Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
A <name> message was received from the <name> gateway on session index <value>. [<value> <value> <value> <value>] (8).
|English: Request a translation of the event description in plain English.|
When maximum logging is turned on, this informational event will be seen. This is the result of debug code not being removed by the original programmers. The code was placed there to track events from 5.5 servers to E2K. MTA is not active in E2K exclusive environments, so logging MTA events in an E2K only environment will result in erroneous informational messages.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated