Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
ADC will not replicate entry '<object name>' to the Active directory because the target object '<object name>' should be administered using the Exchange Server 2000 administration snap-in only. Any changes applied to the object in the Exchange 5.5 directory will get over-written the next time the Active directory object replicates back to the Exchange 5.5 directory.<connection agreement name>.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Active Directory Connector (MSADC) ?
As per Microsoft: "This event indicates that the named (target) object should only be administered using the Exchange System Manager snap-in and not using the Exchange 5.5 Admin tool". See MSEX2K3DB for additional information about this event.
As per Microsoft: "This behavior may occur if certain users or distribution lists are explicitly granted permissions to create top-level public folders or are explicitly denied permissions to create top-level public folders on the Exchange Server 5.5 computer". See ME827618 to fix this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME827618, MSEX2K3DB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated