Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
ADC will not replicate from <object name> to <object name> because both objects are not mailboxenabled. The source object is a mailbox. The target object is either aContact or a mail enabled user. If this is a problem, consider making theConnection Agreement an Inter-Organizational Connection Agreement.<connection agreement name>.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Active Directory Connector (MSADC) ?
This issue may occur if the Windows 2000 account already has an e-mail address associated with it. See ME278614 to fix this problem.
As per Microsoft: "This event indicates that the Active Directory Connector (ADC) found a target object that was already enabled for mail or mailbox when trying to replicate an object from the source directory". See MSEX2K3DB for additional information about this event.
See ME283275 for details on fixing this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME278614, ME283275, MSEX2K3DB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated