Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The COM+ sub system is suppressing duplicate event log entries for a duration of 86400 seconds. The suppression timeout can be controlled by a REG_DWORD value named SuppressDuplicateDuration under the following registry key: HKLM\Software\Microsoft\COM3\Eventlog.
|English: This information is only available to subscribers. An example of English, please!|
|Concepts to understand:|
What is a DWORD?
According to T774146 this event is "normal" and it does not indicate an error condition.
This event is similar with Event ID 4625 and 10026. Please see the comments for those events.
|Private comment: Subscribers only. See example of private comment|
|Links: Event ID 4625, Event ID 10026|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated