Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The DNS server has encountered a critical error from the Active Directory. Check that the Active Directory is functioning properly. The extended error debug information (which may be empty) is "00002095: SvcErr: DSID-03210A6A, problem 5012 (DIR_ERROR), data 16". The event data contains the error.
|English: Request a translation of the event description in plain English.|
ME969488 describes a situation when this event is recorded when running the Domain Name Service (DNS) role on a Read-Only Domain Controller (RODC) with the suggestion to move the DNS to a writable controller.
See also the comments for Event id 4015 from DNS (very similar with this).
|Private comment: Subscribers only. See example of private comment|
|Links: ME969488, Event id 4015 from DNS|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (1) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated