Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1388 Source: ActiveDirectory

This destination system received an update for object which should have been present locally- but was not. The attribute set included in the packet is not sufficient to create the object. A full copy of the object will be requested.

Object Name: <name>
Object GUID: <GUID>
Partition: <partition>
Transport-specific source address: <address>
Destination highest property update USN: <USN>.
As per Microsoft: "Another domain controller (DC) attempted to replicate into this DC an object that is not present in the local Active Directory database. The object might be permanently deleted on this DC because a tombstone lifetime (by default, 60 days) has passed. The attribute set included in the update request is not sufficient to create the object. The object will be re-requested with a full attribute set and re-created on this DC". See MSW2KDB for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.