Group membership information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 New Logon: Security ID: %5 Account Name: %6 Account Domain: %7 Logon ID: %8 Event in sequence: %10 of %11 Group Membership: %12 The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. This event is generated when the Audit Group Membership subcategory is configured. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.
Group Key Distribution Service cannot start the work thread to read new data from AD periodically. Status %1. Group Key Distribution ...
Group Key Distribution Service configuration is using some invalid value. The invalid attribute is %1. As a result, Group ...
Group Key Distribution Service failed to generate key using master root key %1. Status %1. Please contact administrators ...
Group Key Distribution Service has encountered an invalid master root key. The key ID is %1. %2 is the name of the wrong ...
Group membership information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 New ...
Group Membership This policy allows you to audit the group memberhsip information in the user's logon token. Events in this ...
Group Policy dependency (%1) did not start. As a result, network related features of Group Policy such as bandwidth estimation ...
Group Policy does not allow custom user locales for standards and formats. The user was unable to select "%1" as their user ...
Group policy management feature is not enabled. Enable group policy management through server manager and execute the command ...