Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchange Common|
Removal of privileges from process "c:\windows\system32\inetsrv\w3wp.exe" (PID=7368, LABEL=MSExchangeOWAAppPool) failed with error code 0x80070005.
|English: Request a translation of the event description in plain English.|
This event may be recorded when you try to browse OWA on SBS. According to ME970445, this issue may occur if the 'Physical Path Credentials' attribute on the Advanced Settings of OWA virtual directory is using a specific user account. See the article for a suggested fix.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated