Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Starting the directory export.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
|Our approach: This information is only available to subscribers. An example of Our approach|
See the link to "Symantec Knowlegde Base Document ID: 2000012805390254" for information about this event.
Exchange does not do that by default. It is possible that an administrator configured an automatic directory export using the scheduler (at command) and admin.exe (the Exchange Administrator program).
|Private comment: Subscribers only. See example of private comment|
|Links: Symantec Knowlegde Base Document ID: 2000012805390254|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated