Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: OCS WMI Event Provider|
The WMI event provider timer callback has failed to retrieve the settings of a class. Will retry again.
Class name: MSFT_SIPTrustedMCUSetting
Retry in 300000 milliseconds
Error Code: 80070005
|English: Request a translation of the event description in plain English.|
According to ME953112, this issue occurs if the Windows Management Instrumentation service is not restarted when the passwords are updated. When this service is not restarted, the Windows Management Instrumentation (WMI) provider is not updated with the new passwords. Because the WMI provider caches credentials, you will not see event ID 56013 in Event Viewer until the cache expires. It takes several days for the cache to expire. See the article for resolution.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated