Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Windows cannot find the local profile and is logging you on with a temporary profile. Changes you make to this profile will be lost when you log off.
|English: Request a translation of the event description in plain English.|
Before trying MS Fixes run a chkdsk /f against the machine. Most of times it solves the issue if the profile went bad due to a dirty shutdown.
Restore folder "Default" (c:\user\default) (in my case I copied the folder from another computer).
Ensure that the paths are correct in:
or (if the problem is with an existing user account, not a new one)
For more information see ME947215.
This issue occurs because the NTUser.dat file is not released successfully after the file is loaded under the HKEY_USERS\<SID> registry key. See ME941339 for information on solving this problem.
If the user's profile has become corrupted then see ME318011 for details on fixing this problem.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated