Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Process <process> (PID=<PID>). A search or read to Directory Server <server> returned object "<object>" which has attribute "<attribute>" with too many values to return in a single search. If possible reduce the number of values in this attribute to allow normal operation.
|English: Request a translation of the event description in plain English.|
This warning comes if you have a distribution group with more than 1500 members in the attribute. Try reducing the member value to reduce the load on GC query. If possible, create two different distribution groups and split the membership.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated