Domain joining issue

Hi,
following is the error while joining a 2008 R2 sp1 server to the domain
NetpLdapBind: ldap_bind failed on <DC>: 86: Auth Unknown
NetpJoinDomainOnDs: Function exits with status of: 0x52b
Any clue?

If the Patch from Lany Zhang(MSFT) does not correct the issue we will need to start looking at the domain and forest health, and communication between the clients and domain
Whats the Forest Functional Level?
Domain Functional Level?
Domain Controllers OS level?
Ipconfig /all From both the client (2008 R2) and the domain controller.
Would also like to know if replication between domain controllers is healthy.
So based on http://msdn.microsoft.com/en-us/library/gg465310.aspx
LDAP_Auth_Unknown(0x56) basically translates to the windows world as ERROR_WRONG_PASSWORD
Brad Held http://windorks.wordpress.com

Similar Messages

  • Domain Join Issue during Task Sequence

    SCCM 2012 R2 CU3 running Primary Site.
    Using SCCM task sequence. Everything works except the machine won't join the domain.
    Netsetup.log
    12/20/2013 10:17:01:583 NetpDomainJoinLicensingCheck: ulLicenseValue=1, Status: 0x0
    12/20/2013 10:17:01:583 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:01:583 NetpMachineValidToJoin: status: 0x0
    12/20/2013 10:17:01:583 NetpJoinDomain
    12/20/2013 10:17:01:583  Machine: 243WIN7BASETST
    12/20/2013 10:17:01:583  Domain: judicial
    12/20/2013 10:17:01:583  MachineAccountOU: (NULL)
    12/20/2013 10:17:01:583  Account: judicial\pcsetup2
    12/20/2013 10:17:01:583  Options: 0x27
    12/20/2013 10:17:01:583 NetpLoadParameters: loading registry parameters...
    12/20/2013 10:17:01:583 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 10:17:01:583 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 10:17:01:583 NetpLoadParameters: status: 0x2
    12/20/2013 10:17:01:583 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 10:17:01:692 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 10:17:01:692 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 10:17:01:692 NetpDsGetDcName: trying to find DC in domain 'judicial', flags: 0x40001010
    12/20/2013 10:17:16:699 NetpDsGetDcName: failed to find a DC having account '243WIN7BASETST$': 0x525, last error is 0x0
    12/20/2013 10:17:16:699 NetpLoadParameters: loading registry parameters...
    12/20/2013 10:17:16:699 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 10:17:16:699 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 10:17:16:699 NetpLoadParameters: status: 0x2
    12/20/2013 10:17:16:699 NetpDsGetDcName: status of verifying DNS A record name resolution for 'ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:699 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 10:17:16:699 NetpJoinDomainOnDs: NetpDsGetDcName returned: 0x0
    12/20/2013 10:17:16:746 NetpJoinDomain: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:746 NetpProvisionComputerAccount:
    12/20/2013 10:17:16:746  lpDomain: judicial
    12/20/2013 10:17:16:746  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:746  lpMachineAccountOU: (NULL)
    12/20/2013 10:17:16:746  lpDcName: ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:746  lpDnsHostName: (NULL)
    12/20/2013 10:17:16:746  lpMachinePassword: (null)
    12/20/2013 10:17:16:746  lpAccount: judicial\pcsetup2
    12/20/2013 10:17:16:746  lpPassword: (non-null)
    12/20/2013 10:17:16:746  dwJoinOptions: 0x27
    12/20/2013 10:17:16:746  dwOptions: 0x40000003
    12/20/2013 10:17:16:746 NetpLdapBind: Verified minimum encryption strength on ATREYU1V-PII.jis.state.ct.us: 0x0
    12/20/2013 10:17:16:746 NetpLdapGetLsaPrimaryDomain: reading domain data
    12/20/2013 10:17:16:746 NetpGetNCData: Reading NC data
    12/20/2013 10:17:16:746 NetpGetDomainData: Lookup domain data for: DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:746 NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:746 NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking DNS domain name jis.state.ct.us/ into Netbios on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  name = JUDICIAL\
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  Account does not exist
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking Netbios domain name JUDICIAL\ into root DN on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  name = DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Got DN CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us from the default computer container
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 10:17:16:761   objectClass  =  Computer
    12/20/2013 10:17:16:761   SamAccountName  =  243WIN7BASETST$
    12/20/2013 10:17:16:761   userAccountControl  =  0x1000
    12/20/2013 10:17:16:761   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:16:761   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:16:761   unicodePwd  =  <SomePassword>
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Computer Object does not exist in OU
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Attribute values to set:
    12/20/2013 10:17:16:761   objectClass  =  Computer
    12/20/2013 10:17:16:761   SamAccountName  =  243WIN7BASETST$
    12/20/2013 10:17:16:761   userAccountControl  =  0x1000
    12/20/2013 10:17:16:761   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:16:761   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:16:761   unicodePwd  =  <SomePassword>
    12/20/2013 10:17:16:886 NetpEncodeProvisioningBlob: Encoding provisioning data
    12/20/2013 10:17:16:886 NetpInitBlobWin7: Constructing blob...
    12/20/2013 10:17:16:886 Blob version: 1
    12/20/2013 10:17:16:886  lpDomain: judicial
    12/20/2013 10:17:16:886  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:886  lpMachinePassword: <omitted from log>
    12/20/2013 10:17:16:886    DomainDnsPolicy:
    12/20/2013 10:17:16:886     Name: JUDICIAL
    12/20/2013 10:17:16:886     DnsDomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 10:17:16:886    DcInfo:
    12/20/2013 10:17:16:886     DomainControllerName:
