Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1070 Source: MSExchangeDS

Internal event: Directory <dsa-signature> <server name> asked the directory replication agent (DRA) to get changes from naming context <site naming context> starting at update sequence number (USN) <xxxxxxx> with flags 360 and sensitivity 100.
This event can occur when you make a directed request for an update (new and modified objects) of a remote site context from the originating bridgehead server to the target bridgehead responsible for providing that site context. See ME176459, ME184244 and ME195918 for details on this situation.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.