Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
A LDAP connection with domain controller <domain controller name> for domain <domain name> is established.
|English: Request a translation of the event description in plain English.|
In most cases, the description for this event is shown as:
The description for Event ID ( 5050 ) in Source ( IAS ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event: .<domain controller name>, <domain name>.
However, the event in itself is just an informational one confirming that the IAS was able to connect with the domain controller. The description is not displayed correctly because of a blunder from Microsoft in setting the proper event log message file for the IAS service (see the "What is the event source?" article).
|Private comment: Subscribers only. See example of private comment|
|Links: What is the event source?|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (1) - More links...|
Send comments or solutions
- Notify me when updated