601: Attempt to install service
On this page
A new service was installed by the indicated user and domain. Service Name: the internal system name of the new service.Use "sc query" to get a cross reference of service names and their more familiar display names. Service Type: Service Start Type: Service Account: this is the account that the service runs under. User Name and Domain identify the user who installed the service. While this event only monitors new services, you can audit existing service related events such as starts, stops and modifications with the Object Access category. To enable auditing on a service you can use a Security Template or the subinacl (resource kit) command.
Your entire Windows Event Collection environment on a single pane of glass.
Free.
Attempt to install service: Service Name:SNMPTRAP Service File Name:%SystemRoot%\system32\snmptrap.exe Service Type:16 Service Start Type:3 Service Account:NT AUTHORITY\LocalService By: User Name:administrator Domain:ELM Logon ID:(0x0,0x158EB7)
Top 10 Windows Security Events to Monitor
Free Tool for Windows Event Collection
Go To Event ID: Must be a 1-5 digit number No such event ID
Security Log Quick Reference Chart Download now!