Solved

LDAP Operations

Posted on 2007-11-14
2
693 Views
Last Modified: 2013-11-30
what to do in order stop getting this error:

Event Type:      Error
Event Source:      MSExchangeAL
Event Category:      LDAP Operations
Event ID:      8270
Date:            11/13/2007
Time:            5:46:54 PM
User:            N/A
Computer:      UPSILON
Description:
LDAP returned the error [41] Object Class Violation when importing the transaction
dn: <GUID=9F1CA9F9961C8B46B94611914CA92952>
changetype: Modify
mail:sbd125@homefreesys.com
textEncodedORAddress:c=US;a= ;p=Dmatek;o=Exchange;s=xbd125;
proxyAddresses:X400:c=US;a= ;p=Dmatek;o=Exchange;s=xbd125;
: SMTP:sbd125@homefreesys.com
: smtp:sbd125@elmotech.co.il
: smtp:sbd125@dmatek.co.il
msExchPoliciesIncluded:add:{5F5DFFEF-A495-435C-B779-8166CDE6F075},{26491CFC-9E50-4857-861B-0CB8DF22B5D7}
msExchALObjectVersion:12
objectGUID:9F1CA9F9961C8B46B94611914CA92952
-
 DC=Dmatek,DC=com

For more information, click http://www.microsoft.com/contentredirect.asp.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0
Comment
Question by:Gil_Elul
2 Comments
 
LVL 23

Expert Comment

by:Stacy Spear
ID: 20278724
0
 
LVL 31

Accepted Solution

by:
LeeDerbyshire earned 500 total points
ID: 20279683
Your error message is mentioned here:
http://support.microsoft.com/kb/254030
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Follow this checklist to learn more about the 15 things you should never include in an email signature from personal quotes, animated gifs and out-of-date marketing content.
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
In this video we show how to create a Distribution Group in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >>…
In this video we show how to create an email address policy in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Mail Flow…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question