Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Product: <product> -- Error 1311.Source file not found(cabinet): <cabinet file>. Verify that the file exists and that you can access it.
|English: Request a translation of the event description in plain English.|
Do the following to fix this problem:
1. Run “secpol.msc”.
2. Go to “Local policies" -> "Security options". Change parameter "Devices: Restrict CD-ROM access to locally logged-on users only" to "disabled".
3. Restart Windows.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (1) - More links...|
Send comments or solutions
- Notify me when updated