Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Database|
Active Directory has detected that the quota-tracking table is either missing or not completely built. The table will be rebuilt in the background (resuming the progress of any previous rebuild if possible). Until it has completed quota enforcement will not be in effect.
|English: Request a translation of the event description in plain English.|
This event is self-explanatory. Ignore this event if it no longer occurs after Windows is given time to resolve it. Look out for EventID 2065 from source NTDS General.
|Private comment: Subscribers only. See example of private comment|
|Links: EventID 2065 from source NTDS General|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated