Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Enterprise Vault|
A COM error occurred.
Catastrophic failure [0x8000ffff]
Internal reference: CRSS GetIndexServer
|English: Request a translation of the event description in plain English.|
There are several factors which can contribute to these types of errors/symptoms, some include the following:
- Improper registry keys
- Out of date or poorly written NIC drivers
- NIC Teaming
- NIC Bindings
- OS patches or service packs which have made changes to TCP/IP settings
- TCP Chimney Offload and/or TCP/IP Offload Engine (TOE) are enabled (See Related Documents at bottom of this article)
- I/O degradation on indexing storage device
- Size of Index
- Schema Type of Index
See EV100101 (Symantec Article: TECH62307) for troubleshooting information.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated