Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: OnePoint Operations|
The Consolidator detected a change to the configuration settings for one or more computers, and will begin downloading the new configuration settings to the affected computers.
|English: Request a translation of the event description in plain English.|
See ME295982 for details on this problem.
This event indicates that the discovery criteria has been changed in one of the MOM Managed computer Rules so MOM will initiate the discovery of the computers matching the newly entered criteria.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated