Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The ADC cannot replicate <object name>. The site that the object belongs in is read only on the connected Exchange 5.5 Server. If another connection agreement can replicate this object to a 5.5 server in the correct site, then ignore this message. <connection agreement name>.
|English: Request a translation of the event description in plain English.|
As per Microsoft: "This event indicates that the Active Directory Connector (ADC) is unable to replicate the named object because the target Exchange 5.5 Server specified in the connection agreement properties considers the SITE (that this object belongs to) to be READ ONLY. In other words, when you look at the properties of the connection agreement (the name of which will also be mentioned in the DESCRIPTION section of this event), the Exchange Server specified therein does not have rights to WRITE TO the directory of the target SITE, because the target site is considered READ ONLY". See MSEX2K3DB for more details.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated