Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS KCC|
The ntdsConnection object CN=SERVER,CN=NTDS Settings,CN=SERVER,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=<domain controller>,DC=<domain suffix> dictates that the local server should replicate from itself. This is not a valid configuration and will be ignored. Please use the Active Directory Sites and Services Manager to modify or delete this object.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is NTDS and what are the roles of its components?
What is KCC?
compiled from newsgroups postings: "This message indicates that there is a replication connection from a domain controller to itself. This is not valid, and the KCC and replication are ignoring it. It can be deleted (if you run the Sites and Services mmc and expand down to Sites / Default first / servers / w2kserver / NTDS settings you will find a connection object defined, that is actually a connection from <domain controller x> to <domain controller x> that it wants you to delete)."
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated