Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The Microsoft Exchange Management service denied user "<user name>" access to "CN=xxxxCN=ServersCN=First Administrative GroupCN=Administrative GroupsCN=xxxxx xxxxx xxxxCN=Microsoft ExchangeCN=ServicesCN=ConfigurationDC=xxxxDC=xx" because the Access Control List (ACL) for it contained non-domain specific access control entries (ACE).
|English: Request a translation of the event description in plain English.|
This may indicate that the account used to perform Exchange management tasks was not an administrator. However, in many situations, the account is an administrator with (theoretically, at least) full rights to administer Exchange. One suggestion would be to run the Exchange Support Tool called ExchDump (see EV100138 for download location) and examine the results. It may provide clues to the source of the problem.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated