Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchange ADAccess|
|Maintenance: Recommended maintenance tasks for Exchange servers|
Process Microsoft.Exchange.RpcClientAccess.Service.exe (PID=2584). The user 'user_name ~ Sid \ User ~ RCA ~ false' read the value '159 'times for component' RCA 'in a period of one minute. Information: 'Policy: DefaultThrottlingPolicy_abce001f-56bf-47a7-B217-a2d1494d542e, Setting: MaxConcurrency: 158;'. Value threshold: '100 '.
|English: Request a translation of the event description in plain English.|
A suggestion for this event from a support forum was to change the value of the RCAMaxConcurrency to $null for the Default Throttling Policy. A value of 30 will not be enough because your user value is '159' There is no issue with having this value set to $null.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated