Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
MSExchangeIS <process id> The database engine <version> started.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Exchange Information Store service?
See ME242063 for a specific situation in which this event might occur.
As per Microsoft: "This behavior can occur when the Information Store stops abnormally and the Eseutil.exe hard repair option (/P) is run against the Priv.edb file to return it to a state in which it can be started. In addition, the previous transaction log files were deleted, as recommended in the Eseutil dialog box, but hard repair was not run against the Pub.edb file". See ME185577 and ME275602 to fix this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME185577, ME242063, ME275602|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated