Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Windows cannot copy your profile because it contains encrypted files or directories. The keys to decrypt the files or directories are also stored in the profile and are not available now. Please decrypt the files and try again.
|English: Request a translation of the event description in plain English.|
See ME911805 for information about this event.
Use the EFSINFO command line utility to search the users profile for the encrypted file. Delete the file or move it to a location so it is not included in the profile. The syntax to locate the file is Efsinfo /u /r /s:"<Profile Path>". Include the profile path in parenthesis. The output will contain a list of all the files and subdirectories which are encrypted or not. This utility in included in the support tools for Windows XP Professional.
|Private comment: Subscribers only. See example of private comment|
|Links: ME911805, Efsinfo.exe: Encrypting File System Information|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated