Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|English: This information is only available to subscribers. An example of English, please!|
|Concepts to understand:|
What is CIM?
What is a WMI namespace?
What is a WMI query?
For Windows 7 and Windows Server 2008 R2 see ME2545227.
See the comments for Event id 10 from WinMgmt, the event is identical.
Read ME950375 in the Microsoft knowledge database. There is a script that fixes this issue.
|Private comment: Subscribers only. See example of private comment|
|Links: Event id 10 from WinMgmt|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated