Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The full synchronization request from the server <server name> completed successfully. x object(s) has(have) been returned to the caller.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Netlogon share?
This problem can be caused if the following three conditions exist:
1."File and Object Access" auditing is enabled on the domain.
2.The Security Log on the PDC is full. The Security Log Settings on the primary domain controller default to "Maximum log size of 512 Kilobytes" and the Event Log Wrapping setting defaults to "Overwrite Events Older than 7 Days." The problem can also happen if the Event Log Wrapping setting is set to "Do Not Overwrite Events (Clear Log Manually)".
3.An application on the network is making multiple API calls in rapid succession to access SAM database information on the PDC.
See ME149664 and ME197985 for additional information about this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME149664, ME173882, ME197985|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated