Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchange ADAccess|
|Maintenance: Recommended maintenance tasks for Exchange servers|
Process MSEXCHANGEADTOPOLOGYSERVICE.EXE (PID=2236). Exchange Active Directory Provider failed to obtain DNS records for forest DC=intDC=acmeDC=net. DNS Priority and Weight for the Global Catalog servers in this forest will be set to the default values 0 (priority) and 100 (weight).
|English: Request a translation of the event description in plain English.|
If event 2105 triggered this alert make sure that the domain controllers for the domain specified in the event description are registered correctly on the DNS server. If event 2106 triggered this alert make sure that global catalog servers for the forest specified in the event description are registered correctly on the DNS server.
In my case a newly introduced 2008 DC in a Windows 2003 domain was not registered as a name server for the delegated zone _msdcs. After adding the server as name server for this delegation the error was solved.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated