Access denied viewing Internet Explorer event log as a local Administrator

You may find that when you try to access the Internet Explorer event log you see an access denied message.

This is likely because of Microsoft patch KB5018410 (October 11th 2022).

This patch updates the security descriptor for the Internet Explorer event log and applies the following CustomSD security descriptor value.

"O:BAG:SYD:(A;;0x07;;;DA)(A;;0x07;;;LA)(D;;0x07;;;DU)(A;;0x07;;;WD)S:(ML;;0x1;;;LW)"

Translating the security descriptor above shows that it includes a DENY for Domain Users.

 This DENY comes after two Allow ACLs which allow specifically Domain Admins and the local Administrator account to access the event log.

Therefore, if the account that is performing the scan is an Administrator but not a Domain Admin nor specifically the built in Administrator account then access will be denied.


If you're using XIA Configuration to scan Windows machines and experience this issue we added the following optional component:

https://www.centrel-solutions.com/media/xiaconfiguration/adminguideweb/WindowsAgentOptionsTab.html

 

Event Logs (Internet Explorer Log)

Determines whether the Internet Explorer event log should be read for Windows machines when using PowerShell remoting. This is disabled by default due to the security access control list preventing access.

Comments

Popular posts from this blog

SOLVED: Exchange Online Management PowerShell Connect-ExchangeOnline bug "A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles"

Windows Server 2016, 2019, 2022, Windows 10 and Windows 11: Date and time "Some settings are managed by your organization".

get-windowsfeature : The given key was not present in the dictionary