Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
There are currently no logon servers available to service the logon request.
|English: Request a translation of the event description in plain English.|
After multiple Terminal Server clients establish a session with a server running Microsoft Windows NT Server 4.0, Terminal Server Edition, additional clients cannot connect. When this occurs, in some cases, clients cannot browse certain servers or domain controllers after a specific number of client sessions have been established. If the Terminal Server computer is a member server, then you might see this event logged. See ME232476 for a solution to this problem.
See ME193836 and the link to "Symantec Knowledge Base Document ID: 2002022109065948" for additional information about this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME193836, ME232476, Symantec Knowledge Base Document ID: 2002022109065948|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated