Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The public database has been restored to an alternate server. This database will no longer be able to replicate with other public databases.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Exchange Information Store service?
The recovery server, on which the information store was restored, did not have a copy of the folder from the production server. Therefore, when you run the directory service or information store checker on this computer, the directory service or information store checker does not have information about all of the other servers and mailboxes in the organization. As a result, the public folders are re-homed to the recovery server. In addition to re-homing the public folders, because a directory object for the public folders is not found in the folder on the recovery server, a new directory object is created for each re-homed public folder. See ME263055 and ME264317 for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: ME263055, ME264317|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated