Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS ISAM|
<process name> (<PID>) The database engine is initiating index cleanup of database "<name>" as a result of a Windows version upgrade from <value>.<value>.<value> SP<number> to <value>.<value>.<value}>SP<number>. This message is informational and does not indicate a problem in the database.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is NTDS and what are the roles of its components?
What is the role of the NTDS.dit file?
See the link to "EventID 609 from source ESE98" for information about this event.
|Private comment: Subscribers only. See example of private comment|
|Links: EventID 609 from source ESE98|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated