Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The computer <computer> tried to connect to the server <server> using the trust relationship established by the <domain> domain. However, the computer lost the correct security identifier (SID) when the domain was reconfigured. Reestablish the trust relationship.
|English: Request a translation of the event description in plain English.|
As per Microsoft: "When a Windows 2000 computer joins a domain, it obtains the domain SID from the domain controller. The computer retains the SID in its local security database. Remove and then add the computer to the domain again". See the link to "Event 5513 from source NetLogon" for more details.
According to Microsoft, either Windows 2000 did not install properly or the local security database is corrupted on your computer. See MSW2KDB for more details on this issue.
|Private comment: Subscribers only. See example of private comment|
|Links: Event 5513 from source NetLogon, MSW2KDB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated