Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: OpsMgr Config Service|
OpsMgr Config Service failed to send the dirty state notifications to the dirty OpsMgr Health Services. This may be happening because the Root OpsMgr Health Service is not running.
|English: Request a translation of the event description in plain English.|
This issue occurs because some third-party programs register themselves as Windows network providers to process Universal Naming Convention (UNC) names. This behavior may cause the Microsoft .NET Framework remoting feature to work incorrectly. The Health Service relies on the .NET Framework remoting feature. The third-party programs which are known to cause this issue are IBM eServer iSeries Access for Windows 5.4.05 and VMware ESX Server 3.0.x. See ME946417 for information on solving this problem.
See ME948731 for additional information about this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME946417, ME948731|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated