Jump to content

Event 1202 Warnings after Renaming Administrator Account on SBS200


Recommended Posts

Posted

As a security measure, I manually renamed the Administrator account on an SBS

2003 Premium R2 server. Since then, I have been receiving the following

Event 1202 warnings every 5 minutes in the Application Event Log:

----------------------------------------------------------------------------------

Event Type: Warning

Event Source: SceCli

Event Category: None

Event ID: 1202

Date: 16/02/2008

Time: 2:45:57 PM

User: N/A

Computer: BVEPDCEX01

Description:

Security policies were propagated with warning. 0x534 : No mapping between

account names and security IDs was done.

 

Advanced help for this problem is available on http://support.microsoft.com.

Query for "troubleshooting 1202 events".

 

Error 0x534 occurs when a user account in one or more Group Policy objects

(GPOs) could not be resolved to a SID. This error is possibly caused by a

mistyped or deleted user account referenced in either the

 

User Rights or Restricted Groups branch of a GPO. To resolve this event,

contact an administrator in the domain to perform the following actions:

 

1. Identify accounts that could not be resolved to a SID:

 

From the command prompt, type: FIND /I "Cannot find"

%SYSTEMROOT%\Security\Logs\winlogon.log

 

The string following "Cannot find" in the FIND output identifies the problem

account names.

 

Example: Cannot find JohnDough.

 

In this case, the SID for username "JohnDough" could not be determined. This

most likely occurs because the account was deleted, renamed, or is spelled

differently (e.g. "JohnDoe").

 

2. Use RSoP to identify the specific User Rights, Restricted Groups, and

Source GPOs that contain the problem accounts:

 

a. Start -> Run -> RSoP.msc

b. Review the results for Computer Configuration\Windows Settings\Security

Settings\Local Policies\User Rights Assignment and Computer

Configuration\Windows Settings\Security Settings\Local

 

Policies\Restricted Groups for any errors flagged with a red X.

c. For any User Right or Restricted Group marked with a red X, the

corresponding GPO that contains the problem policy setting is listed under

the column entitled "Source GPO". Note the specific User

 

Rights, Restricted Groups and containing Source GPOs that are generating

errors.

 

3. Remove unresolved accounts from Group Policy

 

a. Start -> Run -> MMC.EXE

b. From the File menu select "Add/Remove Snap-in..."

c. From the "Add/Remove Snap-in" dialog box select "Add..."

d. In the "Add Standalone Snap-in" dialog box select "Group Policy" and

click "Add"

e. In the "Select Group Policy Object" dialog box click the "Browse" button.

f. On the "Browse for a Group Policy Object" dialog box choose the "All" tab

g. For each source GPO identified in step 2, correct the specific User

Rights or Restricted Groups that were flagged with a red X in step 2. These

User Rights or Restricted Groups can be corrected by removing or correcting

any references to the problem accounts that were identified in step 1.

 

For more information, see Help and Support Center at

http://go.microsoft.com/fwlink/events.asp.

---------------------------------------------------------------------------------

 

I have stepped through the foregoing process and found the following Policy

setting flagged in the Default Domain Controllers Policy: "Impersonate a

client after authentication". I am also seeing Event ID Errors 107 & 1085 in

the Application log relating to Desktop folder redirection - these errors

appear to be related.

 

I am able to successfully logon using the renamed Administrator account and

perform tasks. My Administrator documents successfully replicated to the

renamed account.

 

What steps can I take to resolve these issues? Do I need to restore the

Administrator account temporarily and redo the rename using another process?

 

Please advise. Thanks!

  • Replies 9
  • Created
  • Last Reply
Guest Anthony [MVP]
Posted

Re: Event 1202 Warnings after Renaming Administrator Account on SBS200

 

You get this error when the specific account name that no longer exists (in

your case Administrator) is referenced in a policy. This is typically a User

Rights Assignment or a Restricted Groups policy. You need to find the policy

and change the name of the account referenced from Administrator to whatever

you renamed it as.

You might want to ask in the SBS groups for anything specific to SBS,

Anthony,

http://www.airdesk.co.uk

 

 

 

 

 

 

"Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

> As a security measure, I manually renamed the Administrator account on an

> SBS

> 2003 Premium R2 server. Since then, I have been receiving the following

> Event 1202 warnings every 5 minutes in the Application Event Log:

> ----------------------------------------------------------------------------------

> Event Type: Warning

> Event Source: SceCli

> Event Category: None

> Event ID: 1202

> Date: 16/02/2008

> Time: 2:45:57 PM

> User: N/A

> Computer: BVEPDCEX01

> Description:

> Security policies were propagated with warning. 0x534 : No mapping between

> account names and security IDs was done.

>

> Advanced help for this problem is available on

> http://support.microsoft.com.

> Query for "troubleshooting 1202 events".

>

> Error 0x534 occurs when a user account in one or more Group Policy objects

> (GPOs) could not be resolved to a SID. This error is possibly caused by a

> mistyped or deleted user account referenced in either the

>

> User Rights or Restricted Groups branch of a GPO. To resolve this event,

> contact an administrator in the domain to perform the following actions:

>

> 1. Identify accounts that could not be resolved to a SID:

>

> From the command prompt, type: FIND /I "Cannot find"

> %SYSTEMROOT%\Security\Logs\winlogon.log

>

> The string following "Cannot find" in the FIND output identifies the

> problem

> account names.

>

> Example: Cannot find JohnDough.

>

> In this case, the SID for username "JohnDough" could not be determined.

> This

> most likely occurs because the account was deleted, renamed, or is spelled

> differently (e.g. "JohnDoe").

>

> 2. Use RSoP to identify the specific User Rights, Restricted Groups, and

> Source GPOs that contain the problem accounts:

>

> a. Start -> Run -> RSoP.msc

> b. Review the results for Computer Configuration\Windows Settings\Security

> Settings\Local Policies\User Rights Assignment and Computer

> Configuration\Windows Settings\Security Settings\Local

>

> Policies\Restricted Groups for any errors flagged with a red X.

> c. For any User Right or Restricted Group marked with a red X, the

> corresponding GPO that contains the problem policy setting is listed under

> the column entitled "Source GPO". Note the specific User

>

> Rights, Restricted Groups and containing Source GPOs that are generating

> errors.

>

> 3. Remove unresolved accounts from Group Policy

>

> a. Start -> Run -> MMC.EXE

> b. From the File menu select "Add/Remove Snap-in..."

> c. From the "Add/Remove Snap-in" dialog box select "Add..."

> d. In the "Add Standalone Snap-in" dialog box select "Group Policy" and

> click "Add"

> e. In the "Select Group Policy Object" dialog box click the "Browse"

> button.

> f. On the "Browse for a Group Policy Object" dialog box choose the "All"

> tab

> g. For each source GPO identified in step 2, correct the specific User

> Rights or Restricted Groups that were flagged with a red X in step 2.

> These

> User Rights or Restricted Groups can be corrected by removing or

> correcting

> any references to the problem accounts that were identified in step 1.

>

> For more information, see Help and Support Center at

> http://go.microsoft.com/fwlink/events.asp.

> ---------------------------------------------------------------------------------

>

> I have stepped through the foregoing process and found the following

> Policy

> setting flagged in the Default Domain Controllers Policy: "Impersonate a

> client after authentication". I am also seeing Event ID Errors 107 & 1085

> in

> the Application log relating to Desktop folder redirection - these errors

> appear to be related.

>

> I am able to successfully logon using the renamed Administrator account

> and

> perform tasks. My Administrator documents successfully replicated to the

> renamed account.

>

> What steps can I take to resolve these issues? Do I need to restore the

> Administrator account temporarily and redo the rename using another

> process?

>

> Please advise. Thanks!

Posted

Event 1202 Warnings after Renaming Administrator Account on SBS200

 

Hi Anthony,

 

Thank you for posting this reply. The policy setting flagged under the

Default Domain Controller's Policy is "Impersonate a client after

authentication". I'm not exactly certain of the purpose of this policy

setting/User Rights Assignment and the default setting for SBS2003. Since

I'm relatively new to SBS2003, I need to know the basic steps necessary to

change the account name to which this policy setting/User Rights Assignment

applies?

 

I originally intended to post this question under the SBS group. However, I

chose this group after noticing a considerable number of "spam" postings

under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.] yesterday.

This group appears to be much better moderated.

 

Cheers!

 

"Anthony [MVP]" wrote:

> You get this error when the specific account name that no longer exists (in

> your case Administrator) is referenced in a policy. This is typically a User

> Rights Assignment or a Restricted Groups policy. You need to find the policy

> and change the name of the account referenced from Administrator to whatever

> you renamed it as.

> You might want to ask in the SBS groups for anything specific to SBS,

> Anthony,

> http://www.airdesk.co.uk

>

>

>

>

>

>

> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

> > As a security measure, I manually renamed the Administrator account on an

> > SBS

> > 2003 Premium R2 server. Since then, I have been receiving the following

> > Event 1202 warnings every 5 minutes in the Application Event Log:

> > ----------------------------------------------------------------------------------

> > Event Type: Warning

> > Event Source: SceCli

> > Event Category: None

> > Event ID: 1202

> > Date: 16/02/2008

> > Time: 2:45:57 PM

> > User: N/A

> > Computer: BVEPDCEX01

> > Description:

> > Security policies were propagated with warning. 0x534 : No mapping between

> > account names and security IDs was done.

> >

> > Advanced help for this problem is available on

> > http://support.microsoft.com.

> > Query for "troubleshooting 1202 events".

> >

> > Error 0x534 occurs when a user account in one or more Group Policy objects

> > (GPOs) could not be resolved to a SID. This error is possibly caused by a

> > mistyped or deleted user account referenced in either the

> >

> > User Rights or Restricted Groups branch of a GPO. To resolve this event,

> > contact an administrator in the domain to perform the following actions:

> >

> > 1. Identify accounts that could not be resolved to a SID:

> >

> > From the command prompt, type: FIND /I "Cannot find"

> > %SYSTEMROOT%\Security\Logs\winlogon.log

> >

> > The string following "Cannot find" in the FIND output identifies the

> > problem

> > account names.

> >

> > Example: Cannot find JohnDough.

> >

> > In this case, the SID for username "JohnDough" could not be determined.

> > This

> > most likely occurs because the account was deleted, renamed, or is spelled

> > differently (e.g. "JohnDoe").

> >

> > 2. Use RSoP to identify the specific User Rights, Restricted Groups, and

> > Source GPOs that contain the problem accounts:

> >

> > a. Start -> Run -> RSoP.msc

> > b. Review the results for Computer Configuration\Windows Settings\Security

> > Settings\Local Policies\User Rights Assignment and Computer

> > Configuration\Windows Settings\Security Settings\Local

> >

> > Policies\Restricted Groups for any errors flagged with a red X.

> > c. For any User Right or Restricted Group marked with a red X, the

> > corresponding GPO that contains the problem policy setting is listed under

> > the column entitled "Source GPO". Note the specific User

> >

> > Rights, Restricted Groups and containing Source GPOs that are generating

> > errors.

> >

> > 3. Remove unresolved accounts from Group Policy

> >

> > a. Start -> Run -> MMC.EXE

> > b. From the File menu select "Add/Remove Snap-in..."

> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

> > d. In the "Add Standalone Snap-in" dialog box select "Group Policy" and

> > click "Add"

> > e. In the "Select Group Policy Object" dialog box click the "Browse"

> > button.

> > f. On the "Browse for a Group Policy Object" dialog box choose the "All"

> > tab

> > g. For each source GPO identified in step 2, correct the specific User

> > Rights or Restricted Groups that were flagged with a red X in step 2.

> > These

> > User Rights or Restricted Groups can be corrected by removing or

> > correcting

> > any references to the problem accounts that were identified in step 1.

> >

> > For more information, see Help and Support Center at

> > http://go.microsoft.com/fwlink/events.asp.

> > ---------------------------------------------------------------------------------

> >

> > I have stepped through the foregoing process and found the following

> > Policy

> > setting flagged in the Default Domain Controllers Policy: "Impersonate a

> > client after authentication". I am also seeing Event ID Errors 107 & 1085

> > in

> > the Application log relating to Desktop folder redirection - these errors

> > appear to be related.

> >

> > I am able to successfully logon using the renamed Administrator account

> > and

> > perform tasks. My Administrator documents successfully replicated to the

> > renamed account.

> >

> > What steps can I take to resolve these issues? Do I need to restore the

> > Administrator account temporarily and redo the rename using another

> > process?

> >

> > Please advise. Thanks!

>

>

>

Guest Anthony [MVP]
Posted

Re: Event 1202 Warnings after Renaming Administrator Account on SBS200

 

I would actually just name it back, and give it a nice long and secure

password. Renaming is of little value. I'm not sure that renaming an account

would cause this error anyway.

What result do you get for Step 1 in the recommended steps?

Anthony

http://www.airdesk.com

 

 

"Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

> Hi Anthony,

>

> Thank you for posting this reply. The policy setting flagged under the

> Default Domain Controller's Policy is "Impersonate a client after

> authentication". I'm not exactly certain of the purpose of this policy

> setting/User Rights Assignment and the default setting for SBS2003. Since

> I'm relatively new to SBS2003, I need to know the basic steps necessary to

> change the account name to which this policy setting/User Rights

> Assignment

> applies?

>

> I originally intended to post this question under the SBS group. However,

> I

> chose this group after noticing a considerable number of "spam" postings

> under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

> yesterday.

> This group appears to be much better moderated.

>

> Cheers!

>

> "Anthony [MVP]" wrote:

>

>> You get this error when the specific account name that no longer exists

>> (in

>> your case Administrator) is referenced in a policy. This is typically a

>> User

>> Rights Assignment or a Restricted Groups policy. You need to find the

>> policy

>> and change the name of the account referenced from Administrator to

>> whatever

>> you renamed it as.

>> You might want to ask in the SBS groups for anything specific to SBS,

>> Anthony,

>> http://www.airdesk.co.uk

>>

>>

>>

>>

>>

>>

>> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

>> > As a security measure, I manually renamed the Administrator account on

>> > an

>> > SBS

>> > 2003 Premium R2 server. Since then, I have been receiving the

>> > following

>> > Event 1202 warnings every 5 minutes in the Application Event Log:

>> > ----------------------------------------------------------------------------------

>> > Event Type: Warning

>> > Event Source: SceCli

>> > Event Category: None

>> > Event ID: 1202

>> > Date: 16/02/2008

>> > Time: 2:45:57 PM

>> > User: N/A

>> > Computer: BVEPDCEX01

>> > Description:

>> > Security policies were propagated with warning. 0x534 : No mapping

>> > between

>> > account names and security IDs was done.

>> >

>> > Advanced help for this problem is available on

>> > http://support.microsoft.com.

>> > Query for "troubleshooting 1202 events".

>> >

>> > Error 0x534 occurs when a user account in one or more Group Policy

>> > objects

>> > (GPOs) could not be resolved to a SID. This error is possibly caused

>> > by a

>> > mistyped or deleted user account referenced in either the

>> >

>> > User Rights or Restricted Groups branch of a GPO. To resolve this

>> > event,

>> > contact an administrator in the domain to perform the following

>> > actions:

>> >

>> > 1. Identify accounts that could not be resolved to a SID:

>> >

>> > From the command prompt, type: FIND /I "Cannot find"

>> > %SYSTEMROOT%\Security\Logs\winlogon.log

>> >

>> > The string following "Cannot find" in the FIND output identifies the

>> > problem

>> > account names.

>> >

>> > Example: Cannot find JohnDough.

>> >

>> > In this case, the SID for username "JohnDough" could not be determined.

>> > This

>> > most likely occurs because the account was deleted, renamed, or is

>> > spelled

>> > differently (e.g. "JohnDoe").

>> >

>> > 2. Use RSoP to identify the specific User Rights, Restricted Groups,

>> > and

>> > Source GPOs that contain the problem accounts:

>> >

>> > a. Start -> Run -> RSoP.msc

>> > b. Review the results for Computer Configuration\Windows

>> > Settings\Security

>> > Settings\Local Policies\User Rights Assignment and Computer

>> > Configuration\Windows Settings\Security Settings\Local

>> >

>> > Policies\Restricted Groups for any errors flagged with a red X.

>> > c. For any User Right or Restricted Group marked with a red X, the

>> > corresponding GPO that contains the problem policy setting is listed

>> > under

>> > the column entitled "Source GPO". Note the specific User

>> >

>> > Rights, Restricted Groups and containing Source GPOs that are

>> > generating

>> > errors.

>> >

>> > 3. Remove unresolved accounts from Group Policy

>> >

>> > a. Start -> Run -> MMC.EXE

>> > b. From the File menu select "Add/Remove Snap-in..."

>> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

>> > d. In the "Add Standalone Snap-in" dialog box select "Group Policy" and

>> > click "Add"

>> > e. In the "Select Group Policy Object" dialog box click the "Browse"

>> > button.

>> > f. On the "Browse for a Group Policy Object" dialog box choose the

>> > "All"

>> > tab

>> > g. For each source GPO identified in step 2, correct the specific User

>> > Rights or Restricted Groups that were flagged with a red X in step 2.

>> > These

>> > User Rights or Restricted Groups can be corrected by removing or

>> > correcting

>> > any references to the problem accounts that were identified in step 1.

>> >

>> > For more information, see Help and Support Center at

>> > http://go.microsoft.com/fwlink/events.asp.

>> > ---------------------------------------------------------------------------------

>> >

>> > I have stepped through the foregoing process and found the following

>> > Policy

>> > setting flagged in the Default Domain Controllers Policy: "Impersonate

>> > a

>> > client after authentication". I am also seeing Event ID Errors 107 &

>> > 1085

>> > in

>> > the Application log relating to Desktop folder redirection - these

>> > errors

>> > appear to be related.

>> >

>> > I am able to successfully logon using the renamed Administrator account

>> > and

>> > perform tasks. My Administrator documents successfully replicated to

>> > the

>> > renamed account.

>> >

>> > What steps can I take to resolve these issues? Do I need to restore

>> > the

>> > Administrator account temporarily and redo the rename using another

>> > process?

>> >

>> > Please advise. Thanks!

>>

>>

>>

Posted

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Hi Anthony,

 

As I continue my investigations, I've learned that account settings are

retained in two locations - Active Directory and Global Policy. Evidently,

there is a correct procedure that uses Global Policy to rename the

Administrator account.

 

Apparently, I used an incorrect [manual] procedure to rename the

Administrator account that consisted of simply modifying the AD properties

and security settings on the Administrator profile to change ownership from

"Administrator" to "NewAdminName". I left the primary email address for

"NewAdminName" as "Administrator@MyDomain.com".

 

I have full access to the Administrator's "My Documents" folder via the

NewAdminName's "My Documents" folder. So at least that much is working.

However, on login, I am seeing a Folder Redirection Error [Event ID 107] that

tells me it failed to perform redirection of the folder Desktop. The folder

is configured to be redirected from

<\\bvepdcex01\users\Administrator\desktop> to

<\\bevpdcex01\users\NewAdminName\desktop>. The following error occurred:

Access is denied. For more information, see Help and Support Center at

http://go.microsoft.com/fqlink/events.asp.

 

This is followed by Userenv Error Event ID 1085 that tells me the following:

The Group Policy client-side extension Folder Redirection failed to execute.

Please look for any errors reported earlier by that extension. For more

information, see Help and Support Center at

http://go.microsoft.com/fwlink/events.asp.

 

When I perform Step One of the recommended steps below, I get the following:

C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

 

------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

Cannot find administrator.

 

C:\>

 

So, in short, I am seeking a couple of things from this:

1. The most effective way to eliminate these error messages/events while

retaining the NewAdminName for the primary Administrator account.

2. Specific guidance as to the "correct" procedure for renaming the

Administrator account so as to avoid this ordeal in the future.

 

Your suggestion for using a long passphrase for the Administrator account is

appreciated - it being much simpler to change a password than to rename an

account. However, subscribing to the "belt and suspenders" approach when it

comes to security, there is less likelihood of one being caught with their

pants down, so to speak, when the well known and targeted administrator

account is properly renamed and a complex passphrases are employed across the

board.

 

Cheers,

 

 

 

"Anthony [MVP]" wrote:

> I would actually just name it back, and give it a nice long and secure

> password. Renaming is of little value. I'm not sure that renaming an account

> would cause this error anyway.

> What result do you get for Step 1 in the recommended steps?

> Anthony

> http://www.airdesk.com

>

>

> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

> > Hi Anthony,

> >

> > Thank you for posting this reply. The policy setting flagged under the

> > Default Domain Controller's Policy is "Impersonate a client after

> > authentication". I'm not exactly certain of the purpose of this policy

> > setting/User Rights Assignment and the default setting for SBS2003. Since

> > I'm relatively new to SBS2003, I need to know the basic steps necessary to

> > change the account name to which this policy setting/User Rights

> > Assignment

> > applies?

> >

> > I originally intended to post this question under the SBS group. However,

> > I

> > chose this group after noticing a considerable number of "spam" postings

> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

> > yesterday.

> > This group appears to be much better moderated.

> >

> > Cheers!

> >

> > "Anthony [MVP]" wrote:

> >

> >> You get this error when the specific account name that no longer exists

> >> (in

> >> your case Administrator) is referenced in a policy. This is typically a

> >> User

> >> Rights Assignment or a Restricted Groups policy. You need to find the

> >> policy

> >> and change the name of the account referenced from Administrator to

> >> whatever

> >> you renamed it as.

> >> You might want to ask in the SBS groups for anything specific to SBS,

> >> Anthony,

> >> http://www.airdesk.co.uk

> >>

> >>

> >>

> >>

> >>

> >>

> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

> >> > As a security measure, I manually renamed the Administrator account on

> >> > an

> >> > SBS

> >> > 2003 Premium R2 server. Since then, I have been receiving the

> >> > following

> >> > Event 1202 warnings every 5 minutes in the Application Event Log:

> >> > ----------------------------------------------------------------------------------

> >> > Event Type: Warning

> >> > Event Source: SceCli

> >> > Event Category: None

> >> > Event ID: 1202

> >> > Date: 16/02/2008

> >> > Time: 2:45:57 PM

> >> > User: N/A

> >> > Computer: BVEPDCEX01

> >> > Description:

> >> > Security policies were propagated with warning. 0x534 : No mapping

> >> > between

> >> > account names and security IDs was done.

> >> >

> >> > Advanced help for this problem is available on

> >> > http://support.microsoft.com.

> >> > Query for "troubleshooting 1202 events".

> >> >

> >> > Error 0x534 occurs when a user account in one or more Group Policy

> >> > objects

> >> > (GPOs) could not be resolved to a SID. This error is possibly caused

> >> > by a

> >> > mistyped or deleted user account referenced in either the

> >> >

> >> > User Rights or Restricted Groups branch of a GPO. To resolve this

> >> > event,

> >> > contact an administrator in the domain to perform the following

> >> > actions:

> >> >

> >> > 1. Identify accounts that could not be resolved to a SID:

> >> >

> >> > From the command prompt, type: FIND /I "Cannot find"

> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

> >> >

> >> > The string following "Cannot find" in the FIND output identifies the

> >> > problem

> >> > account names.

> >> >

> >> > Example: Cannot find JohnDough.

> >> >

> >> > In this case, the SID for username "JohnDough" could not be determined.

> >> > This

> >> > most likely occurs because the account was deleted, renamed, or is

> >> > spelled

> >> > differently (e.g. "JohnDoe").

> >> >

> >> > 2. Use RSoP to identify the specific User Rights, Restricted Groups,

> >> > and

> >> > Source GPOs that contain the problem accounts:

> >> >

> >> > a. Start -> Run -> RSoP.msc

> >> > b. Review the results for Computer Configuration\Windows

> >> > Settings\Security

> >> > Settings\Local Policies\User Rights Assignment and Computer

> >> > Configuration\Windows Settings\Security Settings\Local

> >> >

> >> > Policies\Restricted Groups for any errors flagged with a red X.

> >> > c. For any User Right or Restricted Group marked with a red X, the

> >> > corresponding GPO that contains the problem policy setting is listed

> >> > under

> >> > the column entitled "Source GPO". Note the specific User

> >> >

> >> > Rights, Restricted Groups and containing Source GPOs that are

> >> > generating

> >> > errors.

> >> >

> >> > 3. Remove unresolved accounts from Group Policy

> >> >

> >> > a. Start -> Run -> MMC.EXE

> >> > b. From the File menu select "Add/Remove Snap-in..."

> >> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

> >> > d. In the "Add Standalone Snap-in" dialog box select "Group Policy" and

> >> > click "Add"

> >> > e. In the "Select Group Policy Object" dialog box click the "Browse"

> >> > button.

> >> > f. On the "Browse for a Group Policy Object" dialog box choose the

> >> > "All"

> >> > tab

> >> > g. For each source GPO identified in step 2, correct the specific User

> >> > Rights or Restricted Groups that were flagged with a red X in step 2.

> >> > These

> >> > User Rights or Restricted Groups can be corrected by removing or

> >> > correcting

> >> > any references to the problem accounts that were identified in step 1.

> >> >

> >> > For more information, see Help and Support Center at

> >> > http://go.microsoft.com/fwlink/events.asp.

> >> > ---------------------------------------------------------------------------------

> >> >

> >> > I have stepped through the foregoing process and found the following

> >> > Policy

> >> > setting flagged in the Default Domain Controllers Policy: "Impersonate

> >> > a

> >> > client after authentication". I am also seeing Event ID Errors 107 &

> >> > 1085

> >> > in

> >> > the Application log relating to Desktop folder redirection - these

> >> > errors

> >> > appear to be related.

> >> >

> >> > I am able to successfully logon using the renamed Administrator account

> >> > and

> >> > perform tasks. My Administrator documents successfully replicated to

> >> > the

> >> > renamed account.

> >> >

> >> > What steps can I take to resolve these issues? Do I need to restore

> >> > the

> >> > Administrator account temporarily and redo the rename using another

> >> > process?

> >> >

> >> > Please advise. Thanks!

> >>

> >>

> >>

>

>

>

Guest Anthony [MVP]
Posted

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Hi Dave,

In answer to your questions:

1) Hunt down in the local security policies (Administrative tools) where the

Administrator account is referenced. Hunt down in scheduled tasks, group

policies and runnning services where the account may be being used.

2) I don't think there is a correct procedure, although in an SBS

environment there may be a few specific things to check. It is only SBS that

sets all these things up automatically for you. Everywhere else you would

not use the Administrator account for anything.

Anthony

http://www.airdesk.com

 

 

"Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

news:0FC7A516-06E6-4717-8712-0AEF849D631B@microsoft.com...

> Hi Anthony,

>

> As I continue my investigations, I've learned that account settings are

> retained in two locations - Active Directory and Global Policy.

> Evidently,

> there is a correct procedure that uses Global Policy to rename the

> Administrator account.

>

> Apparently, I used an incorrect [manual] procedure to rename the

> Administrator account that consisted of simply modifying the AD properties

> and security settings on the Administrator profile to change ownership

> from

> "Administrator" to "NewAdminName". I left the primary email address for

> "NewAdminName" as "Administrator@MyDomain.com".

>

> I have full access to the Administrator's "My Documents" folder via the

> NewAdminName's "My Documents" folder. So at least that much is working.

> However, on login, I am seeing a Folder Redirection Error [Event ID 107]

> that

> tells me it failed to perform redirection of the folder Desktop. The

> folder

> is configured to be redirected from

> <\\bvepdcex01\users\Administrator\desktop> to

> <\\bevpdcex01\users\NewAdminName\desktop>. The following error occurred:

> Access is denied. For more information, see Help and Support Center at

> http://go.microsoft.com/fqlink/events.asp.

>

> This is followed by Userenv Error Event ID 1085 that tells me the

> following:

> The Group Policy client-side extension Folder Redirection failed to

> execute.

> Please look for any errors reported earlier by that extension. For more

> information, see Help and Support Center at

> http://go.microsoft.com/fwlink/events.asp.

>

> When I perform Step One of the recommended steps below, I get the

> following:

> C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

>

> ------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

> Cannot find administrator.

>

> C:\>

>

> So, in short, I am seeking a couple of things from this:

> 1. The most effective way to eliminate these error messages/events while

> retaining the NewAdminName for the primary Administrator account.

> 2. Specific guidance as to the "correct" procedure for renaming the

> Administrator account so as to avoid this ordeal in the future.

>

> Your suggestion for using a long passphrase for the Administrator account

> is

> appreciated - it being much simpler to change a password than to rename an

> account. However, subscribing to the "belt and suspenders" approach when

> it

> comes to security, there is less likelihood of one being caught with their

> pants down, so to speak, when the well known and targeted administrator

> account is properly renamed and a complex passphrases are employed across

> the

> board.

>

> Cheers,

>

>

>

> "Anthony [MVP]" wrote:

>

>> I would actually just name it back, and give it a nice long and secure

>> password. Renaming is of little value. I'm not sure that renaming an

>> account

>> would cause this error anyway.

>> What result do you get for Step 1 in the recommended steps?

>> Anthony

>> http://www.airdesk.com

>>

>>

>> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

>> > Hi Anthony,

>> >

>> > Thank you for posting this reply. The policy setting flagged under the

>> > Default Domain Controller's Policy is "Impersonate a client after

>> > authentication". I'm not exactly certain of the purpose of this policy

>> > setting/User Rights Assignment and the default setting for SBS2003.

>> > Since

>> > I'm relatively new to SBS2003, I need to know the basic steps necessary

>> > to

>> > change the account name to which this policy setting/User Rights

>> > Assignment

>> > applies?

>> >

>> > I originally intended to post this question under the SBS group.

>> > However,

>> > I

>> > chose this group after noticing a considerable number of "spam"

>> > postings

>> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

>> > yesterday.

>> > This group appears to be much better moderated.

>> >

>> > Cheers!

>> >

>> > "Anthony [MVP]" wrote:

>> >

>> >> You get this error when the specific account name that no longer

>> >> exists

>> >> (in

>> >> your case Administrator) is referenced in a policy. This is typically

>> >> a

>> >> User

>> >> Rights Assignment or a Restricted Groups policy. You need to find the

>> >> policy

>> >> and change the name of the account referenced from Administrator to

>> >> whatever

>> >> you renamed it as.

>> >> You might want to ask in the SBS groups for anything specific to SBS,

>> >> Anthony,

>> >> http://www.airdesk.co.uk

>> >>

>> >>

>> >>

>> >>

>> >>

>> >>

>> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

>> >> > As a security measure, I manually renamed the Administrator account

>> >> > on

>> >> > an

>> >> > SBS

>> >> > 2003 Premium R2 server. Since then, I have been receiving the

>> >> > following

>> >> > Event 1202 warnings every 5 minutes in the Application Event Log:

>> >> > ----------------------------------------------------------------------------------

>> >> > Event Type: Warning

>> >> > Event Source: SceCli

>> >> > Event Category: None

>> >> > Event ID: 1202

>> >> > Date: 16/02/2008

>> >> > Time: 2:45:57 PM

>> >> > User: N/A

>> >> > Computer: BVEPDCEX01

>> >> > Description:

>> >> > Security policies were propagated with warning. 0x534 : No mapping

>> >> > between

>> >> > account names and security IDs was done.

>> >> >

>> >> > Advanced help for this problem is available on

>> >> > http://support.microsoft.com.

>> >> > Query for "troubleshooting 1202 events".

>> >> >

>> >> > Error 0x534 occurs when a user account in one or more Group Policy

>> >> > objects

>> >> > (GPOs) could not be resolved to a SID. This error is possibly

>> >> > caused

>> >> > by a

>> >> > mistyped or deleted user account referenced in either the

>> >> >

>> >> > User Rights or Restricted Groups branch of a GPO. To resolve this

>> >> > event,

>> >> > contact an administrator in the domain to perform the following

>> >> > actions:

>> >> >

>> >> > 1. Identify accounts that could not be resolved to a SID:

>> >> >

>> >> > From the command prompt, type: FIND /I "Cannot find"

>> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

>> >> >

>> >> > The string following "Cannot find" in the FIND output identifies the

>> >> > problem

>> >> > account names.

>> >> >

>> >> > Example: Cannot find JohnDough.

>> >> >

>> >> > In this case, the SID for username "JohnDough" could not be

>> >> > determined.

>> >> > This

>> >> > most likely occurs because the account was deleted, renamed, or is

>> >> > spelled

>> >> > differently (e.g. "JohnDoe").

>> >> >

>> >> > 2. Use RSoP to identify the specific User Rights, Restricted Groups,

>> >> > and

>> >> > Source GPOs that contain the problem accounts:

>> >> >

>> >> > a. Start -> Run -> RSoP.msc

>> >> > b. Review the results for Computer Configuration\Windows

>> >> > Settings\Security

>> >> > Settings\Local Policies\User Rights Assignment and Computer

>> >> > Configuration\Windows Settings\Security Settings\Local

>> >> >

>> >> > Policies\Restricted Groups for any errors flagged with a red X.

>> >> > c. For any User Right or Restricted Group marked with a red X, the

>> >> > corresponding GPO that contains the problem policy setting is listed

>> >> > under

>> >> > the column entitled "Source GPO". Note the specific User

>> >> >

>> >> > Rights, Restricted Groups and containing Source GPOs that are

>> >> > generating

>> >> > errors.

>> >> >

>> >> > 3. Remove unresolved accounts from Group Policy

>> >> >

>> >> > a. Start -> Run -> MMC.EXE

>> >> > b. From the File menu select "Add/Remove Snap-in..."

>> >> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

>> >> > d. In the "Add Standalone Snap-in" dialog box select "Group Policy"

>> >> > and

>> >> > click "Add"

>> >> > e. In the "Select Group Policy Object" dialog box click the "Browse"

>> >> > button.

>> >> > f. On the "Browse for a Group Policy Object" dialog box choose the

>> >> > "All"

>> >> > tab

>> >> > g. For each source GPO identified in step 2, correct the specific

>> >> > User

>> >> > Rights or Restricted Groups that were flagged with a red X in step

>> >> > 2.

>> >> > These

>> >> > User Rights or Restricted Groups can be corrected by removing or

>> >> > correcting

>> >> > any references to the problem accounts that were identified in step

>> >> > 1.

>> >> >

>> >> > For more information, see Help and Support Center at

>> >> > http://go.microsoft.com/fwlink/events.asp.

>> >> > ---------------------------------------------------------------------------------

>> >> >

>> >> > I have stepped through the foregoing process and found the following

>> >> > Policy

>> >> > setting flagged in the Default Domain Controllers Policy:

>> >> > "Impersonate

>> >> > a

>> >> > client after authentication". I am also seeing Event ID Errors 107

>> >> > &

>> >> > 1085

>> >> > in

>> >> > the Application log relating to Desktop folder redirection - these

>> >> > errors

>> >> > appear to be related.

>> >> >

>> >> > I am able to successfully logon using the renamed Administrator

>> >> > account

>> >> > and

>> >> > perform tasks. My Administrator documents successfully replicated

>> >> > to

>> >> > the

>> >> > renamed account.

>> >> >

>> >> > What steps can I take to resolve these issues? Do I need to restore

>> >> > the

>> >> > Administrator account temporarily and redo the rename using another

>> >> > process?

>> >> >

>> >> > Please advise. Thanks!

>> >>

>> >>

>> >>

>>

>>

>>

Posted

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Hi Anthony,

 

I'm sorry it's taken several days to get back to you - life gets in the way

sometimes!

 

I investigated all the local security policies on the machine and found only

one referencing the original administrator account: "Impersonate a client

after authentication". This should come as no surprise since it was this

specific policy setting that was flagged with a big, red "X" when I stepped

through the diagnostic phase.

 

I removed the original administrator account from this policy setting and

replaced it with the renamed administrator account [although, come to think

of it, this should probably just be changed over to the administrators group

- perhaps saving some grief and aggravation for the next IT guy after me.

 

I also checked all scheduled tasks and services to ensure none were

referencing the former administrator account. None were. I then returned to

review the settings under the Default Domain Controllers Policy. I was

presented with a pop-up message that stated: "The Permissions for This GPO in

the SYSVOL Folder Are Inconsistent with Those in Active Directory" Message

When You Run GPMC" and referencing the following link:

http://support.microsoft.com/default.aspx?scid=kb;en-us;828760.

 

I took a gamble and clicked on "Okay" to change the permissions in SYSVOL to

match those in AD. I followed that by running GPUpdate /force.

 

When I logged back into the machine, it appeared that the policy changes I

made took hold. However, a check of the event logs indicates that the 1202

event errors seem to have stopped, but I am still seeing 107 [Folder

Redirection] and 1085 [userenv] errors in the Application Event log.

 

Your thoughts?

 

Cheers!

 

"Anthony [MVP]" wrote:

> Hi Dave,

> In answer to your questions:

> 1) Hunt down in the local security policies (Administrative tools) where the

> Administrator account is referenced. Hunt down in scheduled tasks, group

> policies and runnning services where the account may be being used.

> 2) I don't think there is a correct procedure, although in an SBS

> environment there may be a few specific things to check. It is only SBS that

> sets all these things up automatically for you. Everywhere else you would

> not use the Administrator account for anything.

> Anthony

> http://www.airdesk.com

>

>

> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> news:0FC7A516-06E6-4717-8712-0AEF849D631B@microsoft.com...

> > Hi Anthony,

> >

> > As I continue my investigations, I've learned that account settings are

> > retained in two locations - Active Directory and Global Policy.

> > Evidently,

> > there is a correct procedure that uses Global Policy to rename the

> > Administrator account.

> >

> > Apparently, I used an incorrect [manual] procedure to rename the

> > Administrator account that consisted of simply modifying the AD properties

> > and security settings on the Administrator profile to change ownership

> > from

> > "Administrator" to "NewAdminName". I left the primary email address for

> > "NewAdminName" as "Administrator@MyDomain.com".

> >

> > I have full access to the Administrator's "My Documents" folder via the

> > NewAdminName's "My Documents" folder. So at least that much is working.

> > However, on login, I am seeing a Folder Redirection Error [Event ID 107]

> > that

> > tells me it failed to perform redirection of the folder Desktop. The

> > folder

> > is configured to be redirected from

> > <\\bvepdcex01\users\Administrator\desktop> to

> > <\\bevpdcex01\users\NewAdminName\desktop>. The following error occurred:

> > Access is denied. For more information, see Help and Support Center at

> > http://go.microsoft.com/fqlink/events.asp.

> >

> > This is followed by Userenv Error Event ID 1085 that tells me the

> > following:

> > The Group Policy client-side extension Folder Redirection failed to

> > execute.

> > Please look for any errors reported earlier by that extension. For more

> > information, see Help and Support Center at

> > http://go.microsoft.com/fwlink/events.asp.

> >

> > When I perform Step One of the recommended steps below, I get the

> > following:

> > C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

> >

> > ------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> > Cannot find administrator.

> >

> > C:\>

> >

> > So, in short, I am seeking a couple of things from this:

> > 1. The most effective way to eliminate these error messages/events while

> > retaining the NewAdminName for the primary Administrator account.

> > 2. Specific guidance as to the "correct" procedure for renaming the

> > Administrator account so as to avoid this ordeal in the future.

> >

> > Your suggestion for using a long passphrase for the Administrator account

> > is

> > appreciated - it being much simpler to change a password than to rename an

> > account. However, subscribing to the "belt and suspenders" approach when

> > it

> > comes to security, there is less likelihood of one being caught with their

> > pants down, so to speak, when the well known and targeted administrator

> > account is properly renamed and a complex passphrases are employed across

> > the

> > board.

> >

> > Cheers,

> >

> >

> >

> > "Anthony [MVP]" wrote:

> >

> >> I would actually just name it back, and give it a nice long and secure

> >> password. Renaming is of little value. I'm not sure that renaming an

> >> account

> >> would cause this error anyway.

> >> What result do you get for Step 1 in the recommended steps?

> >> Anthony

> >> http://www.airdesk.com

> >>

> >>

> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

> >> > Hi Anthony,

> >> >

> >> > Thank you for posting this reply. The policy setting flagged under the

> >> > Default Domain Controller's Policy is "Impersonate a client after

> >> > authentication". I'm not exactly certain of the purpose of this policy

> >> > setting/User Rights Assignment and the default setting for SBS2003.

> >> > Since

> >> > I'm relatively new to SBS2003, I need to know the basic steps necessary

> >> > to

> >> > change the account name to which this policy setting/User Rights

> >> > Assignment

> >> > applies?

> >> >

> >> > I originally intended to post this question under the SBS group.

> >> > However,

> >> > I

> >> > chose this group after noticing a considerable number of "spam"

> >> > postings

> >> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

> >> > yesterday.

> >> > This group appears to be much better moderated.

> >> >

> >> > Cheers!

> >> >

> >> > "Anthony [MVP]" wrote:

> >> >

> >> >> You get this error when the specific account name that no longer

> >> >> exists

> >> >> (in

> >> >> your case Administrator) is referenced in a policy. This is typically

> >> >> a

> >> >> User

> >> >> Rights Assignment or a Restricted Groups policy. You need to find the

> >> >> policy

> >> >> and change the name of the account referenced from Administrator to

> >> >> whatever

> >> >> you renamed it as.

> >> >> You might want to ask in the SBS groups for anything specific to SBS,

> >> >> Anthony,

> >> >> http://www.airdesk.co.uk

> >> >>

> >> >>

> >> >>

> >> >>

> >> >>

> >> >>

> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

> >> >> > As a security measure, I manually renamed the Administrator account

> >> >> > on

> >> >> > an

> >> >> > SBS

> >> >> > 2003 Premium R2 server. Since then, I have been receiving the

> >> >> > following

> >> >> > Event 1202 warnings every 5 minutes in the Application Event Log:

> >> >> > ----------------------------------------------------------------------------------

> >> >> > Event Type: Warning

> >> >> > Event Source: SceCli

> >> >> > Event Category: None

> >> >> > Event ID: 1202

> >> >> > Date: 16/02/2008

> >> >> > Time: 2:45:57 PM

> >> >> > User: N/A

> >> >> > Computer: BVEPDCEX01

> >> >> > Description:

> >> >> > Security policies were propagated with warning. 0x534 : No mapping

> >> >> > between

> >> >> > account names and security IDs was done.

> >> >> >

> >> >> > Advanced help for this problem is available on

> >> >> > http://support.microsoft.com.

> >> >> > Query for "troubleshooting 1202 events".

> >> >> >

> >> >> > Error 0x534 occurs when a user account in one or more Group Policy

> >> >> > objects

> >> >> > (GPOs) could not be resolved to a SID. This error is possibly

> >> >> > caused

> >> >> > by a

> >> >> > mistyped or deleted user account referenced in either the

> >> >> >

> >> >> > User Rights or Restricted Groups branch of a GPO. To resolve this

> >> >> > event,

> >> >> > contact an administrator in the domain to perform the following

> >> >> > actions:

> >> >> >

> >> >> > 1. Identify accounts that could not be resolved to a SID:

> >> >> >

> >> >> > From the command prompt, type: FIND /I "Cannot find"

> >> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

> >> >> >

> >> >> > The string following "Cannot find" in the FIND output identifies the

> >> >> > problem

> >> >> > account names.

> >> >> >

> >> >> > Example: Cannot find JohnDough.

> >> >> >

> >> >> > In this case, the SID for username "JohnDough" could not be

> >> >> > determined.

> >> >> > This

> >> >> > most likely occurs because the account was deleted, renamed, or is

> >> >> > spelled

> >> >> > differently (e.g. "JohnDoe").

> >> >> >

> >> >> > 2. Use RSoP to identify the specific User Rights, Restricted Groups,

> >> >> > and

> >> >> > Source GPOs that contain the problem accounts:

> >> >> >

> >> >> > a. Start -> Run -> RSoP.msc

> >> >> > b. Review the results for Computer Configuration\Windows

> >> >> > Settings\Security

> >> >> > Settings\Local Policies\User Rights Assignment and Computer

> >> >> > Configuration\Windows Settings\Security Settings\Local

> >> >> >

> >> >> > Policies\Restricted Groups for any errors flagged with a red X.

> >> >> > c. For any User Right or Restricted Group marked with a red X, the

> >> >> > corresponding GPO that contains the problem policy setting is listed

> >> >> > under

> >> >> > the column entitled "Source GPO". Note the specific User

> >> >> >

> >> >> > Rights, Restricted Groups and containing Source GPOs that are

> >> >> > generating

> >> >> > errors.

> >> >> >

> >> >> > 3. Remove unresolved accounts from Group Policy

> >> >> >

> >> >> > a. Start -> Run -> MMC.EXE

> >> >> > b. From the File menu select "Add/Remove Snap-in..."

> >> >> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

> >> >> > d. In the "Add Standalone Snap-in" dialog box select "Group Policy"

> >> >> > and

> >> >> > click "Add"

> >> >> > e. In the "Select Group Policy Object" dialog box click the "Browse"

> >> >> > button.

> >> >> > f. On the "Browse for a Group Policy Object" dialog box choose the

> >> >> > "All"

> >> >> > tab

> >> >> > g. For each source GPO identified in step 2, correct the specific

> >> >> > User

> >> >> > Rights or Restricted Groups that were flagged with a red X in step

> >> >> > 2.

> >> >> > These

> >> >> > User Rights or Restricted Groups can be corrected by removing or

> >> >> > correcting

> >> >> > any references to the problem accounts that were identified in step

> >> >> > 1.

> >> >> >

> >> >> > For more information, see Help and Support Center at

> >> >> > http://go.microsoft.com/fwlink/events.asp.

> >> >> > ---------------------------------------------------------------------------------

> >> >> >

> >> >> > I have stepped through the foregoing process and found the following

> >> >> > Policy

> >> >> > setting flagged in the Default Domain Controllers Policy:

> >> >> > "Impersonate

> >> >> > a

> >> >> > client after authentication". I am also seeing Event ID Errors 107

> >> >> > &

> >> >> > 1085

> >> >> > in

> >> >> > the Application log relating to Desktop folder redirection - these

> >> >> > errors

> >> >> > appear to be related.

> >> >> >

> >> >> > I am able to successfully logon using the renamed Administrator

> >> >> > account

> >> >> > and

> >> >> > perform tasks. My Administrator documents successfully replicated

> >> >> > to

> >> >> > the

> >> >> > renamed account.

> >> >> >

> >> >> > What steps can I take to resolve these issues? Do I need to restore

> >> >> > the

> >> >> > Administrator account temporarily and redo the rename using another

> >> >> > process?

> >> >> >

> >> >> > Please advise. Thanks!

> >> >>

> >> >>

> >> >>

> >>

> >>

> >>

>

>

>

Guest Anthony [MVP]
Posted

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Did you check the Group Policies for references to the Administrator

account? Can you try renaming it back and see what happens? Did you make

other changes at the same time? Do you have a group policy to rename the

Administrator account?

For the redirection error: what policy do you have? and what is the exact

text of the message? Does the user mentioned in the error definitely have

the permissions to create a folder in the new location? Is this error just

occuring on the SBS server?

Anthony

http://www.airdesk.com

 

 

 

 

"Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

news:C342C6FB-C3E9-4086-BEB7-48295025F5A7@microsoft.com...

> Hi Anthony,

>

> I'm sorry it's taken several days to get back to you - life gets in the

> way

> sometimes!

>

> I investigated all the local security policies on the machine and found

> only

> one referencing the original administrator account: "Impersonate a client

> after authentication". This should come as no surprise since it was this

> specific policy setting that was flagged with a big, red "X" when I

> stepped

> through the diagnostic phase.

>

> I removed the original administrator account from this policy setting and

> replaced it with the renamed administrator account [although, come to

> think

> of it, this should probably just be changed over to the administrators

> group

> - perhaps saving some grief and aggravation for the next IT guy after me.

>

> I also checked all scheduled tasks and services to ensure none were

> referencing the former administrator account. None were. I then returned

> to

> review the settings under the Default Domain Controllers Policy. I was

> presented with a pop-up message that stated: "The Permissions for This GPO

> in

> the SYSVOL Folder Are Inconsistent with Those in Active Directory" Message

> When You Run GPMC" and referencing the following link:

> http://support.microsoft.com/default.aspx?scid=kb;en-us;828760.

>

> I took a gamble and clicked on "Okay" to change the permissions in SYSVOL

> to

> match those in AD. I followed that by running GPUpdate /force.

>

> When I logged back into the machine, it appeared that the policy changes I

> made took hold. However, a check of the event logs indicates that the

> 1202

> event errors seem to have stopped, but I am still seeing 107 [Folder

> Redirection] and 1085 [userenv] errors in the Application Event log.

>

> Your thoughts?

>

> Cheers!

>

> "Anthony [MVP]" wrote:

>

>> Hi Dave,

>> In answer to your questions:

>> 1) Hunt down in the local security policies (Administrative tools) where

>> the

>> Administrator account is referenced. Hunt down in scheduled tasks, group

>> policies and runnning services where the account may be being used.

>> 2) I don't think there is a correct procedure, although in an SBS

>> environment there may be a few specific things to check. It is only SBS

>> that

>> sets all these things up automatically for you. Everywhere else you would

>> not use the Administrator account for anything.

>> Anthony

>> http://www.airdesk.com

>>

>>

>> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> news:0FC7A516-06E6-4717-8712-0AEF849D631B@microsoft.com...

>> > Hi Anthony,

>> >

>> > As I continue my investigations, I've learned that account settings are

>> > retained in two locations - Active Directory and Global Policy.

>> > Evidently,

>> > there is a correct procedure that uses Global Policy to rename the

>> > Administrator account.

>> >

>> > Apparently, I used an incorrect [manual] procedure to rename the

>> > Administrator account that consisted of simply modifying the AD

>> > properties

>> > and security settings on the Administrator profile to change ownership

>> > from

>> > "Administrator" to "NewAdminName". I left the primary email address

>> > for

>> > "NewAdminName" as "Administrator@MyDomain.com".

>> >

>> > I have full access to the Administrator's "My Documents" folder via the

>> > NewAdminName's "My Documents" folder. So at least that much is

>> > working.

>> > However, on login, I am seeing a Folder Redirection Error [Event ID

>> > 107]

>> > that

>> > tells me it failed to perform redirection of the folder Desktop. The

>> > folder

>> > is configured to be redirected from

>> > <\\bvepdcex01\users\Administrator\desktop> to

>> > <\\bevpdcex01\users\NewAdminName\desktop>. The following error

>> > occurred:

>> > Access is denied. For more information, see Help and Support Center at

>> > http://go.microsoft.com/fqlink/events.asp.

>> >

>> > This is followed by Userenv Error Event ID 1085 that tells me the

>> > following:

>> > The Group Policy client-side extension Folder Redirection failed to

>> > execute.

>> > Please look for any errors reported earlier by that extension. For

>> > more

>> > information, see Help and Support Center at

>> > http://go.microsoft.com/fwlink/events.asp.

>> >

>> > When I perform Step One of the recommended steps below, I get the

>> > following:

>> > C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

>> >

>> > ------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> > Cannot find administrator.

>> >

>> > C:\>

>> >

>> > So, in short, I am seeking a couple of things from this:

>> > 1. The most effective way to eliminate these error messages/events

>> > while

>> > retaining the NewAdminName for the primary Administrator account.

>> > 2. Specific guidance as to the "correct" procedure for renaming the

>> > Administrator account so as to avoid this ordeal in the future.

>> >

>> > Your suggestion for using a long passphrase for the Administrator

>> > account

>> > is

>> > appreciated - it being much simpler to change a password than to rename

>> > an

>> > account. However, subscribing to the "belt and suspenders" approach

>> > when

>> > it

>> > comes to security, there is less likelihood of one being caught with

>> > their

>> > pants down, so to speak, when the well known and targeted administrator

>> > account is properly renamed and a complex passphrases are employed

>> > across

>> > the

>> > board.

>> >

>> > Cheers,

>> >

>> >

>> >

>> > "Anthony [MVP]" wrote:

>> >

>> >> I would actually just name it back, and give it a nice long and secure

>> >> password. Renaming is of little value. I'm not sure that renaming an

>> >> account

>> >> would cause this error anyway.

>> >> What result do you get for Step 1 in the recommended steps?

>> >> Anthony

>> >> http://www.airdesk.com

>> >>

>> >>

>> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

>> >> > Hi Anthony,

>> >> >

>> >> > Thank you for posting this reply. The policy setting flagged under

>> >> > the

>> >> > Default Domain Controller's Policy is "Impersonate a client after

>> >> > authentication". I'm not exactly certain of the purpose of this

>> >> > policy

>> >> > setting/User Rights Assignment and the default setting for SBS2003.

>> >> > Since

>> >> > I'm relatively new to SBS2003, I need to know the basic steps

>> >> > necessary

>> >> > to

>> >> > change the account name to which this policy setting/User Rights

>> >> > Assignment

>> >> > applies?

>> >> >

>> >> > I originally intended to post this question under the SBS group.

>> >> > However,

>> >> > I

>> >> > chose this group after noticing a considerable number of "spam"

>> >> > postings

>> >> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

>> >> > yesterday.

>> >> > This group appears to be much better moderated.

>> >> >

>> >> > Cheers!

>> >> >

>> >> > "Anthony [MVP]" wrote:

>> >> >

>> >> >> You get this error when the specific account name that no longer

>> >> >> exists

>> >> >> (in

>> >> >> your case Administrator) is referenced in a policy. This is

>> >> >> typically

>> >> >> a

>> >> >> User

>> >> >> Rights Assignment or a Restricted Groups policy. You need to find

>> >> >> the

>> >> >> policy

>> >> >> and change the name of the account referenced from Administrator to

>> >> >> whatever

>> >> >> you renamed it as.

>> >> >> You might want to ask in the SBS groups for anything specific to

>> >> >> SBS,

>> >> >> Anthony,

>> >> >> http://www.airdesk.co.uk

>> >> >>

>> >> >>

>> >> >>

>> >> >>

>> >> >>

>> >> >>

>> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

>> >> >> > As a security measure, I manually renamed the Administrator

>> >> >> > account

>> >> >> > on

>> >> >> > an

>> >> >> > SBS

>> >> >> > 2003 Premium R2 server. Since then, I have been receiving the

>> >> >> > following

>> >> >> > Event 1202 warnings every 5 minutes in the Application Event Log:

>> >> >> > ----------------------------------------------------------------------------------

>> >> >> > Event Type: Warning

>> >> >> > Event Source: SceCli

>> >> >> > Event Category: None

>> >> >> > Event ID: 1202

>> >> >> > Date: 16/02/2008

>> >> >> > Time: 2:45:57 PM

>> >> >> > User: N/A

>> >> >> > Computer: BVEPDCEX01

>> >> >> > Description:

>> >> >> > Security policies were propagated with warning. 0x534 : No

>> >> >> > mapping

>> >> >> > between

>> >> >> > account names and security IDs was done.

>> >> >> >

>> >> >> > Advanced help for this problem is available on

>> >> >> > http://support.microsoft.com.

>> >> >> > Query for "troubleshooting 1202 events".

>> >> >> >

>> >> >> > Error 0x534 occurs when a user account in one or more Group

>> >> >> > Policy

>> >> >> > objects

>> >> >> > (GPOs) could not be resolved to a SID. This error is possibly

>> >> >> > caused

>> >> >> > by a

>> >> >> > mistyped or deleted user account referenced in either the

>> >> >> >

>> >> >> > User Rights or Restricted Groups branch of a GPO. To resolve

>> >> >> > this

>> >> >> > event,

>> >> >> > contact an administrator in the domain to perform the following

>> >> >> > actions:

>> >> >> >

>> >> >> > 1. Identify accounts that could not be resolved to a SID:

>> >> >> >

>> >> >> > From the command prompt, type: FIND /I "Cannot find"

>> >> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

>> >> >> >

>> >> >> > The string following "Cannot find" in the FIND output identifies

>> >> >> > the

>> >> >> > problem

>> >> >> > account names.

>> >> >> >

>> >> >> > Example: Cannot find JohnDough.

>> >> >> >

>> >> >> > In this case, the SID for username "JohnDough" could not be

>> >> >> > determined.

>> >> >> > This

>> >> >> > most likely occurs because the account was deleted, renamed, or

>> >> >> > is

>> >> >> > spelled

>> >> >> > differently (e.g. "JohnDoe").

>> >> >> >

>> >> >> > 2. Use RSoP to identify the specific User Rights, Restricted

>> >> >> > Groups,

>> >> >> > and

>> >> >> > Source GPOs that contain the problem accounts:

>> >> >> >

>> >> >> > a. Start -> Run -> RSoP.msc

>> >> >> > b. Review the results for Computer Configuration\Windows

>> >> >> > Settings\Security

>> >> >> > Settings\Local Policies\User Rights Assignment and Computer

>> >> >> > Configuration\Windows Settings\Security Settings\Local

>> >> >> >

>> >> >> > Policies\Restricted Groups for any errors flagged with a red X.

>> >> >> > c. For any User Right or Restricted Group marked with a red X,

>> >> >> > the

>> >> >> > corresponding GPO that contains the problem policy setting is

>> >> >> > listed

>> >> >> > under

>> >> >> > the column entitled "Source GPO". Note the specific User

>> >> >> >

>> >> >> > Rights, Restricted Groups and containing Source GPOs that are

>> >> >> > generating

>> >> >> > errors.

>> >> >> >

>> >> >> > 3. Remove unresolved accounts from Group Policy

>> >> >> >

>> >> >> > a. Start -> Run -> MMC.EXE

>> >> >> > b. From the File menu select "Add/Remove Snap-in..."

>> >> >> > c. From the "Add/Remove Snap-in" dialog box select "Add..."

>> >> >> > d. In the "Add Standalone Snap-in" dialog box select "Group

>> >> >> > Policy"

>> >> >> > and

>> >> >> > click "Add"

>> >> >> > e. In the "Select Group Policy Object" dialog box click the

>> >> >> > "Browse"

>> >> >> > button.

>> >> >> > f. On the "Browse for a Group Policy Object" dialog box choose

>> >> >> > the

>> >> >> > "All"

>> >> >> > tab

>> >> >> > g. For each source GPO identified in step 2, correct the specific

>> >> >> > User

>> >> >> > Rights or Restricted Groups that were flagged with a red X in

>> >> >> > step

>> >> >> > 2.

>> >> >> > These

>> >> >> > User Rights or Restricted Groups can be corrected by removing or

>> >> >> > correcting

>> >> >> > any references to the problem accounts that were identified in

>> >> >> > step

>> >> >> > 1.

>> >> >> >

>> >> >> > For more information, see Help and Support Center at

>> >> >> > http://go.microsoft.com/fwlink/events.asp.

>> >> >> > ---------------------------------------------------------------------------------

>> >> >> >

>> >> >> > I have stepped through the foregoing process and found the

>> >> >> > following

>> >> >> > Policy

>> >> >> > setting flagged in the Default Domain Controllers Policy:

>> >> >> > "Impersonate

>> >> >> > a

>> >> >> > client after authentication". I am also seeing Event ID Errors

>> >> >> > 107

>> >> >> > &

>> >> >> > 1085

>> >> >> > in

>> >> >> > the Application log relating to Desktop folder redirection -

>> >> >> > these

>> >> >> > errors

>> >> >> > appear to be related.

>> >> >> >

>> >> >> > I am able to successfully logon using the renamed Administrator

>> >> >> > account

>> >> >> > and

>> >> >> > perform tasks. My Administrator documents successfully

>> >> >> > replicated

>> >> >> > to

>> >> >> > the

>> >> >> > renamed account.

>> >> >> >

>> >> >> > What steps can I take to resolve these issues? Do I need to

>> >> >> > restore

>> >> >> > the

>> >> >> > Administrator account temporarily and redo the rename using

>> >> >> > another

>> >> >> > process?

>> >> >> >

>> >> >> > Please advise. Thanks!

>> >> >>

>> >> >>

>> >> >>

>> >>

>> >>

>> >>

>>

>>

>>

Posted

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Hi Anthony,

 

Thank you for your continued follow-up on this file.

 

To address your specific questions:

1. Did I check Group Policies for references to the Administrator account? -

YES

2. Can I try renaming it back to see what happens? - Yes, but I'd prefer not

to at this point for reasons that will become clear below.

3. Did I make other changes at the same time? - NOT THAT I RECALL. The

changes I made initially related solely to renaming the AD profile after

enabling the Rename Administrator account policy in Group Policy. I'm still

researching documentation for any recommendations as to how to implement this

Best Practice of renaming the Administrator account on an SBS Server.

4. Do I have a Group Policy [enabled] to rename the Administrator account? -

YES. This Group Policy was implemented prior to renaming the Administrator

account.

 

This morning, I rechecked the Application Event Logs. Event 1202 warnings

stopped last night following my last changes and have not reappeared since.

So the issue now seems to resolve down to two errors in the Application Event

Log:

 

1. Folder Redirection Error - Event ID 107

Failed to perform redirection of folder Desktop. The folder is configured to

be redirected from <\\bvepdcex01\users\Administrator\desktop> to

<\\bvepdcex01\users\NewAdminName\desktop>. The following error occurred:

Access is denied.

For more information, see Help and Support Center at

http://go.microsoft.com/fwlink/events.asp.

2. Userenv Error - Event ID 1085

Description: The Group Policy client-side extension Folder Redirection

failed to execute. Please look for any errors reported earlier by that

extension.

For more information, see Help and Support Center at

http://go.microsoft.com/fwlink/events.asp.

 

These errors appear every time I log on to the SBS2003 server - on the

console or via RDP. I have checked the Group Policy settings for Folder

Redirection and confirmed they are enabled. In summary, the Group Policy is

enabled as a Group Policy Object for BVE Users with the following settings:

 

Redirect MyDocuments>User Configuration[Enabled]>Windows Settings>Folder

Redirection>Settings

Group: DomainName\Domain Users

Application Data

Path: \\bvepdcex01\documents\users\%USERNAME%\Application Data

Desktop

Path: \\bvepdcex01\documents\users\%USERNAME%\Desktop

My Documents

Path: \\bvepdcex01\documents\users\%USERNAME%\My Documents

 

From the error message, it appears that only the "Desktop" portion of folder

redirection is failing - although I stand to be corrected on this. Thinking

out loud, here are some thoughts of mine that may shed some additional light

on this:

 

1. When I renamed the Administrator account, I wanted to keep the original

Administrator profile [Documents and Desktop] intact, lest I wanted to revert

for some reason. I suppose, I could have copied these two folders and placed

them elsewhere as backup copies that could be restored at a later date. As

it now stands, there are the following folders under C:\Documents and

Settings\:

administrator

administrator.DOMAINNAME

All Users

Default User

Local Service

Network Service

The following folders show up under D:\Documents\Users\:

NewAdminName

>administrator's Documents

>Application Data

>Desktop

administrator

>Application Data

>Desktop

>My Documents

 

2. I originally had the NewAdminName profile "pointed" at the Administrator

profile with full permissions to access the Desktop, Administrator Documents

and Application Data folders under the Administrator profile. I then

realized I needed to enable the "Rename Administrator" policy and then ran

through the "Rename User" wizard which changed the display name for the

Administrator.

 

3. There was one other change to group policy that a support tech for

Symantec Backup Exec walked me through which entailed modifying the Group

Policy settings for delegation to enabling "Trust computers and users for

delegation" under the Default Domain Controllers Policy. I believe this was

intended to allow Backup Exec services to run under the NewAdminName account

- which they now do. In retrospect, it might behoove me to create a

separate Backup Exec service account or have these services run as a Local

System account but that step will have to wait until after these issues are

resolved.

 

Since the NewAdminName has been assigned to the Domain Administrators and

Enterprise Administrators security groups, I am assuming these privileges

should be sufficient to create and/or modify folders in any location on the

server. The security permissions set on all folders noted above are as

follows:

Security: Group or user names:

Administrators (DOMAINNAME\Administrators)

- Full control <not inherited> This folder, subfolderes and files.

CREATOR OWNER

- Full control <not inherited> Subfolders and files only.

Username

- Full control <not inherited> This folder, subfolders and files.

SYSTEM

- Full control <not inherited> This folder, subfolders and files.

 

I hope this answers most, if not all, of your questions. Any assistance or

advice you might render would be most appreciated.

 

Cheers!

 

"Anthony [MVP]" wrote:

> Did you check the Group Policies for references to the Administrator

> account? Can you try renaming it back and see what happens? Did you make

> other changes at the same time? Do you have a group policy to rename the

> Administrator account?

> For the redirection error: what policy do you have? and what is the exact

> text of the message? Does the user mentioned in the error definitely have

> the permissions to create a folder in the new location? Is this error just

> occuring on the SBS server?

> Anthony

> http://www.airdesk.com

>

>

>

>

> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> news:C342C6FB-C3E9-4086-BEB7-48295025F5A7@microsoft.com...

> > Hi Anthony,

> >

> > I'm sorry it's taken several days to get back to you - life gets in the

> > way

> > sometimes!

> >

> > I investigated all the local security policies on the machine and found

> > only

> > one referencing the original administrator account: "Impersonate a client

> > after authentication". This should come as no surprise since it was this

> > specific policy setting that was flagged with a big, red "X" when I

> > stepped

> > through the diagnostic phase.

> >

> > I removed the original administrator account from this policy setting and

> > replaced it with the renamed administrator account [although, come to

> > think

> > of it, this should probably just be changed over to the administrators

> > group

> > - perhaps saving some grief and aggravation for the next IT guy after me.

> >

> > I also checked all scheduled tasks and services to ensure none were

> > referencing the former administrator account. None were. I then returned

> > to

> > review the settings under the Default Domain Controllers Policy. I was

> > presented with a pop-up message that stated: "The Permissions for This GPO

> > in

> > the SYSVOL Folder Are Inconsistent with Those in Active Directory" Message

> > When You Run GPMC" and referencing the following link:

> > http://support.microsoft.com/default.aspx?scid=kb;en-us;828760.

> >

> > I took a gamble and clicked on "Okay" to change the permissions in SYSVOL

> > to

> > match those in AD. I followed that by running GPUpdate /force.

> >

> > When I logged back into the machine, it appeared that the policy changes I

> > made took hold. However, a check of the event logs indicates that the

> > 1202

> > event errors seem to have stopped, but I am still seeing 107 [Folder

> > Redirection] and 1085 [userenv] errors in the Application Event log.

> >

> > Your thoughts?

> >

> > Cheers!

> >

> > "Anthony [MVP]" wrote:

> >

> >> Hi Dave,

> >> In answer to your questions:

> >> 1) Hunt down in the local security policies (Administrative tools) where

> >> the

> >> Administrator account is referenced. Hunt down in scheduled tasks, group

> >> policies and runnning services where the account may be being used.

> >> 2) I don't think there is a correct procedure, although in an SBS

> >> environment there may be a few specific things to check. It is only SBS

> >> that

> >> sets all these things up automatically for you. Everywhere else you would

> >> not use the Administrator account for anything.

> >> Anthony

> >> http://www.airdesk.com

> >>

> >>

> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> news:0FC7A516-06E6-4717-8712-0AEF849D631B@microsoft.com...

> >> > Hi Anthony,

> >> >

> >> > As I continue my investigations, I've learned that account settings are

> >> > retained in two locations - Active Directory and Global Policy.

> >> > Evidently,

> >> > there is a correct procedure that uses Global Policy to rename the

> >> > Administrator account.

> >> >

> >> > Apparently, I used an incorrect [manual] procedure to rename the

> >> > Administrator account that consisted of simply modifying the AD

> >> > properties

> >> > and security settings on the Administrator profile to change ownership

> >> > from

> >> > "Administrator" to "NewAdminName". I left the primary email address

> >> > for

> >> > "NewAdminName" as "Administrator@MyDomain.com".

> >> >

> >> > I have full access to the Administrator's "My Documents" folder via the

> >> > NewAdminName's "My Documents" folder. So at least that much is

> >> > working.

> >> > However, on login, I am seeing a Folder Redirection Error [Event ID

> >> > 107]

> >> > that

> >> > tells me it failed to perform redirection of the folder Desktop. The

> >> > folder

> >> > is configured to be redirected from

> >> > <\\bvepdcex01\users\Administrator\desktop> to

> >> > <\\bevpdcex01\users\NewAdminName\desktop>. The following error

> >> > occurred:

> >> > Access is denied. For more information, see Help and Support Center at

> >> > http://go.microsoft.com/fqlink/events.asp.

> >> >

> >> > This is followed by Userenv Error Event ID 1085 that tells me the

> >> > following:

> >> > The Group Policy client-side extension Folder Redirection failed to

> >> > execute.

> >> > Please look for any errors reported earlier by that extension. For

> >> > more

> >> > information, see Help and Support Center at

> >> > http://go.microsoft.com/fwlink/events.asp.

> >> >

> >> > When I perform Step One of the recommended steps below, I get the

> >> > following:

> >> > C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

> >> >

> >> > ------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> > Cannot find administrator.

> >> >

> >> > C:\>

> >> >

> >> > So, in short, I am seeking a couple of things from this:

> >> > 1. The most effective way to eliminate these error messages/events

> >> > while

> >> > retaining the NewAdminName for the primary Administrator account.

> >> > 2. Specific guidance as to the "correct" procedure for renaming the

> >> > Administrator account so as to avoid this ordeal in the future.

> >> >

> >> > Your suggestion for using a long passphrase for the Administrator

> >> > account

> >> > is

> >> > appreciated - it being much simpler to change a password than to rename

> >> > an

> >> > account. However, subscribing to the "belt and suspenders" approach

> >> > when

> >> > it

> >> > comes to security, there is less likelihood of one being caught with

> >> > their

> >> > pants down, so to speak, when the well known and targeted administrator

> >> > account is properly renamed and a complex passphrases are employed

> >> > across

> >> > the

> >> > board.

> >> >

> >> > Cheers,

> >> >

> >> >

> >> >

> >> > "Anthony [MVP]" wrote:

> >> >

> >> >> I would actually just name it back, and give it a nice long and secure

> >> >> password. Renaming is of little value. I'm not sure that renaming an

> >> >> account

> >> >> would cause this error anyway.

> >> >> What result do you get for Step 1 in the recommended steps?

> >> >> Anthony

> >> >> http://www.airdesk.com

> >> >>

> >> >>

> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> >> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

> >> >> > Hi Anthony,

> >> >> >

> >> >> > Thank you for posting this reply. The policy setting flagged under

> >> >> > the

> >> >> > Default Domain Controller's Policy is "Impersonate a client after

> >> >> > authentication". I'm not exactly certain of the purpose of this

> >> >> > policy

> >> >> > setting/User Rights Assignment and the default setting for SBS2003.

> >> >> > Since

> >> >> > I'm relatively new to SBS2003, I need to know the basic steps

> >> >> > necessary

> >> >> > to

> >> >> > change the account name to which this policy setting/User Rights

> >> >> > Assignment

> >> >> > applies?

> >> >> >

> >> >> > I originally intended to post this question under the SBS group.

> >> >> > However,

> >> >> > I

> >> >> > chose this group after noticing a considerable number of "spam"

> >> >> > postings

> >> >> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames, etc.]

> >> >> > yesterday.

> >> >> > This group appears to be much better moderated.

> >> >> >

> >> >> > Cheers!

> >> >> >

> >> >> > "Anthony [MVP]" wrote:

> >> >> >

> >> >> >> You get this error when the specific account name that no longer

> >> >> >> exists

> >> >> >> (in

> >> >> >> your case Administrator) is referenced in a policy. This is

> >> >> >> typically

> >> >> >> a

> >> >> >> User

> >> >> >> Rights Assignment or a Restricted Groups policy. You need to find

> >> >> >> the

> >> >> >> policy

> >> >> >> and change the name of the account referenced from Administrator to

> >> >> >> whatever

> >> >> >> you renamed it as.

> >> >> >> You might want to ask in the SBS groups for anything specific to

> >> >> >> SBS,

> >> >> >> Anthony,

> >> >> >> http://www.airdesk.co.uk

> >> >> >>

> >> >> >>

> >> >> >>

> >> >> >>

> >> >> >>

> >> >> >>

> >> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

> >> >> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

> >> >> >> > As a security measure, I manually renamed the Administrator

> >> >> >> > account

> >> >> >> > on

> >> >> >> > an

> >> >> >> > SBS

> >> >> >> > 2003 Premium R2 server. Since then, I have been receiving the

> >> >> >> > following

> >> >> >> > Event 1202 warnings every 5 minutes in the Application Event Log:

> >> >> >> > ----------------------------------------------------------------------------------

> >> >> >> > Event Type: Warning

> >> >> >> > Event Source: SceCli

> >> >> >> > Event Category: None

> >> >> >> > Event ID: 1202

> >> >> >> > Date: 16/02/2008

> >> >> >> > Time: 2:45:57 PM

> >> >> >> > User: N/A

> >> >> >> > Computer: BVEPDCEX01

> >> >> >> > Description:

> >> >> >> > Security policies were propagated with warning. 0x534 : No

> >> >> >> > mapping

> >> >> >> > between

> >> >> >> > account names and security IDs was done.

> >> >> >> >

> >> >> >> > Advanced help for this problem is available on

> >> >> >> > http://support.microsoft.com.

> >> >> >> > Query for "troubleshooting 1202 events".

> >> >> >> >

> >> >> >> > Error 0x534 occurs when a user account in one or more Group

> >> >> >> > Policy

> >> >> >> > objects

> >> >> >> > (GPOs) could not be resolved to a SID. This error is possibly

> >> >> >> > caused

> >> >> >> > by a

> >> >> >> > mistyped or deleted user account referenced in either the

> >> >> >> >

> >> >> >> > User Rights or Restricted Groups branch of a GPO. To resolve

> >> >> >> > this

> >> >> >> > event,

> >> >> >> > contact an administrator in the domain to perform the following

> >> >> >> > actions:

> >> >> >> >

> >> >> >> > 1. Identify accounts that could not be resolved to a SID:

> >> >> >> >

> >> >> >> > From the command prompt, type: FIND /I "Cannot find"

> >> >> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

> >> >> >> >

> >> >> >> > The string following "Cannot find" in the FIND output identifies

> >> >> >> > the

> >> >> >> > problem

> >> >> >> > account names.

> >> >> >> >

> >> >> >> > Example: Cannot find JohnDough.

> >> >> >> >

> >> >> >> > In this case, the SID for username "JohnDough" could not be

> >> >> >> > determined.

> >> >> >> > This

> >> >> >> > most likely occurs because the account was deleted, renamed, or

> >> >> >> > is

> >> >> >> > spelled

> >> >> >> > differently (e.g. "JohnDoe").

> >> >> >> >

> >> >> >> > 2. Use RSoP to identify the specific User Rights, Restricted

> >> >> >> > Groups,

> >> >> >> > and

> >> >> >> > Source GPOs that contain the problem accounts:

> >> >> >> >

> >> >> >> > a. Start -> Run -> RSoP.msc

> >> >> >> > b. Review the results for Computer Configuration\Windows

> >> >> >> > Settings\Security

Guest Anthony [MVP]
Posted

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Re: Event 1202 Warnings after Renaming Administrator Acct on SBS2003

 

Hi Dave,

It is a bit hard to untangle. I would just try to back out the changes you

have made. There is no need for the Administrator account to have a roaming

profile or redirected folders, as you should not log on with it in normal

usage. You can do a backup if you are worried about losing anything.

When you have backed everything out, then if you wish you can just set the

policy to rename the account although it is not really necessary or useful.

The name is just a label attached to the real identity, which is the SID of

the account. The SID stays the same when you rename, and therefore has

access to the private folders of the account regardless of the name.

Sorry I can't be more help. You may be able to repair it with a few more

changes, but it is harder to follow than just backing out and starting

again,

Anthony

http://www.airdesk.co.uk

 

 

 

 

"Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

news:1924F997-1590-4749-858E-5DD79E4D38E7@microsoft.com...

> Hi Anthony,

>

> Thank you for your continued follow-up on this file.

>

> To address your specific questions:

> 1. Did I check Group Policies for references to the Administrator

> account? -

> YES

> 2. Can I try renaming it back to see what happens? - Yes, but I'd prefer

> not

> to at this point for reasons that will become clear below.

> 3. Did I make other changes at the same time? - NOT THAT I RECALL. The

> changes I made initially related solely to renaming the AD profile after

> enabling the Rename Administrator account policy in Group Policy. I'm

> still

> researching documentation for any recommendations as to how to implement

> this

> Best Practice of renaming the Administrator account on an SBS Server.

> 4. Do I have a Group Policy [enabled] to rename the Administrator

> account? -

> YES. This Group Policy was implemented prior to renaming the

> Administrator

> account.

>

> This morning, I rechecked the Application Event Logs. Event 1202 warnings

> stopped last night following my last changes and have not reappeared

> since.

> So the issue now seems to resolve down to two errors in the Application

> Event

> Log:

>

> 1. Folder Redirection Error - Event ID 107

> Failed to perform redirection of folder Desktop. The folder is configured

> to

> be redirected from <\\bvepdcex01\users\Administrator\desktop> to

> <\\bvepdcex01\users\NewAdminName\desktop>. The following error occurred:

> Access is denied.

> For more information, see Help and Support Center at

> http://go.microsoft.com/fwlink/events.asp.

> 2. Userenv Error - Event ID 1085

> Description: The Group Policy client-side extension Folder Redirection

> failed to execute. Please look for any errors reported earlier by that

> extension.

> For more information, see Help and Support Center at

> http://go.microsoft.com/fwlink/events.asp.

>

> These errors appear every time I log on to the SBS2003 server - on the

> console or via RDP. I have checked the Group Policy settings for Folder

> Redirection and confirmed they are enabled. In summary, the Group Policy

> is

> enabled as a Group Policy Object for BVE Users with the following

> settings:

>

> Redirect MyDocuments>User Configuration[Enabled]>Windows Settings>Folder

> Redirection>Settings

> Group: DomainName\Domain Users

> Application Data

> Path: \\bvepdcex01\documents\users\%USERNAME%\Application Data

> Desktop

> Path: \\bvepdcex01\documents\users\%USERNAME%\Desktop

> My Documents

> Path: \\bvepdcex01\documents\users\%USERNAME%\My Documents

>

> From the error message, it appears that only the "Desktop" portion of

> folder

> redirection is failing - although I stand to be corrected on this.

> Thinking

> out loud, here are some thoughts of mine that may shed some additional

> light

> on this:

>

> 1. When I renamed the Administrator account, I wanted to keep the

> original

> Administrator profile [Documents and Desktop] intact, lest I wanted to

> revert

> for some reason. I suppose, I could have copied these two folders and

> placed

> them elsewhere as backup copies that could be restored at a later date.

> As

> it now stands, there are the following folders under C:\Documents and

> Settings\:

> administrator

> administrator.DOMAINNAME

> All Users

> Default User

> Local Service

> Network Service

> The following folders show up under D:\Documents\Users\:

> NewAdminName

>>administrator's Documents

>>Application Data

>>Desktop

> administrator

>>Application Data

>>Desktop

>>My Documents

>

> 2. I originally had the NewAdminName profile "pointed" at the

> Administrator

> profile with full permissions to access the Desktop, Administrator

> Documents

> and Application Data folders under the Administrator profile. I then

> realized I needed to enable the "Rename Administrator" policy and then ran

> through the "Rename User" wizard which changed the display name for the

> Administrator.

>

> 3. There was one other change to group policy that a support tech for

> Symantec Backup Exec walked me through which entailed modifying the Group

> Policy settings for delegation to enabling "Trust computers and users for

> delegation" under the Default Domain Controllers Policy. I believe this

> was

> intended to allow Backup Exec services to run under the NewAdminName

> account

> - which they now do. In retrospect, it might behoove me to create a

> separate Backup Exec service account or have these services run as a Local

> System account but that step will have to wait until after these issues

> are

> resolved.

>

> Since the NewAdminName has been assigned to the Domain Administrators and

> Enterprise Administrators security groups, I am assuming these privileges

> should be sufficient to create and/or modify folders in any location on

> the

> server. The security permissions set on all folders noted above are as

> follows:

> Security: Group or user names:

> Administrators (DOMAINNAME\Administrators)

> - Full control <not inherited> This folder, subfolderes and files.

> CREATOR OWNER

> - Full control <not inherited> Subfolders and files only.

> Username

> - Full control <not inherited> This folder, subfolders and files.

> SYSTEM

> - Full control <not inherited> This folder, subfolders and files.

>

> I hope this answers most, if not all, of your questions. Any assistance

> or

> advice you might render would be most appreciated.

>

> Cheers!

>

> "Anthony [MVP]" wrote:

>

>> Did you check the Group Policies for references to the Administrator

>> account? Can you try renaming it back and see what happens? Did you make

>> other changes at the same time? Do you have a group policy to rename the

>> Administrator account?

>> For the redirection error: what policy do you have? and what is the exact

>> text of the message? Does the user mentioned in the error definitely have

>> the permissions to create a folder in the new location? Is this error

>> just

>> occuring on the SBS server?

>> Anthony

>> http://www.airdesk.com

>>

>>

>>

>>

>> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> news:C342C6FB-C3E9-4086-BEB7-48295025F5A7@microsoft.com...

>> > Hi Anthony,

>> >

>> > I'm sorry it's taken several days to get back to you - life gets in the

>> > way

>> > sometimes!

>> >

>> > I investigated all the local security policies on the machine and found

>> > only

>> > one referencing the original administrator account: "Impersonate a

>> > client

>> > after authentication". This should come as no surprise since it was

>> > this

>> > specific policy setting that was flagged with a big, red "X" when I

>> > stepped

>> > through the diagnostic phase.

>> >

>> > I removed the original administrator account from this policy setting

>> > and

>> > replaced it with the renamed administrator account [although, come to

>> > think

>> > of it, this should probably just be changed over to the administrators

>> > group

>> > - perhaps saving some grief and aggravation for the next IT guy after

>> > me.

>> >

>> > I also checked all scheduled tasks and services to ensure none were

>> > referencing the former administrator account. None were. I then

>> > returned

>> > to

>> > review the settings under the Default Domain Controllers Policy. I was

>> > presented with a pop-up message that stated: "The Permissions for This

>> > GPO

>> > in

>> > the SYSVOL Folder Are Inconsistent with Those in Active Directory"

>> > Message

>> > When You Run GPMC" and referencing the following link:

>> > http://support.microsoft.com/default.aspx?scid=kb;en-us;828760.

>> >

>> > I took a gamble and clicked on "Okay" to change the permissions in

>> > SYSVOL

>> > to

>> > match those in AD. I followed that by running GPUpdate /force.

>> >

>> > When I logged back into the machine, it appeared that the policy

>> > changes I

>> > made took hold. However, a check of the event logs indicates that the

>> > 1202

>> > event errors seem to have stopped, but I am still seeing 107 [Folder

>> > Redirection] and 1085 [userenv] errors in the Application Event log.

>> >

>> > Your thoughts?

>> >

>> > Cheers!

>> >

>> > "Anthony [MVP]" wrote:

>> >

>> >> Hi Dave,

>> >> In answer to your questions:

>> >> 1) Hunt down in the local security policies (Administrative tools)

>> >> where

>> >> the

>> >> Administrator account is referenced. Hunt down in scheduled tasks,

>> >> group

>> >> policies and runnning services where the account may be being used.

>> >> 2) I don't think there is a correct procedure, although in an SBS

>> >> environment there may be a few specific things to check. It is only

>> >> SBS

>> >> that

>> >> sets all these things up automatically for you. Everywhere else you

>> >> would

>> >> not use the Administrator account for anything.

>> >> Anthony

>> >> http://www.airdesk.com

>> >>

>> >>

>> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> news:0FC7A516-06E6-4717-8712-0AEF849D631B@microsoft.com...

>> >> > Hi Anthony,

>> >> >

>> >> > As I continue my investigations, I've learned that account settings

>> >> > are

>> >> > retained in two locations - Active Directory and Global Policy.

>> >> > Evidently,

>> >> > there is a correct procedure that uses Global Policy to rename the

>> >> > Administrator account.

>> >> >

>> >> > Apparently, I used an incorrect [manual] procedure to rename the

>> >> > Administrator account that consisted of simply modifying the AD

>> >> > properties

>> >> > and security settings on the Administrator profile to change

>> >> > ownership

>> >> > from

>> >> > "Administrator" to "NewAdminName". I left the primary email address

>> >> > for

>> >> > "NewAdminName" as "Administrator@MyDomain.com".

>> >> >

>> >> > I have full access to the Administrator's "My Documents" folder via

>> >> > the

>> >> > NewAdminName's "My Documents" folder. So at least that much is

>> >> > working.

>> >> > However, on login, I am seeing a Folder Redirection Error [Event ID

>> >> > 107]

>> >> > that

>> >> > tells me it failed to perform redirection of the folder Desktop.

>> >> > The

>> >> > folder

>> >> > is configured to be redirected from

>> >> > <\\bvepdcex01\users\Administrator\desktop> to

>> >> > <\\bevpdcex01\users\NewAdminName\desktop>. The following error

>> >> > occurred:

>> >> > Access is denied. For more information, see Help and Support Center

>> >> > at

>> >> > http://go.microsoft.com/fqlink/events.asp.

>> >> >

>> >> > This is followed by Userenv Error Event ID 1085 that tells me the

>> >> > following:

>> >> > The Group Policy client-side extension Folder Redirection failed to

>> >> > execute.

>> >> > Please look for any errors reported earlier by that extension. For

>> >> > more

>> >> > information, see Help and Support Center at

>> >> > http://go.microsoft.com/fwlink/events.asp.

>> >> >

>> >> > When I perform Step One of the recommended steps below, I get the

>> >> > following:

>> >> > C:\>FIND /I "Cannot find" %SYSTEMROOT%\Security\Logs\winlogon.log

>> >> >

>> >> > ------------- C:\WINDOWS\SECURITY\LOGS\WINLOGON.LOG

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> > Cannot find administrator.

>> >> >

>> >> > C:\>

>> >> >

>> >> > So, in short, I am seeking a couple of things from this:

>> >> > 1. The most effective way to eliminate these error messages/events

>> >> > while

>> >> > retaining the NewAdminName for the primary Administrator account.

>> >> > 2. Specific guidance as to the "correct" procedure for renaming the

>> >> > Administrator account so as to avoid this ordeal in the future.

>> >> >

>> >> > Your suggestion for using a long passphrase for the Administrator

>> >> > account

>> >> > is

>> >> > appreciated - it being much simpler to change a password than to

>> >> > rename

>> >> > an

>> >> > account. However, subscribing to the "belt and suspenders" approach

>> >> > when

>> >> > it

>> >> > comes to security, there is less likelihood of one being caught with

>> >> > their

>> >> > pants down, so to speak, when the well known and targeted

>> >> > administrator

>> >> > account is properly renamed and a complex passphrases are employed

>> >> > across

>> >> > the

>> >> > board.

>> >> >

>> >> > Cheers,

>> >> >

>> >> >

>> >> >

>> >> > "Anthony [MVP]" wrote:

>> >> >

>> >> >> I would actually just name it back, and give it a nice long and

>> >> >> secure

>> >> >> password. Renaming is of little value. I'm not sure that renaming

>> >> >> an

>> >> >> account

>> >> >> would cause this error anyway.

>> >> >> What result do you get for Step 1 in the recommended steps?

>> >> >> Anthony

>> >> >> http://www.airdesk.com

>> >> >>

>> >> >>

>> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> >> news:67ADF26E-C8C1-4914-B110-B49A0F3239C0@microsoft.com...

>> >> >> > Hi Anthony,

>> >> >> >

>> >> >> > Thank you for posting this reply. The policy setting flagged

>> >> >> > under

>> >> >> > the

>> >> >> > Default Domain Controller's Policy is "Impersonate a client after

>> >> >> > authentication". I'm not exactly certain of the purpose of this

>> >> >> > policy

>> >> >> > setting/User Rights Assignment and the default setting for

>> >> >> > SBS2003.

>> >> >> > Since

>> >> >> > I'm relatively new to SBS2003, I need to know the basic steps

>> >> >> > necessary

>> >> >> > to

>> >> >> > change the account name to which this policy setting/User Rights

>> >> >> > Assignment

>> >> >> > applies?

>> >> >> >

>> >> >> > I originally intended to post this question under the SBS group.

>> >> >> > However,

>> >> >> > I

>> >> >> > chose this group after noticing a considerable number of "spam"

>> >> >> > postings

>> >> >> > under the SBS group [e.g. Dodge Vipers for sale, MI5 flames,

>> >> >> > etc.]

>> >> >> > yesterday.

>> >> >> > This group appears to be much better moderated.

>> >> >> >

>> >> >> > Cheers!

>> >> >> >

>> >> >> > "Anthony [MVP]" wrote:

>> >> >> >

>> >> >> >> You get this error when the specific account name that no longer

>> >> >> >> exists

>> >> >> >> (in

>> >> >> >> your case Administrator) is referenced in a policy. This is

>> >> >> >> typically

>> >> >> >> a

>> >> >> >> User

>> >> >> >> Rights Assignment or a Restricted Groups policy. You need to

>> >> >> >> find

>> >> >> >> the

>> >> >> >> policy

>> >> >> >> and change the name of the account referenced from Administrator

>> >> >> >> to

>> >> >> >> whatever

>> >> >> >> you renamed it as.

>> >> >> >> You might want to ask in the SBS groups for anything specific to

>> >> >> >> SBS,

>> >> >> >> Anthony,

>> >> >> >> http://www.airdesk.co.uk

>> >> >> >>

>> >> >> >>

>> >> >> >>

>> >> >> >>

>> >> >> >>

>> >> >> >>

>> >> >> >> "Dave2U" <Dave2U@discussions.microsoft.com> wrote in message

>> >> >> >> news:F5553485-6110-4D00-9021-EEA06BEEB998@microsoft.com...

>> >> >> >> > As a security measure, I manually renamed the Administrator

>> >> >> >> > account

>> >> >> >> > on

>> >> >> >> > an

>> >> >> >> > SBS

>> >> >> >> > 2003 Premium R2 server. Since then, I have been receiving the

>> >> >> >> > following

>> >> >> >> > Event 1202 warnings every 5 minutes in the Application Event

>> >> >> >> > Log:

>> >> >> >> > ----------------------------------------------------------------------------------

>> >> >> >> > Event Type: Warning

>> >> >> >> > Event Source: SceCli

>> >> >> >> > Event Category: None

>> >> >> >> > Event ID: 1202

>> >> >> >> > Date: 16/02/2008

>> >> >> >> > Time: 2:45:57 PM

>> >> >> >> > User: N/A

>> >> >> >> > Computer: BVEPDCEX01

>> >> >> >> > Description:

>> >> >> >> > Security policies were propagated with warning. 0x534 : No

>> >> >> >> > mapping

>> >> >> >> > between

>> >> >> >> > account names and security IDs was done.

>> >> >> >> >

>> >> >> >> > Advanced help for this problem is available on

>> >> >> >> > http://support.microsoft.com.

>> >> >> >> > Query for "troubleshooting 1202 events".

>> >> >> >> >

>> >> >> >> > Error 0x534 occurs when a user account in one or more Group

>> >> >> >> > Policy

>> >> >> >> > objects

>> >> >> >> > (GPOs) could not be resolved to a SID. This error is possibly

>> >> >> >> > caused

>> >> >> >> > by a

>> >> >> >> > mistyped or deleted user account referenced in either the

>> >> >> >> >

>> >> >> >> > User Rights or Restricted Groups branch of a GPO. To resolve

>> >> >> >> > this

>> >> >> >> > event,

>> >> >> >> > contact an administrator in the domain to perform the

>> >> >> >> > following

>> >> >> >> > actions:

>> >> >> >> >

>> >> >> >> > 1. Identify accounts that could not be resolved to a SID:

>> >> >> >> >

>> >> >> >> > From the command prompt, type: FIND /I "Cannot find"

>> >> >> >> > %SYSTEMROOT%\Security\Logs\winlogon.log

>> >> >> >> >

>> >> >> >> > The string following "Cannot find" in the FIND output

>> >> >> >> > identifies

>> >> >> >> > the

>> >> >> >> > problem

>> >> >> >> > account names.

>> >> >> >> >

>> >> >> >> > Example: Cannot find JohnDough.

>> >> >> >> >

>> >> >> >> > In this case, the SID for username "JohnDough" could not be

>> >> >> >> > determined.

>> >> >> >> > This

>> >> >> >> > most likely occurs because the account was deleted, renamed,

>> >> >> >> > or

>> >> >> >> > is

>> >> >> >> > spelled

>> >> >> >> > differently (e.g. "JohnDoe").

>> >> >> >> >

>> >> >> >> > 2. Use RSoP to identify the specific User Rights, Restricted

>> >> >> >> > Groups,

>> >> >> >> > and

>> >> >> >> > Source GPOs that contain the problem accounts:

>> >> >> >> >

>> >> >> >> > a. Start -> Run -> RSoP.msc

>> >> >> >> > b. Review the results for Computer Configuration\Windows

>> >> >> >> > Settings\Security


×
×
  • Create New...