Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS ISAM|
NTDS (284) The database engine is replaying log file C:\WINNT\NTDS\edb.log.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is NTDS and what are the roles of its components?
What’s the role of edb.log file?
See ME295932 for details.
Elliott Fields Jr
This message is normally recorded after a unexpected reboot. The specified log file is being replayed against the NTDS.DIT file to commit changes from the log file. This will update the NTDS.DIT file with any information that was left in the log file before the system went down.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated