Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchangeIS Public|
The public information store /o=company/ou=Site/cn=Configuration/cn=Servers/cn= EXCHSRV01/cn=Microsoft Public MDB became the home information store of folder OFFLINE ADDRESS BOOK\EX:/o=Company/ou=Site\OAB Version 2.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Exchange Information Store service?
The recovery server, on which the information store was restored, did not have a copy of the folder from the production server. Therefore, when you run the directory service or information store checker on this computer, the directory service or information store checker does not have information about all of the other servers and mailboxes in the organization. As a result, the public folders are re-homed to the recovery server. In addition to re-homing the public folders, because a directory object for the public folders is not found in the folder on the recovery server, a new directory object is created for each re-homed public folder.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated