Event Id | 0 |
Source | VCS_AGFW |
Description | The description for Event ID ( 0 ) in Source ( VCS_AGFW ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. The following information is part of the event: NIC:Msdtc_grp-NIC:monitor:Failed to get IFEntry for adapter <MAC ADDRESS> |
Event Information | According To Veritas: RESOLUTION: These messages are the result of a missing registry entry that tells the Event Viewer service how to handle these events from the agent framework. This issue has been identified by Symantec Engineering and will be fixed in an upcoming release of the product. To allow these messages to be translated correctly, follow these steps: 1. Open regedit 2. Navigate to the following key: HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Services->EventLog->Application: 3. Create a new key VCS_AGFW 4. Create a new Expandable String Value with the name EventMessageFile. Set the value to point to the agent framework DLL i.e. vcsagfw.dll (usually located in %VCS_ROOT%\Cluster Server\bin\) Example: %VCS_ROOT%\Cluster Server\bin\vcsagfw.dll 5. Create a new DWORD value with the name TypesSupported. Set the value to 7 in HEX 6. Reboot the node for the changes to take effect If Global Cluster Option (GCO) is used, then a new key for the GCO Heartbeat framework has to be added. Use the following steps to add it: 1. Open regedit 2. Navigate to the following key: HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Services->EventLog->Application: 3. Create a new key VCS_HBAGFW 4. Create a new Expandable String Value with the name EventMessageFile. Set the value to point to the HBAgent framework DLL i.e. vcshbagfw.dll (usually located in %VCS_ROOT%\Cluster Server\bin\) Example: %VCS_ROOT%\Cluster Server\bin\hb\vcshbagfw.dll 5. Create a new DWORD value with the name TypesSupported. Set the value to 7 in HEX 6. Reboot the node for the changes to take effect |
Reference Links | More Information..: |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.