Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Comments for event ID 57 currently in the processing queue.

Note: We have not reviewed this information yet so it is unfiltered, exactly how it was submitted by our contributors.

Event ID: 57
Event Source: PureMessage
Event Type: Error
Event Description: Error code 0xC004012D in transport post categorization sink.
Comment:
Event ID: 57
Event Source: Outlook
Event Type: Information
Event Description: Deleting FTD persist message at PreRemove. Name: Inbox
Comment:
Event ID: 57
Event Source: truecrypt rev_7.0a
Event Type: Warning
Event Description: The description for Event ID ( 57 ) in Source ( truecrypt ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description see Help and Support for details. The following information is part of the event: \Device\True.
Comment: This warning message in the event log was issued shortly prior to a directory content write failure.  Truecrypt failed to record an altered directory.  Contents of the truecrypt encrypted container were lost.
Event ID: 57
Event Source: SharePoint Server Search
Event Type: Error
Event Description: Log Name:      Application
Source:        Microsoft-SharePoint Products-SharePoint Server Search
Event ID:      57
Task Category: Search service
Level:         Warning
Keywords:      
Description:
A database error occurred. Source: Microsoft SQL Server Native Client 10.0 Code: 1205 occurred 1 time(s) Description: Transaction (Process ID 75) was deadlocked on lock resources with another process and has been chosen as the deadlock victim. Rerun the transaction.

Context: Application ''Search_Service_Application''
Comment:
Event ID: 57
Event Source: hpqilo3
Event Type: -
Event Description: -
Comment: Server was converted physical to virtual P2V. As a VM, there is no iLO detected, which was causing the events. Fix was to uninstall unneeded HP drivers and software from the VM. Index: 10911

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...