Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
|English: Request a translation of the event description in plain English.|
This event is identical with event id 1530 from Microsoft Windows User Profiles Services. Please see the link below for comments for that event.
|Private comment: Subscribers only. See example of private comment|
|Links: Event id 1530 from Microsoft Windows User Profiles Services|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated