Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchangeIS Public|
The users that were not valid have been removed from the access control list of public folder <public folder name>.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Exchange Information Store service?
What is an Exchange public folder?
The recovery server, on which the information store was restored, did not have a copy of the folder from the production server. Therefore, when you run the directory service or information store checker on this computer, the directory service or information store checker does not have information about all of the other servers and mailboxes in the organization. As a result, the public folders are re-homed to the recovery server. In addition to re-homing the public folders, because a directory object for the public folders is not found in the folder on the recovery server, a new directory object is created for each re-homed public folder.
For more information about this situation, see ME264317.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated