Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Microsoft Office 12 Sessions|
The description for Event ID ( 7000 ) in Source ( Microsoft Office 12 Sessions ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event: 0, Microsoft Office Word, 12.0.4518.1014, 12.0.4518.1014, 144, 0.
|English: Request a translation of the event description in plain English.|
The event description should actually read as follows:
ID: 0 Application Name: Microsoft Office Word Application Version: 12.0.4518.1014 Microsoft Office Version: 12.0.4518.1014. This session lasted 144 seconds with 0 seconds of active time. This session ended normally.
However, some version of Office do not install properly the event log files so the event is not displayed correctly.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated