Hello all,
We are monitoring the Windows eventlog ID 4625 for failed logons which works perfectly, well.... to perfectly actually.
We would like to filter out the IPv6 lines which we are not interested in as they have a different source.
We like to trigger only on the not IPv6 events.
We see in all the monitor Values the: "network address from source: fe80::xxxx "
Have been trying and searching unsuccessfully to create a trigger.
Any help much appreciated
We are monitoring the Windows eventlog ID 4625 for failed logons which works perfectly, well.... to perfectly actually.
We would like to filter out the IPv6 lines which we are not interested in as they have a different source.
We like to trigger only on the not IPv6 events.
We see in all the monitor Values the: "network address from source: fe80::xxxx "
Have been trying and searching unsuccessfully to create a trigger.
Any help much appreciated
Comment