Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The ADC cannot replicate <object name> because it failed to map the entry. <connection agreement name>.
|English: Request a translation of the event description in plain English.|
We had to call Microsoft on this issue. The problem was that the administrator account of that domain, being used on the Connections tab of the ADC Connection Agreement, was not member of the Enterprise Admins group of the root domain. This did not cause any problems for the Users (Recipients) CA but was a problem for the Public Folders CA. You can also specify a root administrator on the Connections tab if that account is member of the local administrators group.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated