Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The DNS server wrote version <version number> of zone <dns zone> to file <file name>
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of a DNS server?
See ME181600 to find out how to configure a secondary DNS Server with Windows NT.
This event should be self-explanatory (and probably it is for most of the cases). However, we have received a report for this event occuring in the following conditions: "No symptoms other than event log entries in the DNS log file under Windows 2000 server (SP2 currently). This Information entry will occur 6 to 10 times and then a Warning Event Id 9999. The cycle repeats (3150s and then 9999 event IDs. The domain has only one server, thus no Active Directory transfers can occur. However, DNS is Active Directory Integrated and is set to deny any Zone Transfers.". We don't have any info about what would cause this.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated