Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS General|
Inbound replication has been disabled by the user.
|English: Request a translation of the event description in plain English.|
I encountered this problem when one of my domain controllers kept rebooting due to a failing disk. Peter Hayden's comment solved my problem, but his syntax is for a Windows 2000 domain controller. For a Windows 2003 domain controller, you must add the FQDN of the domain controller after the "/options" switch: "repadmin /options dc.domain.com -DISABLE_INBOUND_REPL".
Inbound replication has been disabled by a user using the command:
“repadmin /options +DISABLE_INBOUND_REPL”, from the Windows 2000/2003 Resource Kit, or by Active Directory when it encountered a problem (typically Event ID 2103, Source NTDS General).
Re-enable inbound replication using the command:
“repadmin /options -DISABLE_INBOUND_REPL” or resolve related Event IDs.
See ME875495, ME885875, and the link to "EventID 1113 from source Active Directory" for information on this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME875495, ME885875, EventID 1113 from source Active Directory, EventID 2103 from source NTDS General|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated