Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Replication|
CN=YOURcomPUTERNAME,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=YOURDOMAINNAME ,DC=com (with objectGuid 793c9a19-94ee-4713-b154-9a7f7d81b4a0) was created on a remote server. However, this name is already in use here by the object with objectGuid 980563ba-c29c-4638-ad40-3d0574c925b0. The object with objectGuid 980563ba-c29c-4638-ad40-3d0574c925b0 will be renamed to YOURCOMPUTERNAME CNF:980563ba-c29c-4638-ad40-3d0574c925b0, since the other object claimed the name first.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is a GUID?
What is NTDS and what are the roles of its components?
See ME836534 for a hotfix applicable to Microsoft Windows Server 2003.
This message indicates that CrossRef object deletion or re-creation left the computer in a state in which the new naming context name has a name conflict. See ME281485.
|Private comment: Subscribers only. See example of private comment|
|Links: ME281485, ME836534|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated