Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The store C:\Documents and Settings\<user name>\Local Settings\Application Data\Microsoft\Outlook\outlook.ost has detected a catalog checkpoint.
|English: This information is only available to subscribers. An example of English, please!|
A catalog checkpoint means that Outlook reached a point where it has to save all the information stored in memory into the actual PST/OST file (to do a checkpoint) so at that point in time the PST/OST file contains up-to-date information. The checkpoint appears to be triggered by the Windows Search engine - basically the search engine is asking Outlook to update the PST/OST file with whatever it has in cache in order to be able to parse and index the content of that file. The event is "information" level only as this is not a problem (but sometimes the whole operation seems to fail and further event errors are recorded).
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated