Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: OpsMgr Connector|
The OpsMgr Connector could not connect to <NameOfRMSServer>:5723. The error code is 10061 (No connection could be made because the target machine actively refused it). Please verify there is network connectivity the server is running and has registered it's listening port and there are no firewalls blocking traffic to the destination.
|English: Request a translation of the event description in plain English.|
Accompanied by Events 21006 21016 21023 on the Gateway server when attempting Certificate based authentication. You may also notice informational Event 21022 on the RMS. Follow the steps in this document to install the certificate correctly for SCOM to work. Please note the document is partially incorrect and you must save the certificate with a pfx extension: EV100241 (Gateway Server and Certificate-based Authorization Scenarios in Operations Manager 2007).
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated