Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The license store for the client access licenses is not valid and could not be restored from an automatic backup. Only the minimum number of client access licenses will be available until a valid license store is restored. For more information see Help in the Licensing snap-in.
|English: Request a translation of the event description in plain English.|
In my case, the NT Authority\System account was disabled. This is why the Store went corrupt as the System account could not read write or make changes to the Store File. The System could not restore the Backup because the System account could not read the Backup Store File. It turned out to be CA E-Trust AV Quarantine function that caused my system account to be disabled. If you are also running E-Trust AV, either disable the Quarantine function or wait 90min (Default Value) for the Policy to expire. Stop the Real-Time Service in the meanwhile; it will solve your incident temporarily so that at least the users can work.
This event can also occur when you are using a specific combination of Language and Keyboard settings. Update to the latest SP and all will be ok.
ME888818 provides information on troubleshooting this problem.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated