Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Could not locate the export container <value>. Make sure that the configured container exists, or that the account in the Connection Agreement has permissions to access the container. Replication stopped for this Connection Agreement.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Active Directory Connector (MSADC) ?
According to Microsoft, this event can occur during replication of a connection agreement, and will usually be preceded or succeeded by an Event ID 8124. This event indicates that the Active Directory Connector (ADC) could not find an export container specified in the properties of the Config CA or Recipient CA. See MSEX2K3DB and ME319889 for information about this event.
Elliott Fields Jr
Use the ADSI Editor to check the following attributes on the config_ca and make sure that the specified containers exist and are spelled correctly. The object is located at CN=Config_ca_sitename, CN=Active Directory Connections, CN=Microsoft Exchange, CN=Services, CN=Configuration, DC=domain:
|Private comment: Subscribers only. See example of private comment|
|Links: ME319889, MSEX2K3DB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated