Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1374 Source: NTDSInter-siteMessaging

Level
Description
The query for how sites are interconnected via transport CN=IP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC=delrus,DC=ru failed with the
following status:

A device attached to the system is not functioning.
The record data is the status code.
Comments
 
EventID 1374, and several other event log errors (like 1311 and 1586) were regularily occuring in our multiple Windows 2000 server environment.  I would focus on a particular error, seem to get if fixed, only to have new ones occur.  But when I found Article ME266657, the associated fix solved all of the replication, dns, and active directory errors.  In a nutshell, we had Exchange 5.5 on a Windows 2000 server that was also acting as a Domain Controller.  Apparently Windows 2000 NTDSA requires exclusive use of Port 389, but has a weak grip on it.  Exchange''s LDAP protocol was interfering with NTDSA by taking control of port 389.  When I ran DCPromo and demoted the server with Exchange 5.5, the relevant errors on all of the servers disappeared.  Likely disabling LDAP on Exchange would have been adaquate, too.  I had another server available to act as a Domain controller, so I chose that path.
I have seen this when rebooting. It followed a 1369 warning and appeared to occur after the DNS service had been shutdown, there was a warning from NetLogon (ID:5781) that DNS was unavailable.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...