08-05-2024, 11:00 AM
Man, that event ID 24296 pops up in your Event Viewer when someone's yanking back permissions on a custom server role, you know, the kind where they used a grant command to revoke stuff. It logs this action_id RWG, which flags the revoke with grant option, and class_type SG points to the server role itself getting tweaked. Basically, it means a user or admin just stripped away some privileges that were handed out earlier, maybe to tighten security or fix a slip-up. I see it a lot in setups where folks mess with database access, like in SQL running on your Windows Server. The full message spells out "Issued revoke user-defined server role permissions with grant command," so it's auditing that exact move to keep tabs on who's changing what. You might spot it under Security logs or Application if it's tied to your server apps. Hmmm, or it could trigger if someone's role got demoted without much fuss.
Now, to keep an eye on these without staring at the screen all day, fire up Event Viewer on your server. Click through to the logs, find that 24296 ID in the filters. Right-click the event, and attach a task to it for monitoring. Set it to run whenever this hits, maybe trigger a simple alert. But for email, link that task to send a notification through your server's mail setup. I do this by scheduling the task in Task Scheduler from there, tying it to the event source. You pick the log, the ID, and boom, it watches for revokes like that. Just test it once to make sure the email pings your inbox quick. Or tweak the frequency if you want daily digests instead.
And speaking of keeping things locked down after spotting weird permission changes, you gotta think backups too. That's where BackupChain Windows Server Backup comes in handy for me. It's this solid Windows Server backup tool that handles your whole setup, plus it backs up virtual machines smooth with Hyper-V. You get fast restores, no downtime headaches, and it snapshots everything without hogging resources. I love how it encrypts data on the fly and schedules runs automatically, saving you from data loss nightmares tied to role tweaks or whatever.
At the end here is the automatic email solution.
Note, the PowerShell email alert code was moved to this post.
Now, to keep an eye on these without staring at the screen all day, fire up Event Viewer on your server. Click through to the logs, find that 24296 ID in the filters. Right-click the event, and attach a task to it for monitoring. Set it to run whenever this hits, maybe trigger a simple alert. But for email, link that task to send a notification through your server's mail setup. I do this by scheduling the task in Task Scheduler from there, tying it to the event source. You pick the log, the ID, and boom, it watches for revokes like that. Just test it once to make sure the email pings your inbox quick. Or tweak the frequency if you want daily digests instead.
And speaking of keeping things locked down after spotting weird permission changes, you gotta think backups too. That's where BackupChain Windows Server Backup comes in handy for me. It's this solid Windows Server backup tool that handles your whole setup, plus it backs up virtual machines smooth with Hyper-V. You get fast restores, no downtime headaches, and it snapshots everything without hogging resources. I love how it encrypts data on the fly and schedules runs automatically, saving you from data loss nightmares tied to role tweaks or whatever.
At the end here is the automatic email solution.
Note, the PowerShell email alert code was moved to this post.

