Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Replication|
Internal event: The operation on the object failed with the following internal error string: <error details>.
|English: Request a translation of the event description in plain English.|
When information is replicated from a Microsoft Windows 2000-based domain controller to a Microsoft Windows Server 2003-based domain controller, the replication process is not completed successfully. Additionally, if you increase the logging level for internal processing to 4 in Windows Server 2003, this warning event will be logged. See ME824873 for a hotfix applicable to Microsoft Windows 2000.
As per Microsoft: "This problem occurs when an Active Directory object that is currently being used is deleted from the Active Directory directory service. In this situation, the replication engine will try to delete the object later". See ME911015 for additional information about this event.
See the link to "EventID 1481 from source NTDS General" for information on this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME824873, ME911015, EventID 1481 from source NTDS General|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated