Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Microsoft Operations Manager|
Computer Discovery has determined that the following computers have expired. This is because there are no computer discovery rules that match these computers. The grace period of 48 hours has expired and these machines are marked for uninstall.
COMPUTER1 COMPUTER2 ... COMPUTERN
To correct this problem please make sure that you have computer discovery rules defined for the computers mentioned here and run computer discovery after your changes are complete.
|English: Request a translation of the event description in plain English.|
Check your discovery rules at MOM Admin -> Administration -> Computer -> Computer Discovery Rules.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated