Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Application Virtualization Client|
Initialized client log (C:\ProgramData\Microsoft\Application Virtualization Client\sftlog.txt)
|English: Request a translation of the event description in plain English.|
This event simply indicates that the Application Virtualization Client log has been initialized (so now it is ready to record whatever messages the application needs to write in it). It typically indicates the restart of the client. The log file for the Application Virtualization (App-V) Client captures detailed information about operations and error conditions. You can use it when you are verifying functionality and when you are troubleshooting issues.
This event, in itself, is not a problem, but the fact that the client is restarted when it shouldn't be may be one of the consequences of a problem with the system. Look for other, more relevant events that may point to the actual source of the error. The specified log itself, may contain clues about what is happening.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated