task Process"Task Scheduler launch task ""\Microsoft\Windows\CertificateServicesClient\UserTask"" , instance ""taskhost.exe""  with process ID 2172."
Information22-06-2015 16:37:37Microsoft-Windows-TaskScheduler119Task triggered on logon"Task Scheduler launched ""{7C1BBD23-9AAA-4471-B93C-A6BB6A8D0C35}""  instance of task ""\Microsoft\Windows\CertificateServicesClient\UserTask"" due to user ""MIGPRDAPP2\Administrator""  logon."
Information22-06-2015 16:37:32Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:37:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:37:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:37:27Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:37:27Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:37:27Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7572B

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:37:27Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A7572B
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:37:27Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:37:27Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:37:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:37:27SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Information22-06-2015 16:36:42Service Control Manager7036NoneThe WMI Performance Adapter service entered the stopped state.
Information22-06-2015 16:36:41Microsoft-Windows-WMI-Activity5857NoneWmiPerfInst provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 3856; ProviderPath = C:\Windows\System32\wbem\WmiPerfInst.dll
Information22-06-2015 16:36:38Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A72178

Logon Type:5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:36:31Microsoft-Windows-TaskScheduler329Task stopping due to timeout reached"Task Scheduler terminated ""{9BE4A5FB-3EC9-4081-9D0B-8F7A3C40FADA}""  instance of the ""\Microsoft\Windows\Shell\CreateObjectTask""  task due to exceeding the time allocated for execution, as configured in the task definition. User Action: Increase the configured task timeout or investigate external reasons for the delay."
Information22-06-2015 16:36:31Microsoft-Windows-WMI-Activity5857NoneCIMWin32 provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\cimwin32.dll
Information22-06-2015 16:36:31Microsoft-Windows-WMI-Activity5857NoneMSVDS__PROVIDER provider started with result code 0x0. HostProcess = wmiprvse.exe; ProcessID = 4000; ProviderPath = %systemroot%\system32\wbem\vdswmi.dll
Error22-06-2015 16:36:27Service Control Manager7031NoneThe SAPMIP_14 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.
Information22-06-2015 16:36:26Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\AppData\Local\Microsoft\Windows\\UsrClass.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004_Classes.
Information22-06-2015 16:36:26Microsoft-Windows-User Profiles Service67None"Logon type: Regular

Local profile location: C:\Users\SAPServiceMIP

Profile type: Regular"

Information22-06-2015 16:36:26Microsoft-Windows-User Profiles Service5NoneRegistry file C:\Users\SAPServiceMIP\ntuser.dat is loaded at HKU\S-1-5-21-3992712574-2069093884-2571569125-1004.
Information22-06-2015 16:36:26Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A72178

Privileges:SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:36:26Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:5

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\SAPServiceMIP
Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon ID:0x8A72178
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:36:26Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:SAPServiceMIP
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x1fc
Process Name:C:\Windows\System32\services.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:36:26Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:SAPServiceMIP
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Error22-06-2015 16:36:26SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Initialization failed. Service not started. [D:/depot/bas/740_REL/src/proj/ntserv/ntservmain.cpp 1562]

"

Error22-06-2015 16:36:26SAP???_??0None"The description for Event ID 0 from source SAP???_?? cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

Cannot open Profile \\MIGPRD\sapmnt\MIP\SYS\profile\MIP_D14_MIGPRDAPP2. (Error 5 EIO*: Input/output error OR: Access is denied.) [D:/depot/bas/740_REL/src/proj/ntserv/ntservstart.cpp 1085]

"

Error22-06-2015 16:36:03Microsoft-Windows-TerminalServices-Printers1111NoneDriver Microsoft XPS Document Writer required for printer Microsoft XPS Document Writer is unknown. Contact the administrator to install the driver before you log in again.
Error22-06-2015 16:36:03Microsoft-Windows-TerminalServices-Printers1111NoneDriver FMPrinter required for printer FMPrinter is unknown. Contact the administrator to install the driver before you log in again.
Information22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager300NoneThe device container '{B0C9E24A-95CF-6468-1816-CD1F688506E6}' has entered the ready state
Information22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager112NoneDevice 'Fax (redirected 3)' ({B0C9E24A-95CF-6468-1816-CD1F688506E6}) has been serviced, processed 6 tasks, wrote 34 properties, active worktime was 0 milliseconds.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager201NoneA connection to the Windows Metadata and Internet Services (WMIS) could not be established.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager202NoneThe Network List Manager reports no connectivity to the internet.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager200NoneA connection to the Windows Update service could not be established.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager202NoneThe Network List Manager reports no connectivity to the internet.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager200NoneA connection to the Windows Update service could not be established.
Warning22-06-2015 16:36:02Microsoft-Windows-DeviceSetupManager202NoneThe Network List Manager reports no connectivity to the internet.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig4NoneNew device interface '\\?\SWD#PRINTENUM#{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}#{0ecef634-6ef0-472a-8085-5ad023ecbccd}' with interface class {0ECEF634-6EF0-472A-8085-5AD023ECBCCD} has been registered.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig1NoneDevice container {B0C9E24A-95CF-6468-1816-CD1F688506E6} is unconfigured.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{78C34FC8-104A-4ACA-9EA4-524D52996E57} 90' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{78C34FC8-104A-4ACA-9EA4-524D52996E57} 84' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{CF73BB51-3ABF-44A2-85E0-9A3DC7A12132} 2' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{A45C254E-DF1C-4EFD-8020-67D146A850E0} 14' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{A45C254E-DF1C-4EFD-8020-67D146A850E0} 2' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig2NoneProperty '{A45C254E-DF1C-4EFD-8020-67D146A850E0} 12' on device 'SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445}' changed.  This may affect the value of a property on device container {B0C9E24A-95CF-6468-1816-CD1F688506E6}.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnPConfig1NoneDevice container {B0C9E24A-95CF-6468-1816-CD1F688506E6} is unconfigured.
Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnP410None"Device SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445} was started.

Driver Name: PrintQueue.inf

Class GUID: {1ED2BBF9-11F0-4084-B21F-AD83A8E6DCDC}

Service:

Lower Filters:

Upper Filters: "

Information22-06-2015 16:36:02Microsoft-Windows-Kernel-PnP400None"Device SWD\PRINTENUM\{CFA7BD57-7F22-46A5-9849-83EDE6ED5445} was configured.

Driver Name: PrintQueue.inf

Class GUID: {1ED2BBF9-11F0-4084-B21F-AD83A8E6DCDC}

Driver Date: 06/21/2006

Driver Version: 6.2.9200.16384

Driver Provider: Microsoft

Driver Section: NO_DRV_LOCAL

Driver Rank: 0x1

Matching Device ID: PRINTENUM\LocalPrintQueue

Outranked Drivers: prnms002.inf:microsoftmicrosoft_s7d14:00FF0002 c_swdevice.inf:SWD\GenericRaw:00FF3001

Device Updated: false"

Error22-06-2015 16:36:02Microsoft-Windows-TerminalServices-Printers1111NoneDriver SHARP MX-2300G PCL6 required for printer !!192.168.140.99!SHARP MX-2300G PCL6 First Floor is unknown. Contact the administrator to install the driver before you log in again.
Information22-06-2015 16:36:01Microsoft-Windows-Kernel-General16NoneThe access history in hive \SystemRoot\System32\config\DRIVERS was cleared updating 108 keys and creating 12 modified pages.
Error22-06-2015 16:36:02Microsoft-Windows-TerminalServices-Printers1111NoneDriver PrimoPDF required for printer PrimoPDF is unknown. Contact the administrator to install the driver before you log in again.
Information22-06-2015 16:36:01Microsoft-Windows-TaskScheduler110Task triggered by user"Task Scheduler launched ""{9BE4A5FB-3EC9-4081-9D0B-8F7A3C40FADA}""  instance of task ""\Microsoft\Windows\Shell\CreateObjectTask""  for user ""System"" ."
Information22-06-2015 16:36:01Microsoft-Windows-TaskScheduler200Action started"Task Scheduler launched action ""Shell Create Object Task Delegate"" in instance ""{9BE4A5FB-3EC9-4081-9D0B-8F7A3C40FADA}"" of task ""\Microsoft\Windows\Shell\CreateObjectTask""."
Information22-06-2015 16:36:01Microsoft-Windows-TaskScheduler100Task Started"Task Scheduler started ""{9BE4A5FB-3EC9-4081-9D0B-8F7A3C40FADA}"" instance of the ""\Microsoft\Windows\Shell\CreateObjectTask"" task for user ""NT AUTHORITY\SYSTEM""."
Information22-06-2015 16:36:01Microsoft-Windows-TaskScheduler129Created Task Process"Task Scheduler launch task ""\Microsoft\Windows\Shell\CreateObjectTask"" , instance ""taskhost.exe""  with process ID 3616."
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6923B

Logon Type:2

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6924F

Logon Type:2

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpsnd has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel AUDIO_PLAYBACK_DVC has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel Microsoft::Windows::RDS::Geometry::v08.01 has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel AUDIO_PLAYBACK_DVC has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpdr has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel cliprdr has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel Microsoft::Windows::RDS::Geometry::v08.01 has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel Microsoft::Windows::RDS::Input has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\mipadm
Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon ID:0x8A6A5BC

Logon Type:10

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4634Logoff"An account was logged off.

Subject:

Security ID:MIGPRDAPP2\mipadm
Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon ID:0x8A6A5D7

Logon Type:10

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."

Information22-06-2015 16:36:01Microsoft-Windows-TerminalServices-LocalSessionManager25None"Remote Desktop Services: Session reconnection succeeded:

User: MIGPRDAPP2\mipadm

Session ID: 3

Source Network Address: "

Information22-06-2015 16:36:01Microsoft-Windows-RemoteDesktopServices-RdpCoreTS66RemoteFX moduleThe connection RDP-Tcp#0 was assigned to session #2
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:MIGPRDAPP2\mipadm
Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon ID:0x8A6A5BC

Privileges:SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:10

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\mipadm
Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon ID:0x8A6A5D7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:192.168.141.71
Source Port:0

Detailed Authentication Information:

Logon Process:User32
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:10

Impersonation Level:Impersonation

New Logon:

Security ID:MIGPRDAPP2\mipadm
Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon ID:0x8A6A5BC
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Workstation Name:MIGPRDAPP2
Source Network Address:192.168.141.71
Source Port:0

Detailed Authentication Information:

Logon Process:User32
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:mipadm
Account Domain:MIGPRDAPP2
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Network Address:192.168.141.71
Port:0

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:36:01Microsoft-Windows-Security-Auditing4776Credential Validation"The computer attempted to validate the credentials for an account.

Authentication Package:MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:mipadm
Source Workstation:MIGPRDAPP2
Error Code:0x0"
Information22-06-2015 16:36:01Desktop Window Manager9009NoneThe Desktop Window Manager has exited with code (0xd00002fe)
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpsnd has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel AUDIO_PLAYBACK_DVC has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel AUDIO_PLAYBACK_DVC has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpdr has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6924F

Privileges:SeAssignPrimaryTokenPrivilege
SeAuditPrivilege"
Information22-06-2015 16:36:00Microsoft-Windows-Security-Auditing4672Special Logon"Special privileges assigned to new logon.

Subject:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6923B

Privileges:SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeImpersonatePrivilege"
Information22-06-2015 16:36:00Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:2

Impersonation Level:Impersonation

New Logon:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6924F
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Workstation Name:
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:36:00Microsoft-Windows-Security-Auditing4624Logon"An account was successfully logged on.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7

Logon Type:2

Impersonation Level:Impersonation

New Logon:

Security ID:Window Manager\DWM-4
Account Name:DWM-4
Account Domain:Window Manager
Logon ID:0x8A6923B
Logon GUID:{00000000-0000-0000-0000-000000000000}

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Workstation Name:
Source Network Address:-
Source Port:-

Detailed Authentication Information:

Logon Process:Advapi 
Authentication Package:Negotiate
Transited Services:-
Package Name (NTLM only):-
Key Length:0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.

- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information22-06-2015 16:36:00Microsoft-Windows-Security-Auditing4648Logon"A logon was attempted using explicit credentials.

Subject:

Security ID:SYSTEM
Account Name:MIGPRDAPP2$
Account Domain:MILLTEC
Logon ID:0x3E7
Logon GUID:{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:

Account Name:DWM-4
Account Domain:Window Manager
Logon GUID:{00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name:localhost
Additional Information:localhost

Process Information:

Process ID:0x680
Process Name:C:\Windows\System32\winlogon.exe

Network Information:

Network Address:-
Port:-

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."

Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel ECHO has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS163RemoteFX moduleThe client suports RDP 7.1 or lower protocol.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpinpt has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS132RemoteFX moduleA channel rdpgrfx has been connected between the server and the client using transport tunnel: 0.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS33RemoteFX moduleRemote Desktop Protocol will use the RemoteFX guest mode module to connect to the client computer.
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS66RemoteFX moduleThe connection RDP-Tcp#0 was assigned to session #2
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS135RemoteFX moduleThe multi-transport connection finished for tunnel: 3, its transport type set to TCP: Reason Code: 1 (No Client UDP Support).
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS135RemoteFX moduleThe multi-transport connection finished for tunnel: 1, its transport type set to TCP: Reason Code: 1 (No Client UDP Support).
Warning22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS101RemoteFX moduleThe network characteristics detection function has been disabled because of Client not supported..
Information22-06-2015 16:36:00Microsoft-Windows-RemoteDesktopServices-RdpCoreTS100RemoteFX moduleThe server has confirmed that the client's multi-transport capability.
former_member186895
Participant
0 Kudos

Hello,

Are you logined in with sidadm user in server.

Check dependies service of that service.

Hope entries is maintained in etc file.

Also check service file.

Thanks

Ramesh

divyanshu_srivastava3
Active Contributor
0 Kudos

Thanks Adarsh but these logs are hard to read. If you would have supplied the event viewer screenshot for the is error or the log of the failure of the service, then it would have been easy.

Anyway, please read the SAP note that I have shared with you above. It tell you possible ares to check and fix.

Check Windows application log (start eventvwr.exe = Event Viewer) and look for this error:


Regards,

adarsh_jainer
Participant
0 Kudos

Hi Sir,

Sorry for providing a long log file.I am attaching the screenshot of the error.Please do check.

Regards,

Adarsh

divyanshu_srivastava3
Active Contributor
0 Kudos

Install service again - follow note - 2004710 - How to re-install a SAP Service on Windows platforms

divyanshu_srivastava3
Active Contributor
0 Kudos

Also check - 

adarsh_jainer
Participant
0 Kudos

Hi Sir,

I checked the link provided by you and i have some doubt. Like the above thread every server should have shared folder access to SAPLOC and SAPMNT. However when i checked the Central PRD I could see both these folders are shared and this is not the same with the application servers whose services are not starting. There i could only access the SAPLOC folder.I contacted my seniors and they told these folders will be shared by default.But this is not the case with these app servers. What should i do now.Should i add them manually and are there any specific steps.

Regards,

Adarsh