Event Id | 3034 |
Source | Microsoft-Windows-Search |
Description | The registry version does not match with the expected <%2>, or the registry cannot be accessed because the service account does not have the correct permissions. Uninstall the previous version before installing the new one.%1 |
Event Information | According to Microsoft : Cause : This event is logged when the registry version does not match and it cannot be accessed. Resolution : Reinstall Indexing Service Note: To perform this procedure, you must have membership inAdministrators, or you must have been delegated the appropriate authority. To reinstall Indexing Service: 1.Click Start and then clickControl Panel. 2.InClassic View of the Control panel, double-clickPrograms and Features. 3.In the left pane, clickTurn Windows features on or off. 4.If theUser Account Control dialog box appears, confirm that the action it displays is what you want, and then clickContinue. 5.Clear theIndexing Service check box, and then clickOK. 6.When prompted to restart the computer, clickRestart Now. 7.After the computer restarts, clickStart and then clickControl Panel. 8.Double-clickPrograms and Features. 9.Click Turn Windows features on or off. 10.If theUser Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue. 11.Select theIndexing Servicecheck box, and then clickOK. 12.When prompted to restart the computer, clickRestart Now. Verify : To verify that files are being indexed: 1.ClickStart and then clickRun. 2.In theRun dialog box, typenotepad.exe. Notepad should open. 3.Type an unusual keyword or phrase in the new document, and then save the file to your My Documents directory or to another directory that is being indexed. 4.ClickStart, and then type your new keyword or phrase in theSearch box. The file you created using Notepad should appear in the Search Results window. |
Reference Links | Event ID 3034 from Source Microsoft-Windows-Search |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.