Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1120 Source: MSExchangeIS

Error <error> initializing the Microsoft Exchange Server Information Store database.
- Error: -1022 - This event can be caused by a corrupt Microsoft Exchange Transaction Log file. A -1022 error also indicates a potential hardware issue; the Event Viewer's System log should be scanned for indications hardware malfunctions. For more information, see ME181449.
- Error: "Current log file missing" - This behavior occurs if you do not use Control Panel to start the Information Store service. See ME238063 for details.
- Error: "Non-database file or corrupted database" - See ME242063.

See ME187869 and MSEX2KDB for additional information about this event.
This behavior can occur because the Buffer Threshold Low Percent value is missing from the following registry key: "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeIS\ParametersSystem". See ME295649, ME242364 and 185577 for more details.

- Error: 0xfffffdfd - See ME275602.
- Error: 0xfffffbf8 - See ME224977, ME245058, and the link to "Veritas Support Document ID: 191612".
- Error: "non-database file or corrupted database" - See ME185008 and ME260230.
The problem occurs when the Information Store stops abnormally and the Eseutil.exe hard repair option (/P) is run against the Priv.edb file to return it to a state in which it can be started. In addition, the previous transaction log files were deleted, as recommended in the Eseutil dialog box, but hard repair was not run against the Pub.edb file.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.