Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 10026 Source: DCOM

The COM sub system is suppressing duplicate event log entries for a duration of 86400 seconds. The suppression timeout can be controlled by a REG_DWORD value named SuppressDuplicateDuration under the following registry key: HKLM\Software\Microsoft\Ole\EventLog.
This message in itself is not directly related to a problem but it simply states that an application is attempting to record several identical events. In order to prevent a possible performance degradation because of this, the system is supressing the logging of these events for the time interval specified (usually 86400 seconds or 24 hours). The other events recorded before this one should provide some clues about the actual problem.

* * *

From a newsgroup post it results that one user got rid of this problem after updating the firmware for the network adapter installed in the computer.
In one case, a computer was running Windows 2003 that had an Adaptec Ultra 160 (19160) SCSI Adapter that was being used to control separate C: and D: drives. After a while the D: drive failed. This resulted in the SCSI BIOS taking a long time to run and eventually timed out. When Windows loaded and this Event ID appeared, Windows took a long time to start up (even when the swap file was moved to the C: drive). The D: drive was not accessible. This event ID was accompanied by EventID 9 Source adpu160m, EventID 11 from source Disk and EventID 117 from source adpu160m.
Resolution: Remove or replace the faulty hard drive.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.