Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Replication|
Internal event: The Directory Service processed the replication state information request with status code <error code>.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is a directory service?
- Error code: 8453 (Error code 8453) - This behavior occurs because you do not have the required permissions to read the status of the particular directory partition. See ME246721 to solve this problem.
See the link to "EventID 1508 from source Active Directory" for additional information on this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME246721, Error code 8453, EventID 1508 from source Active Directory|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated