Table of Contents
- Event Details
- Summary
- Causes
- Resolutions
- Test basic network connectivity
- Check Firewall settings
- Verification
- See Also
Event Details
Product: | Windows Operating System |
Event ID: | 1202 |
Source: | DFSR |
Version: | Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 R2 |
Message: | Service could not contact domain controller to access configuration objects |
Summary
The DFS Replication service failed to contact a domain controller to access configuration information. The service will try again during the next configuration polling cycle. This event can be caused by TCP/IP connectivity, firewall, Active Directory Domain
Services, or DNS issues.
Causes
DFS Replication failed to contact a domain controller to retrieve configuration information. If replication was working previously, the service will use cached configuration stored locally but will not respond to any configuration changes until the issue
is resolved.
This issue can be caused by the following factors:
- Basic network connectivity issues
- Firewall settings
- Active Directory Domain Services (AD DS) issues
Resolutions
- Test basic network connectivity
- Check Firewall settings
Test basic network connectivity
To test network connectivity with the affected server, use the following procedure:
- Open a command prompt window and then use the ping command to check basic network connectivity.
If the ping command fails, it is likely that the server is not running, or has network problems that require local access to resolve. If ping is blocked in your network environment, skip this step. - If the ping command is successful, test the server’s registration in DNS by using the
nslookup command.
If the nslookup command fails, there is a problem with DNS. Check the DNS server health or contact the DNS server administrator. - If the nslookup command succeeds, DNS is working properly.
Note: For more information about troubleshooting network issues, see
article 325487 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?linkid=46059).
Check Firewall settings
If a firewall has been configured between replication partners, ensure that it is not blocking RPC communication. DFS Replication depends on RPC for communication. DFS Replication uses the RPC Endpoint Mapper (port 135) and a randomly assigned
dynamic port in the range of 49152 through 65535 for Windows Server 2008 R2 and Windows Server 2008, or in the range of 1025 through 5000 for Windows Server 2003 R2.
You can use the Dfsrdiag command-line tool to specify a static port instead of the dynamic port. For more information about how to specify the RPC Endpoint Mapper, see
article 154596 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=73991). For more information about dynamic port usage in Windows Server 2008, see
article 929851 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=187092).
Verification
To test DFS Replication’s ability to communicate with AD DS, open a command prompt window and then type the following command:
Dfsrdiag pollad /verbose. The command should report Operation Succeeded. If not, there is a problem communicating with AD DS.
See Also
- DFS Replication Event 1202 (for Windows Server 2003 R2)
- Remove From My Forums
-
Question
-
We are seeing this error every 1 minute on two Windows Server 2008 R2 domain controllers that were recently installed at a remote site:
Source: ADWS
Error: 1202
This computer is now hosting the specified directory instance, but Active Directory Web Services could not service it. Active Directory Web Services will retry this operation periodically.Directory instance: GC
Directory instance LDAP port: 3268
Directory instance SSL port: 3269
Answers
-
Hi,
Are both domain controllers also GC? Please verify that they are fully synchronized.
Generally speaking, the 1202 event indicates the machine became a GC but ADWS couldn’t establish a connection to it on the GC port. ADWS will keep retrying, so if there’s a subsequent 1200 event («is now servicing the specified directory instance») for the GC instance, it was a transient issue and solved itself.
This posting is provided «AS IS» with no warranties, and confers no rights.
-
Marked as answer by
Tuesday, February 16, 2010 5:27 AM
-
Marked as answer by
Перейти к контенту
Table of Contents
- Event Details
- Summary
- Causes
- Resolutions
- Test basic network connectivity
- Check Firewall settings
- Verification
- See Also
Event Details
Product: | Windows Operating System |
Event ID: | 1202 |
Source: | DFSR |
Version: | Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 R2 |
Message: | Service could not contact domain controller to access configuration objects |
Summary
The DFS Replication service failed to contact a domain controller to access configuration information. The service will try again during the next configuration polling cycle. This event can be caused by TCP/IP connectivity, firewall, Active Directory Domain
Services, or DNS issues.
Causes
DFS Replication failed to contact a domain controller to retrieve configuration information. If replication was working previously, the service will use cached configuration stored locally but will not respond to any configuration changes until the issue
is resolved.
This issue can be caused by the following factors:
- Basic network connectivity issues
- Firewall settings
- Active Directory Domain Services (AD DS) issues
Resolutions
- Test basic network connectivity
- Check Firewall settings
Test basic network connectivity
To test network connectivity with the affected server, use the following procedure:
- Open a command prompt window and then use the ping command to check basic network connectivity.
If the ping command fails, it is likely that the server is not running, or has network problems that require local access to resolve. If ping is blocked in your network environment, skip this step.
- If the ping command is successful, test the server’s registration in DNS by using the
nslookup command.
If the nslookup command fails, there is a problem with DNS. Check the DNS server health or contact the DNS server administrator. - If the nslookup command succeeds, DNS is working properly.
Note: For more information about troubleshooting network issues, see
article 325487 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?linkid=46059).
Check Firewall settings
If a firewall has been configured between replication partners, ensure that it is not blocking RPC communication. DFS Replication depends on RPC for communication. DFS Replication uses the RPC Endpoint Mapper (port 135) and a randomly assigned
dynamic port in the range of 49152 through 65535 for Windows Server 2008 R2 and Windows Server 2008, or in the range of 1025 through 5000 for Windows Server 2003 R2.
You can use the Dfsrdiag command-line tool to specify a static port instead of the dynamic port. For more information about how to specify the RPC Endpoint Mapper, see
article 154596 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=73991). For more information about dynamic port usage in Windows Server 2008, see
article 929851 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=187092).
Verification
To test DFS Replication’s ability to communicate with AD DS, open a command prompt window and then type the following command:
Dfsrdiag pollad /verbose. The command should report Operation Succeeded. If not, there is a problem communicating with AD DS.
See Also
- DFS Replication Event 1202 (for Windows Server 2003 R2)
- Remove From My Forums
-
Question
-
I have set up a replication group and folder between two 2012R2 servers. Replication works fine until I reboot one of them. Then I get Error 1202 in the Events log with this message:
The DFS Replication service failed to contact domain controller to access configuration information. Replication is stopped. The service will try again during the next configuration polling cycle, which will occur in 60 minutes. This event can be caused
by TCP/IP connectivity, firewall, Active Directory Domain Services, or DNS issues.
Additional Information:
Error: 160 (One or more arguments are not correct.)I cannot tell which argument is not correct.
I am also puzzled why I was able to set up the replication initially, and it works fine, if the two systems can’t talk to the domain controller.
I am not sure there is a shutdown timeout and that I am falling in to the ‘Dirty shutdown’ scenario because I can’t find the events 1006 or 1008 indicating DFS stopping/stopped events. This is Windows Server 2012, so the hotfix for 2008 to change the
DFS recovery should be applied. And, this is NOT a very active folder so, I expect there is nothing replicating at the time I issue a reboot.And, when I try the wmic command to resume replication I get an error.
And, I get these messages after reboot.
20180806 16:09:10.500 2572 SYSM 3830 Migration::SysVolMigration::Connect [MIG] Trying to connect to Local or any writable Dc AD
20180806 16:09:10.500 2572 CFAD 311 Config::AdConnection::Connect Binding to dcAddr:my.dc.ip.address dcDnsName:my.dc.dns.name
20180806 16:09:10.500 2572 CFAD 143 Config::AdConnection::BindToAd Trying to connect. hostName:my.dc.dns.name
20180806 16:09:10.500 2572 CFAD 162 Config::AdConnection::BindToAd Bound. hostName:my.dns.host.name
20180806 16:09:10.500 2572 CFAD 199 Config::AdConnection::BindToDc Try to bind. hostName:my.dc.domain.name domainName:<null>
20180806 16:09:10.500 2572 CFAD 3373 [ERROR] Config::DsSession::Bind Failed to DsBind(). dc:my.dc.domain.name domainName:<null> Error:5
20180806 16:09:10.500 2572 CFAD 215 Config::AdConnection::BindToDc (Ignored) Failed to bind. hostName:my.dc.domain.name domainName:<null> Error:[Error:5(0x5) Config::DsSession::Bind ad.cpp:streetAddress Access is denied.]
20180806 16:09:10.500 2572 CFAD 199 Config::AdConnection::BindToDc Try to bind. hostName:my.dc.IP.address domainName:<null>
20180806 16:09:10.500 2572 CFAD 3373 [ERROR] Config::DsSession::Bind Failed to DsBind(). dc:my.dc.IP.address domainName:<null> Error:87
20180806 16:09:10.500 2572 CFAD 215 Config::AdConnection::BindToDc (Ignored) Failed to bind. hostName:my.dc.IP.address domainName:<null> Error:[Error:87(0x57) Config::DsSession::Bind ad.cpp:street address The parameter is incorrect.]
20180806 16:09:10.500 2572 W2CH 779 [WARN] ConfigurationHelper::PollAdConfigNow Failed to get migration status. Error:
+ [Error:160(0xa0) Migration::SysVolMigration::IsLocalComputerLongHornLevelDc migration.cpp:StreetAddress One or more arguments are not correct.]
+ [Error:160(0xa0) Migration::SysVolMigration::Connect migration.cpp:StreetAddress One or more arguments are not correct.]
+ [Error:160(0xa0) Config::AdConfig::ConnectToLocalDc ad.cpp:StreetAddress One or more arguments are not correct.]So, Why am I able to create the DFSR group, and it works until reboot, then it breaks? If there is an AD parameter wrong, which is it, and why does it not find that when I create the replication group?
Answers
-
Hi,
Based on my knowledge, in general, after reboot dfs server, the server will contact the DC to find the dfs database and it should establish the dfs replication with other dfs servers again.
In your scenario, it seems blocked after reboot. Now you have already disable firewall, it shouldn’t be blocked then.
I’m afraid for dedicated Support about such performance analysis you might need to contact Microsoft Customer Support Services (CSS).
It is also appreciated that the other members in our forum can share their experience with us about this scenario.
To obtain the phone numbers for specific technology request, please refer to the website listed below:
https://www.microsoft.com/en-us/worldwide.aspx
Appreciate your support and understanding.
Best Regards,
Mary
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact
tnmff@microsoft.com.- Marked as answer by
Thursday, August 16, 2018 2:42 PM
- Marked as answer by
- Remove From My Forums
-
Question
-
I have set up a replication group and folder between two 2012R2 servers. Replication works fine until I reboot one of them. Then I get Error 1202 in the Events log with this message:
The DFS Replication service failed to contact domain controller to access configuration information. Replication is stopped. The service will try again during the next configuration polling cycle, which will occur in 60 minutes. This event can be caused
by TCP/IP connectivity, firewall, Active Directory Domain Services, or DNS issues.
Additional Information:
Error: 160 (One or more arguments are not correct.)I cannot tell which argument is not correct.
I am also puzzled why I was able to set up the replication initially, and it works fine, if the two systems can’t talk to the domain controller.
I am not sure there is a shutdown timeout and that I am falling in to the ‘Dirty shutdown’ scenario because I can’t find the events 1006 or 1008 indicating DFS stopping/stopped events. This is Windows Server 2012, so the hotfix for 2008 to change the
DFS recovery should be applied. And, this is NOT a very active folder so, I expect there is nothing replicating at the time I issue a reboot.And, when I try the wmic command to resume replication I get an error.
And, I get these messages after reboot.
20180806 16:09:10.500 2572 SYSM 3830 Migration::SysVolMigration::Connect [MIG] Trying to connect to Local or any writable Dc AD
20180806 16:09:10.500 2572 CFAD 311 Config::AdConnection::Connect Binding to dcAddr:my.dc.ip.address dcDnsName:my.dc.dns.name
20180806 16:09:10.500 2572 CFAD 143 Config::AdConnection::BindToAd Trying to connect. hostName:my.dc.dns.name
20180806 16:09:10.500 2572 CFAD 162 Config::AdConnection::BindToAd Bound. hostName:my.dns.host.name
20180806 16:09:10.500 2572 CFAD 199 Config::AdConnection::BindToDc Try to bind. hostName:my.dc.domain.name domainName:<null>
20180806 16:09:10.500 2572 CFAD 3373 [ERROR] Config::DsSession::Bind Failed to DsBind(). dc:my.dc.domain.name domainName:<null> Error:5
20180806 16:09:10.500 2572 CFAD 215 Config::AdConnection::BindToDc (Ignored) Failed to bind. hostName:my.dc.domain.name domainName:<null> Error:[Error:5(0x5) Config::DsSession::Bind ad.cpp:streetAddress Access is denied.]
20180806 16:09:10.500 2572 CFAD 199 Config::AdConnection::BindToDc Try to bind. hostName:my.dc.IP.address domainName:<null>
20180806 16:09:10.500 2572 CFAD 3373 [ERROR] Config::DsSession::Bind Failed to DsBind(). dc:my.dc.IP.address domainName:<null> Error:87
20180806 16:09:10.500 2572 CFAD 215 Config::AdConnection::BindToDc (Ignored) Failed to bind. hostName:my.dc.IP.address domainName:<null> Error:[Error:87(0x57) Config::DsSession::Bind ad.cpp:street address The parameter is incorrect.]
20180806 16:09:10.500 2572 W2CH 779 [WARN] ConfigurationHelper::PollAdConfigNow Failed to get migration status. Error:
+ [Error:160(0xa0) Migration::SysVolMigration::IsLocalComputerLongHornLevelDc migration.cpp:StreetAddress One or more arguments are not correct.]
+ [Error:160(0xa0) Migration::SysVolMigration::Connect migration.cpp:StreetAddress One or more arguments are not correct.]
+ [Error:160(0xa0) Config::AdConfig::ConnectToLocalDc ad.cpp:StreetAddress One or more arguments are not correct.]So, Why am I able to create the DFSR group, and it works until reboot, then it breaks? If there is an AD parameter wrong, which is it, and why does it not find that when I create the replication group?
Answers
-
Hi,
Based on my knowledge, in general, after reboot dfs server, the server will contact the DC to find the dfs database and it should establish the dfs replication with other dfs servers again.
In your scenario, it seems blocked after reboot. Now you have already disable firewall, it shouldn’t be blocked then.
I’m afraid for dedicated Support about such performance analysis you might need to contact Microsoft Customer Support Services (CSS).
It is also appreciated that the other members in our forum can share their experience with us about this scenario.
To obtain the phone numbers for specific technology request, please refer to the website listed below:
https://www.microsoft.com/en-us/worldwide.aspx
Appreciate your support and understanding.
Best Regards,
Mary
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact
tnmff@microsoft.com.- Marked as answer by
Thursday, August 16, 2018 2:42 PM
- Marked as answer by
-
#1
Доброго времени суток! Как узнать какой тип репликации используется в домене DFS или NTFRS ?
В журналах домен контроллера есть и такие события
Источник DFSR event id 1202
Службе репликации DFS не удалось связаться с контроллером домена , чтобы получить сведения о конфигурации. Репликация остановлена. Служба вновь попытается это сделать во время следующего цикла опроса, который произойдет через 60 мин. Это событие может быть вызвано проблемами с подключением TCP/IP, брандмауэром, доменными службами Active Directory или DNS.
Дополнительные сведения:
Ошибка: 160 (Неверны один или несколько аргументов.)
и так же
Источник NTFRS код 13508
Служба репликации файлов столкнулась с проблемами при включении репликации с «SDC» на «PDC» для «c:windowssysvoldomain», использующего DNS-имя «SDC.DOMAIN.Local». Служба репликации файлов (FRS) продолжит повторные попытки.
Ниже указаны причины, по которым может выдаваться это предупреждение.[1] FRS не может разрешить DNS-имя «SDC.DOMAIN.Local» с этого компьютера.
[2] FRS не запущена на «SDC.DOMAIN.Local».
[3] Сведения о топологии в доменных службах Active Directory для этой реплики реплицированы еще не на все контроллеры домена.Это сообщение об ошибке записывается в журнал для каждого подключения один раз. После исправления ошибки в журнал будет записано другое сообщение, означающее, что соединение установлено.
Как можно наверняка узнать что используется ??
-
#2
Воспользуйтесь поиском — тут кто то недавно совсем спрашивал. Можно через adsiedit оснастку
-
#3
[h=3]Переход на репликацию SYSVOL по DFS[/h] Предварительные требования
- Все контроллеры домена должны быть обновлены до функционального уровня Windows Server 2008 или выше
- Перед процедурой миграции необходимо выполнить принудительную полную миграцию разделов Active Directory на каждом из контроллеров домена, выполнив:
Repadmin /syncall /force /APed
Убедится что репликация работает имеется множество способов один из которых:
Active Directory Replication Status Tool
repadmin /showrepl
Проверяем состояние sysvol
Dcdiag /e /test:sysvolcheck /test:advertising
Проверим состояние службы DFS, выполнив команды:
dfsrmig /getGlobalState
dfsrmig /getmigrationstate
Начало миграции.
1. Установим флаг подготовки к миграции (global state:
Prepared), выполнив команду:
dfsrmig /setGlobalState 1
2. Текущее состояние контроллеров проверим командой: dfsrmig /getmigrationstate,
Перенаправление продуктивной папки
- Прежде чем перейди к следующему этапу миграции (состояние Redirected), необходимо убедиться что:
- Все контроллеры домена находятся в состоянии Prepared. Удостоверьтесь, что шара SYSVOL еще доступна.
1. Перейдем к следующему этапу миграции, набрав
dfsrmig /setGlobalState 2 2. Убедимся, что все контроллеры домена находятся в статусе Redirected:
dfsrmig /getmigrationstate
Удаляем каталог SYSVOL Примечание! Процесс удаления («Eliminated«) не может быть отменен!
Прежде чем перейди в режим Elminated, необходимо убедиться что:
- Все контроллеры домена находятся в статусе Redirected
- Шара SYSVOL все еще доступна
1. Набираем команду:
dfsrmig /setGlobalState 3
2. Проверяем статус командой:
dfsrmig /getmigrationstate
В результате каталог SYSVOL будет мигрирован в папку SYSVOL_DFSR. Теперь для репликации SYSVOL применяется механизм DFS.
I ran across an interesting issue I wanted to share. I had a customer that recently had a migration performed. Previously he was running SBS (Small Business Server) 2011 and is now running Windows Server Essentials 2016. After demoting and removing the SBS 2011 server, he started receiving the following error on every boot.
The error is quickly followed by an informational message indicating that DFSR (Domain File System Replication) successfully connected to a domain controller.
Based on my previous experience with similar issues I posited that the problem was due to the DFSR service starting before either the network stack was fully initialized or before the DNS (Domain Name System) service was running.
I explained that based on the behavior this could safely be ignored. This did not go over very well as the error also shows up in the Windows Essentials health report. This brings us to the solution. And this solution will work for just about any service that needs a little more time at boot. We set the startup type for the DFSR service to Automatic (Delayed Start). We restarted the server and this eliminated the 1202 error.
I hope that you found this article informative. If you have anything to add, please feel free to leave a comment below.
title | description | ms.date | author | ms.author | manager | audience | ms.topic | ms.prod | localization_priority | ms.reviewer | ms.custom | ms.technology |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Troubleshoot SCECLI 1202 events |
Describes ways to troubleshoot and to resolve SCECLI 1202 events. |
04/28/2023 |
Deland-Han |
delhan |
dcscontentpm |
itpro |
troubleshooting |
windows-server |
medium |
kaushika |
sap:group-policy-management-gpmc-or-agpm, csstroubleshoot |
windows-server-group-policy |
Troubleshoot SCECLI 1202 events
This article describes ways to troubleshoot and to resolve SCECLI 1202 events.
Applies to: Windows Server 2012 R2
Original KB number: 324383
Summary
The first step in troubleshooting these events is to identify the Win32 error code. This error code distinguishes the type of failure that causes the SCECLI 1202 event. Below is an example of a SCECLI 1202 event. The error code is shown in the Description field. In this example, the error code is 0x534. The text after the error code is the error description. After you determine the error code, find that error code section in this article, and then follow the troubleshooting steps in that section.
0x534: No mapping between account names and security IDs was done.
or
0x6fc: The trust relationship between the primary domain and the trusted domain failed.
Error code 0x534: No mapping between account names and security IDs was done
These error codes mean that there was a failure to resolve a security account to a security identifier (SID). The error typically occurs either because an account name was mistyped, or because the account was deleted after it was added to the security policy setting. It typically occurs in the User Rights section or the Restricted Groups section of the security policy setting. It may also occur if the account exists across a trust and then the trust relationship is broken.
To troubleshoot this issue, follow these steps:
-
Determine the account that is causing the failure. To do so, enable debug logging for the Security Configuration client-side extension:
-
Start Registry Editor.
-
Locate and then select the following registry subkey:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonGPExtensions{827D319E-6EAC-11D2-A4EA-00C04F7 9F83A}
-
On the Edit menu, select Add Value, and then add the following registry value:
- Value name: ExtensionDebugLevel
- Data type: DWORD
- Value data: 2
-
Exit Registry Editor.
-
-
Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following command at the command prompt, and then press ENTER:
secedit /refreshpolicy machine_policy /enforce
This command creates a file that is named Winlogon.log in the
%SYSTEMROOT%SecurityLogs
folder. -
Find the problem account. To do so, type the following command at the command prompt, and then press ENTER:
find /i "cannot find" %SYSTEMROOT%securitylogswinlogon.log
The Find output identifies the problem account names, for example, Cannot find MichaelPeltier. In this example, the user account MichaelPeltier doesn’t exist in the domain. Or it has a different spelling, such as MichellePeltier.
Determine why this account can’t be resolved. For example, look for typographical errors, a deleted account, the wrong policy that applies to this computer, or a trust problem.
-
If you determine that the account must be removed from the policy, find the problem policy and the problem setting. To determine which setting contains the unresolved account, type the following command at the command prompt on the computer that’s producing the SCECLI 1202 event, and then press ENTER:
c:>find /i "account name" %SYSTEMROOT%securitytemplatespoliciesgpt*.*
For this example, the syntax and the results are:
c:>find /i "MichaelPeltier" %SYSTEMROOT%securitytemplatespoliciesgpt*.* ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00000.DOM ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00001.INF ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00002.INF SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-550,MichaelPeltier,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548 ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00003.DOM
It identifies GPT00002.inf as the cached security template from the problem Group Policy object (GPO) that contains the problem setting. It also identifies the problem setting as SeInteractiveLogonRight. The display name for SeInteractiveLogonRight is Logon locally.
For a map of the constants (for example, SeInteractiveLogonRight) to their display names (for example, Logon locally), see the Microsoft Windows 2000 Server Resource Kit, Distributed Systems Guide. The map is in the User Rights section of the Appendix.
-
Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text
GPOPath=
. In this example, you would see:GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}MACHINE
{6AC1786C-016F-11D2-945F-00C04FB984F9} is the GUID of the GPO.
-
To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following command at the command prompt, and then press ENTER:
Search the output for the GUID that you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details: ------------------------------------------------------------ DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy
Now you’ve identified the problem account, the problem setting, and the problem GPO. To resolve the problem, remove or replace the problem entry.
Error code 0x2: The system cannot find the file specified
This error is similar to 0x534 and to 0x6fc. It’s caused by an irresolvable account name. When the 0x2 error occurs, it typically indicates that the irresolvable account name is specified in a Restricted Groups policy setting.
To troubleshoot this issue, follow these steps:
-
Determine which service or which object is having the failure. To do so, enable debug logging for the Security Configuration client-side extension:
-
Start Registry Editor.
-
Locate and then select the following registry subkey:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonGPExtensions{827D319E-6EAC-11D2-A4EA-00C04F7 9F83A}
-
On the Edit menu, select Add Value, and then add the following registry value:
- Value name: ExtensionDebugLevel
- Data type: DWORD
- Value data: 2
-
Exit Registry Editor.
-
-
Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following command at the command prompt, and then press ENTER:
secedit /refreshpolicy machine_policy /enforce
This command creates a file that’s named Winlogon.log in the
%SYSTEMROOT%SecurityLogs
folder. -
At the command prompt, type the following command, and then press ENTER:
find /i "cannot find" %SYSTEMROOT%securitylogswinlogon.log
The Find output identifies the problem account names, for example, Cannot find MichaelPeltier. In this example, the user account MichaelPeltier doesn’t exist in the domain. Or it has a different spelling—for example, MichellePeltier.
Determine why this account can’t be resolved. For example, look for typographical errors, a deleted account, the wrong policy applying to this computer, or a trust problem.
-
If you determine that the account has to be removed from the policy, find the problem policy and the problem setting. To find what setting contains the unresolved account, type the following command at the command prompt on the computer that’s producing the SCECLI 1202 event, and then press ENTER:
c:>find /i "account name" %SYSTEMROOT%securitytemplatespoliciesgpt*.*
For this example, the syntax and the results are:
c:>find /i "MichaelPeltier" %SYSTEMROOT%securitytemplatespoliciesgpt*.* ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00000.DOM ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00001.INF ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00002.INF SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-550,JohnDough,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548 ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00003.DOM
It identifies GPT00002.inf as the cached security template from the problem GPO that contains the problem setting. It also identifies the problem setting as SeInteractiveLogonRight. The display name for SeInteractiveLogonRight is Logon locally.
For a map of the constants (for example, SeInteractiveLogonRight) to their display names (for example, Logon locally), see the Windows 2000 Server Resource Kit, Distributed Systems Guide. The map is in the User Rights section of the Appendix.
-
Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text
GPOPath=
. In this example, you would see:GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}MACHINE
{6AC1786C-016F-11D2-945F-00C04FB984F9} is the GUID of the GPO.
-
To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following command at the command prompt, and then press ENTER:
Search the output for the GUID you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details: ------------------------------------------------------------ DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy
You have now identified the problem account, the problem setting, and the problem GPO. To resolve the problem, search the Restricted Groups section of the security policy for instances of the problem account (in this example, MichaelPeltier), and then remove or replace the problem entry.
Error code 0x5: Access denied
This error typically occurs when the system hasn’t been granted the correct permissions to update the access control list of a service. It may occur if the Administrator defines permissions for a service in a policy but doesn’t grant the System account Full Control permissions.
To troubleshoot this issue, follow these steps:
-
Determine which service or which object is having the failure. To do so, enable debug logging for the Security Configuration client-side extension:
-
Start Registry Editor.
-
Locate and then select the following registry subkey:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonGPExtensions{827D319E-6EAC-11D2-A4EA-00C04F7 9F83A}
-
On the Edit menu, select Add Value, and then add the following registry value:
- Value name: ExtensionDebugLevel
- Data type: DWORD
- Value data: 2
-
Exit Registry Editor.
-
-
Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following command at the command prompt, and then press ENTER:
secedit /refreshpolicy machine_policy /enforce
This command creates a file that is named Winlogon.log in the
%SYSTEMROOT%SecurityLogs
folder. -
At the command prompt, type the following, and then press ENTER:
find /i "error opening" %SYSTEMROOT%securitylogswinlogon.log
The Find output identifies the service with the misconfigured permissions, for example, Error opening Dnscache. Dnscache is the short name for the DNS Client service.
-
Find out which policy or which policies are trying to modify the service permissions. To do so, type the following command at the command prompt, and then press ENTER:
find /i "service" %SYSTEMROOT%securitytemplatespoliciesgpt*.*".
Below is a sample command and its output:
d:>find /i "dnscache" %windir%securitytemplatespoliciesgpt*.* ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00000.DOM ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00001.INF ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00002.INF Dnscache,3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;LA)" ---------- D:WINNTSECURITYTEMPLATESPOLICIESGPT00003.DOM
-
Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text
GPOPath=
. In this example, you would see:GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}MACHINE
{6AC1786C-016F-11D2-945F-00C04FB984F9} is the GUID of the GPO.
-
To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following command at the command prompt, and then press ENTER:
Search the output for the GUID that you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details: ------------------------------------------------------------ DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy
Now you have identified the service with the misconfigured permissions and the problem GPO. To resolve the problem, search the System Services section of the security policy for instances of the service with the misconfigured permissions. And then take corrective action to grant the System account Full Control permissions to the service.
Error code 0x4b8: An extended error has occurred
The 0x4b8 error is generic and can be caused by many different problems. To troubleshoot these errors, follow these steps:
-
Enable debug logging for the Security Configuration client-side extension:
-
Start Registry Editor.
-
Locate and then select the following registry subkey:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonGPExtensions{827D319E-6EAC-11D2-A4EA-00C04F7 9F83A}
-
On the Edit menu, select Add Value, and then add the following registry value:
- Value name: ExtensionDebugLevel
- Data type: DWORD
- Value data: 2
-
Exit Registry Editor.
-
-
Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following command at the command prompt, and then press ENTER:
secedit /refreshpolicy machine_policy /enforce
This command creates a file that is named Winlogon.log in the
%SYSTEMROOT%SecurityLogs
folder. -
See ESENT event IDs 1000, 1202, 412, and 454 are logged repeatedly in the Application log. This article describes known issues that cause the 0x4b8 error.
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following the steps mentioned in Gather information by using TSSv2 for Group Policy issues.
У меня 3 сервера AD 2016, уровень AD 2012.
С самого начала: я заметил, что они не обновляются с WSUS. Когда я попытался исправить это, я заметил, что я получаю 1202 ошибки, и когда я запускал windowsupdatelogs из powershell, я заметил, что это не разрешает имена на выходе.
Затем один из серверов AD потерпел крах. Я почистил AD, перестроил его и вернул обратно в домен и обновил, реплицировал и все «отлично» выглядит. 1202 ошибка отображения имени все еще со мной.
Когда я запускаю:
dcdiag /c /a, я получаю:
DsBindWithSpnEx() завершился ошибкой 1722, сервер RPC недоступен..
Это единственная ошибка, которую я вижу в команде… Тем не менее, восстановленный сервер реплицирован, включая DNS. Я могу запросить DNS, и он работает на всех серверах. Я ношу много шляп, и это было какое-то время с тех пор, как я сделал какие-либо проблемы с AD. Я добавил 127.0.0.1 как 2-й DNS в список DNS-серверов на всех серверах AD, и все стало немного лучше, поскольку серверы AD быстрее реагируют и видят друг друга.
Я подумал, что позволю ему немного поработать, прежде чем я внесу какие-либо изменения.
Я получаю ту же ошибку сегодня.
«Политики безопасности были распространены с предупреждением. 0x534: сопоставление имен учетных записей и идентификаторов безопасности не проводилось». 1202 ошибка снова.
Когда я пытаюсь посмотреть на мастера операций домена или любого другого, я получаю ОШИБКУ в поле мастера операций именования доменов.
На странице ниже команды не работают на сервере 2016. Он должен помочь вам найти учетные записи по ошибке. https://support.microsoft.com/en-us/help/324383/troubleshooting-scecli-1202-events.