Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS KCC|
The format of the schedule attribute of the following object is unrecognizable.
A default schedule will be substituted. This event will continue to occur until the schedule attribute on this object has been corrected.
Use Active Directory Sites and Services to change the schedule attribute.
|English: Request a translation of the event description in plain English.|
See the comments for "Event ID 1121 from source Active Directory".
|Private comment: Subscribers only. See example of private comment|
|Links: Event ID 1121 from source Active Directory|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated