Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Log-Error: E;12/05/2000 12:46:52;32C;RPC-Server
|English: Request a translation of the event description in plain English.|
As per Symantec: "This is known to happen if the desktop agent on a CCM client computer that has been deleted from the CCM database polls the CCM server.
In the case that the client computer should no longer be managed by CCM the solution is to either uninstall or disable the desktop agent". See "Symantec Support Document ID:2002111105034360" for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: Symantec Support Document ID:2002111105034360|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated