Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Replication|
A thread in the directory is waiting in a remote procedure call (RPC) to directory <directory> performing a(n) <operation name> operation. The directory has attempted to cancel the call and recover thread id <thread id>. If this condition persists, stop and restart that Windows Domain Controller.
|English: Request a translation of the event description in plain English.|
Lubrano Diciccone Christophe
This happened for us during a promotion. The root cause was identified as being a mismatch between the NIC settings and the switch port settings. We hard-coded the speed and the mode on both sides to solve the issue.
This problem started happening after I installed MS05-019 security update (KB893066). See ME890060 for a hotfix that will fix this problem.
See ME830746 for information on resolving this problem.
See the link to "EventID 1188 from source NTDS General" for details on this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME830746, ME898060, ME893066, EventID 1188 from source NTDS General|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated