Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 13547 Source: NtFrs

The File Replication Service detected an invalid parameter value in the registry. The registry value name was not found.

The expected registry key name is "<key>".
The expected value name is "<value name>".
The expected registry data type is <type>.
The allowed range for this parameter is between <value> and <value> characters long
The data units for this parameter value are none.
The File Replication Service is using a default value of "<default value>".

To change this parameter run regedit.

Click on Start Run and type regedit.

Click down the key path: "<key path>"
Double click on the value name - "<value name>" and update the value.
If the value name is not present you may add it with the Add Value function under the Edit Menu item. Type the value name exactly as shown above using the above registry data type. Make sure you observe the data units and allowed range when entering the value.
No information available. If you have additional details about this event, please, send them to us!

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.