Event Id | 4099 |
Source | AdsmClientService |
Description | ANS4987E Error processing \\mikedile\e$\tsm520c\client\winnt\mak \dsmwin32.ncb: the object is in use by another process. |
Event Information | According to News Group: The TSM client manual or messages manual should be updated to show the different 4xxx messages that the TSM client can send to the Windows Event logs. The TSM client manual or messages manual should be updated to show the different 4xxx messages that the TSM client can send to the Windows Event logs. The manual should show the Possible Event log # and Associated text. --------------------------------------------------------------------------------------------- The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event: Error Opening Registry Path 'SYSTEM\CurrentControlSet\Services\TSM Client Acceptor\Parameters' ---------------------------------------------------------------------------------------------We have a similar error with the following description: "The scheduler couldn’t validate the generated password for node ---------------------------------------------------------------------------------------------This error indicates that one of our temporary files was deleted between when Tivoli Storage Manager (TSM) processed the BES Client\__BESData directory and when it backed it up. It is normal for there to be many temporary and frequently changing files in the __BESData directory, so it is not very useful to back this data up. I would recommend putting an exclude in place to prevent TSM from processing and backing up this directory and subdirectories using the following syntax in your TSM config file (dsm.opt): exclude.dir "c:\Program Files\BigFix Enterprise\BES Client\__BESData" |
Reference Links | Event logs errors that the TSM client can create |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.