Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
There was a mapping failure.
|English: Request a translation of the event description in plain English.|
From a support forum: "The default value of SecurehandleLevel setting is also known to hide
subdirectories and files sometimes. Set that to 0 and see if that helps in anyway. The registry setting can be located here - HKLM\System\CurrentControlSet\Services\NfsSvr\Parameters\SecureHandleLevel
(DWORD). You need to restart the Server for NFS service changing it.
You can read more about this here - TB463205 - Performance Tuning Guidelines for Microsoft Services for Network File System."
See also IBM Doc id ssg1S1001525.
See ME890745 for a hotfix applicable to Microsoft Windows Services for UNIX 3.5.
See the link to "NFS Authentication" for information on the Network File System (NFS) environment.
|Private comment: Subscribers only. See example of private comment|
|Links: ME890745, NFS Authentication, TB463205, IBM Doc id ssg1S1001525|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated