Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The specified directory does not exist.
|English: Request a translation of the event description in plain English.|
Message generated by McAfee agents on servers. This message is generated even if logging is disabled or there is no limit for log files. We did manage to go around though, we used a brute force solution, just having a scheduled task to delete those log files daily. But please note that we had centralized logging in place (to the Management Edition) so those logs were not needed.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated