Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Information Store (<PID>) An attempt to move the file "<path to file>\<file>" to "<path to file>\<file>" failed with system error <error> (<error code>): "<error details>". The move file operation will fail with error <error> (<error code>).
|English: Request a translation of the event description in plain English.|
See ME896143 and the link to "EventID 486 from source ESE98" for information on this event.
Ruth Ogletree Morton
-Error: 1811 - Check to see if this is accompanied by an Antivirus message saying that your <file> has been quarantined. If so change your real-time file scanning antivirus configuration to exclude the Exchange log directory (there are also a list of other files and directories that should be excluded - see ME328841). Release the <file> from quarantine and start your Exchange stores. If you are running an Exchange aware antivirus solution on the same server it should deal appropriately with any virus that hit your logs without interrupting service so your non-Exchange aware antivirus program doesn’t need to scan this area ever. See the link to Error code 1811 for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: ME328841, ME896143, Error code 0x5, Error code 1022, Error code 1811, EventID 486 from source ESE98|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated