Event Id | 257 |
Source | Alert Manager Event Interface |
Description | Alert Manager Event Interface: Alert Manager Event Interface unable to send alert to \\<server name>\pipe\AlertManager. Error returned = <error message> |
Event Information | Error message: "Access is denied." Cause: One of the following has occurred: (1) the file is marked read-only; (2) the resource, such as a file or subdirectory, that you tried to access is in use, or the named pipe, queue, or semaphore is a shared resource in use; (3) you tried to access a resource or to perform an action for which you do not have sufficient privilege; (4) the filename is incorrect. Resolution: Do one of the following, then retry the command: (1) use the Attrib command to change the read-only attribute; (2) try to access the resource again later; (3) log on with sufficient privilege; or (4) correct the filename. Error message: "The network path was not found." Cause: NetBIOS name resolution problem. If the name and IP adddress of a computer is obtained through WINS, this error may occur if the computer changed its IP address but the WINS records have not been updated. Resolution: Re-register the computer with WINS which will update the records (a reboot would do this). The local cache of NetBIOS names should also be cleared. Error message: "The system cannot find the file specified. " Cause: One of the following has occurred: (1) a required file does not exist (2) a file that a certain application depend on does not exist (i.e. an application may need appfile.dll library but this library requires app2file.dll which it cannot find) (3) the user may not have enough file permissions to access a specific file or its location or the file may be on the network and the user does not have the right to access resources over the network (typically happening for the SYSTEM account) (4) the file may the wrong version (or for the wrong operating system) (5) the file may be corrupted ar |
Reference Links |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.