Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The full synchronization replication of the LSA database from the primary domain controller <server name> failed with the following error: The system cannot find the file specified.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the LSA?
What is the role of the Netlogon share?
As per Microsoft: "The specified server is down or was restarted. Or, this indicates that an illegal operation has been attempted on a reserved (built-in) Security Accounts Manager (SAM) account". See MSW2KDB for additional information about this event.
See ME326975 for a hotfix applicable to Microsoft Windows Server 2003.
Also, check ME271998 and ME297002 for more details on this warning.
For Windows NT Server 4.0 (Terminal Server Edition) this error can occur if the Security hive has become corrupted. See ME297427 for solution.
|Private comment: Subscribers only. See example of private comment|
|Links: ME271998, ME297002, ME297427, ME326975, MSW2KDB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated