Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
An account could not be created for user '/o=Microsoft/ou=Remote55Site/cn=Recipients/cn=Mailbox1'.
|English: Request a translation of the event description in plain English.|
See ME924246 for a possible solution to this problem.
If you use a single step migration, and you select the option to set the user password to the same value as the login name, then make sure password complexity requirement in the target domain is turned off.
As per Microsoft: "A new user account could not be created in Active Directory due to one of the following reasons:
- The user who is running migration might not have write permissions to the import container in Active Directory.
- The global catalog might be unavailable.
- The Windows domain controller might have shut down". See MSEX2K3DB for more details on this event.
See ME281496 for additional information on fixing this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME281496, ME924246, MSEX2K3DB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated