Event 5447. Don't know how to resolve all these events.


a windows filtering platform filter has been changed.   subject:  security id:  s-1-5-19  account name:  nt authority\local service  process information:  process id: 536  provider information:  id:  {decc16ca-3f33-4346-be1e-8fb4ae0f3d62}  name:  windows firewall  change information:  change type: %%16385  filter information:  id:  {e41d6206-4065-4331-b705-d81c0821c0ea}  name:  hp networked printer installer  type:  %%16388  run-time id: 67493  layer information:  id:  {88bb5dad-76d7-4227-9c71-df0a3ed7be7e}  name:  ale listen v4 layer  run-time id: 40  callout information:  id:  {00000000-0000-0000-0000-000000000000}  name:  -  additional information:  weight: 4611686018427387920   conditions:   condition id: {d78e1e87-8644-4ea5-9437-d809ecefc971}  match value: equal  condition value:      00000000  5c 00 64 00 65 00 76 00-69 00 63 00 65 00 5c 00  \.d.e.v.i.c.e.\.     00000010  68 00 61 00 72 00 64 00-64 00 69 00 73 00 6b 00  h.a.r.d.d.i.s.k.     00000020  76 00 6f 00 6c 00 75 00-6d 00 65 00 31 00 5c 00  v.o.l.u.m.e.1.\.     00000030  77 00 69 00 6e 00 64 00-6f 00 77 00 73 00 5c 00  w.i.n.d.o.w.s.\.     00000040  73 00 79 00 73 00 74 00-65 00 6d 00 33 00 32 00  s.y.s.t.e.m.3.2.     00000050  5c 00 73 00 70 00 6f 00-6f 00 6c 00 73 00 76 00  \.s.p.o.o.l.s.v.     00000060  2e 00 65 00 78 00 65 00-00 00                    ..e.x.e...    filter action: %%16390
log name: <security>
source: <microsoft-windows-security-auditing>
record number: <1846757>
user: <n/a>
ms event id: <5447>
ms event category: <13573> (13573)
ms event type: <8> (security audit success)
ms insertion strings: <['536', 's-1-5-19', 'nt authority\\local service', '{decc16ca-3f33-4346-be1e-8fb4ae0f3d62}', 'windows firewall', '%%16385', '{e41d6206-4065-4331-b705-d81c0821c0ea}', 'hp networked printer installer', '%%16388', '67493', '{88bb5dad-76d7-4227-9c71-df0a3ed7be7e}', 'ale listen v4 layer', '40', '4611686018427387920', ' \tcondition id:\t{d78e1e87-8644-4ea5-9437-d809ecefc971} \tmatch value:\tequal \tcondition value:\t     00000000  5c 00 64 00 65 00 76 00-69 00 63 00 65 00 5c 00  \\.d.e.v.i.c.e.\\.     00000010  68 00 61 00 72 00 64 00-64 00 69 00 73 00 6b 00  h.a.r.d.d.i.s.k.     00000020  76 00 6f 00 6c 00 75 00-6d 00 65 00 31 00 5c 00  v.o.l.u.m.e.1.\\.     00000030  77 00 69 00 6e 00 64 00-6f 00 77 00 73 00 5c 00  w.i.n.d.o.w.s.\\.     00000040  73 00 79 00 73 00 74 00-65 00 6d 00 33 00 32 00  s.y.s.t.e.m.3.2.     00000050  5c 00 73 00 70 00 6f 00-6f 00 6c 00 73 00 76 00 

hi wchew,


update.

 

i have did further research on auditing records, mentioned hp printer app had been deployed , according records, seems hp networked printer installer has been logged, suspect if there connections between these 2 records ? perhaps printer program attempting commutate ipv6 networking .

 

did got other relate events ? please post here if possible:

 

enabling audit events windows firewall advanced security

http://technet.microsoft.com/en-us/library/ff428143(ws.10).aspx

 

thanks.


tiger li

 

technet subscriber support in forum

if have feedback on our support, please contact tngfb@microsoft.com


please remember click “mark answer” on post helps you, , click “unmark answer” if marked post not answer question. can beneficial other community members reading thread.


Windows Server  >  Platform Networking



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file