.
This commit is contained in:
parent
8456ab06c4
commit
e727dc2f56
@ -99,7 +99,7 @@ Document Management Server
|
|||||||
Information Rights Management (IRM): An exception was thrown. Function Name:HrPdfIsProtected
|
Information Rights Management (IRM): An exception was thrown. Function Name:HrPdfIsProtected
|
||||||
Error Code: 0x80048018
|
Error Code: 0x80048018
|
||||||
|
|
||||||
Lösung : (Ignorieren !)
|
**Lösung :** (Ignorieren !)
|
||||||
I renamed the IrmProtectors registry key (@ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\15.0\) to "IrmProtectors-Renamed."
|
I renamed the IrmProtectors registry key (@ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\15.0\) to "IrmProtectors-Renamed."
|
||||||
|
|
||||||
better
|
better
|
||||||
@ -116,13 +116,13 @@ Errors:
|
|||||||
SSL policy errors have been encountered. Error code '0x2'..
|
SSL policy errors have been encountered. Error code '0x2'..
|
||||||
|
|
||||||
|
|
||||||
Lösung Zertifikat genau anschauen
|
**Lösung** Zertifikat genau anschauen
|
||||||
|
|
||||||
**Error 7557**
|
**Error 7557**
|
||||||
Secure Store Service
|
Secure Store Service
|
||||||
The Secure Store Service application Secure Store Service is not accessible. The full exception text is: Could not establish trust relationship for the SSL/TLS secure channel with authority 'de-bre01-shp012:32844'.
|
The Secure Store Service application Secure Store Service is not accessible. The full exception text is: Could not establish trust relationship for the SSL/TLS secure channel with authority 'de-bre01-shp012:32844'.
|
||||||
|
|
||||||
Lösung:
|
**Lösung:**
|
||||||
IIS KOnfiguration prüfen unter Sharepoint SWeb Services
|
IIS KOnfiguration prüfen unter Sharepoint SWeb Services
|
||||||
|
|
||||||
|
|
||||||
@ -138,6 +138,10 @@ Active Endpoints: 1
|
|||||||
Failed Endpoints:1
|
Failed Endpoints:1
|
||||||
Affected Endpoint: https://de-bre01-shp011:32844/63cab450498c4487a5440cebdac534fc/SecureStoreService.svc/https
|
Affected Endpoint: https://de-bre01-shp011:32844/63cab450498c4487a5440cebdac534fc/SecureStoreService.svc/https
|
||||||
|
|
||||||
|
**Lösung :**
|
||||||
|
|
||||||
|
gehört zu Fehler davor
|
||||||
|
|
||||||
|
|
||||||
**Error 8100**
|
**Error 8100**
|
||||||
SharePoint Server MySiteProvsioning
|
SharePoint Server MySiteProvsioning
|
||||||
@ -150,12 +154,29 @@ Mysite provisioning failed for user:[ZECH-GROUP\MRitter] with correlationid:[4eb
|
|||||||
at Microsoft.Office.Server.SiteProvisioning.SiteProvisioningManager`1.CreateSiteCore(Uri absoluteUri, DateTime creationStartDateTimeUTC, Double& preProvElevatedChecksMillisec, Double& getElevatedRootSiteMillisec, Double& monitoringUpdatesMillisec)
|
at Microsoft.Office.Server.SiteProvisioning.SiteProvisioningManager`1.CreateSiteCore(Uri absoluteUri, DateTime creationStartDateTimeUTC, Double& preProvElevatedChecksMillisec, Double& getElevatedRootSiteMillisec, Double& monitoringUpdatesMillisec)
|
||||||
at Microsoft.Office.Server.SiteProvisioning.SiteProvisioningManager`1.<>c__DisplayClass9.<CreateSite>b__1()]
|
at Microsoft.Office.Server.SiteProvisioning.SiteProvisioningManager`1.<>c__DisplayClass9.<CreateSite>b__1()]
|
||||||
|
|
||||||
|
**Lösung :**
|
||||||
|
|
||||||
|
prüfe schritte von https://www.sharepointdiary.com/2016/12/configure-my-sites-in-sharepoint-2016-step-by-step.html#ixzz5jV6vlJA3
|
||||||
|
|
||||||
|
|
||||||
**Error 10031**
|
**Error 10031**
|
||||||
COMRuntime
|
COMRuntime
|
||||||
An unmarshaling policy check was performed when unmarshaling a custom marshaled object and the class {45FB4600-E6E8-4928-B25E-50476FF79425} was rejected
|
An unmarshaling policy check was performed when unmarshaling a custom marshaled object and the class {45FB4600-E6E8-4928-B25E-50476FF79425} was rejected
|
||||||
|
|
||||||
|
**Lösung : Ignorieren oder aber ->**
|
||||||
|
Here's a possible fix for your error:
|
||||||
|
|
||||||
|
1.Start by identifying which process or service is triggering this error.
|
||||||
|
|
||||||
|
2.Check Task Manager for the process ID 5708 (in the above sample, but will probably be different when you go back to check).
|
||||||
|
|
||||||
|
3.Check which identity that process or service is running as. Task Manager will also show you this in the User column. If it is a service, you can check Service Manager to see which identity it is configured to run as.
|
||||||
|
|
||||||
|
4.Once you have identified the user or service account that this process uses, make a note of it and head to Registry Editor.
|
||||||
|
|
||||||
|
5.Search the registry for the class GUID. For each instance found, change the permissions to grant the above service account and the SYSTEM identity FULL privilege to the key and its subkeys. (I have seen suggestions to add Administrators here as well, but it's best to target this to the specific service account, if possible.)
|
||||||
|
|
||||||
|
6.Once your process identity has permissions on the class key[s], reboot the system, and it should be resolved.
|
||||||
|
|
||||||
|
|
||||||
## de-bre01-shp012
|
## de-bre01-shp012
|
||||||
|
Loading…
Reference in New Issue
Block a user