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:886     DomainControllerAddress:
    \\10.16.6.99
    12/20/2013 10:17:16:886     DomainControllerAddressType: 1
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     DomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     Flags: 0xe00031fc
    12/20/2013 10:17:16:886     DcSiteName: Judicial-Data-Centers
    12/20/2013 10:17:16:886     ClientSiteName: EHFD-99ERiver
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886 NetpInitBlobWin7: Blob pickling result: 0
    12/20/2013 10:17:16:886 NetpEncodeProvisioningBlob: result: 0x0
    12/20/2013 10:17:16:886 ldap_unbind status: 0x0
    12/20/2013 10:17:16:886 NetpRequestOfflineDomainJoin:
    12/20/2013 10:17:16:886  dwProvisionBinDataSize: 960
    12/20/2013 10:17:16:886  JoinOptions: 0x27
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886  lpWindowsPath: C:\Windows
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Unpickling provisioning blob with size 960 bytes
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Searching 1 blobs for supported ODJ blob, highest supported version: 1
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Found ODJ blob version: 1
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Selected ODJ blob version: 1
    12/20/2013 10:17:16:886 Blob version: 1
    12/20/2013 10:17:16:886  lpDomain: judicial
    12/20/2013 10:17:16:886  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:886  lpMachinePassword: <omitted from log>
    12/20/2013 10:17:16:886    DomainDnsPolicy:
    12/20/2013 10:17:16:886     Name: JUDICIAL
    12/20/2013 10:17:16:886     DnsDomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 10:17:16:886    DcInfo:
    12/20/2013 10:17:16:886     DomainControllerName:
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:886     DomainControllerAddress:
    \\10.16.6.99
    12/20/2013 10:17:16:886     DomainControllerAddressType: 1
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     DomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     Flags: 0xe00031fc
    12/20/2013 10:17:16:886     DcSiteName: Judicial-Data-Centers
    12/20/2013 10:17:16:886     ClientSiteName: EHFD-99ERiver
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886 NetpDoInitiateOfflineDomainJoin
    12/20/2013 10:17:16:886 NetpDoInitiateOfflineDomainJoin: Setting backup/restore privileges
    12/20/2013 10:17:16:902 NetpInitiateOfflineJoin
    12/20/2013 10:17:16:902  lpLocalRegistryPath: C:\Windows\system32\config\SYSTEM
    12/20/2013 10:17:16:902  dwOptions: 0x40000003
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: Translating provisioning data to internal format
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: Selecting version 1
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: exiting: 0x0
    12/20/2013 10:17:16:902 NetpValidateFullJoinState: Validating provisioning data...
    12/20/2013 10:17:16:902 NetpValidateFullJoinState: exiting: 0x0
    12/20/2013 10:17:16:902 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 10:17:16:902 NetpClearFullJoinState: Status of deleting join state key 0x2
    12/20/2013 10:17:16:902 NetpSaveFullJoinStateInternal: Injecting provisioning data into image...
    12/20/2013 10:17:16:902 NetpSaveFullJoinStateInternal: exiting: 0x0
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Checking for pending name changes...
    12/20/2013 10:17:16:902  SetHostName: TRUE
    12/20/2013 10:17:16:902  SetDnsDomain: TRUE
    12/20/2013 10:17:16:902  SetNetBiosName: TRUE
    12/20/2013 10:17:16:902  SetCurrentValues: TRUE
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting Hostname to 243WIN7BASETST
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting Domain name to jis.state.ct.us
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting NetBios computer name to 243WIN7BASETST
    12/20/2013 10:17:16:917 NetpDoInitiateOfflineDomainJoin: status: 0x0
    12/20/2013 10:17:16:917 NetRequestOfflineDomainJoin: Successfully initiated the offline domain join
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: Setting netlogon cache.
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: status of setting netlogon cache: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: Function exits with status of: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:917 NetpCompleteOfflineDomainJoin
    12/20/2013 10:17:16:917  fBootTimeCaller: FALSE
    12/20/2013 10:17:16:917  fSetLocalGroups: TRUE
    12/20/2013 10:17:16:917 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 10:17:16:917 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainLocal: NetpHandleJoinedStateInfo returned: 0x0
    12/20/2013 10:17:16:917 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 10:17:17:292 NetpJoinDomainLocal: NetpManageMachineSecret returned: 0x0.
    12/20/2013 10:17:17:292 Calling NetpQueryService to get Netlogon service state.
    12/20/2013 10:17:17:292 NetpJoinDomainLocal: NetpQueryService returned: 0x0.
    12/20/2013 10:17:17:417 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 10:17:17:417 NetpJoinDomainLocal: status of setting LSA pri. domain: 0x0
    12/20/2013 10:17:17:417 NetpManageLocalGroupsForJoin: Adding groups for new domain, removing groups from old domain, if any.
    12/20/2013 10:17:17:417 NetpManageLocalGroups: Populating list of account SIDs.
    12/20/2013 10:17:17:760 [000004ec] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:17:791 NetpManageLocalGroupsForJoin: status of modifying groups related to domain 'JUDICIAL' to local groups: 0x0
    12/20/2013 10:17:17:791 NetpManageLocalGroupsForJoin: INFO: No old domain groups to process.
    12/20/2013 10:17:17:791 NetpJoinDomainLocal: Status of managing local groups: 0x0
    12/20/2013 10:17:18:275 [00000164] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: status of setting ComputerNamePhysicalDnsDomain to 'jis.state.ct.us': 0x0
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: Controlling services and setting service start type.
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: Updating W32TimeConfig
    12/20/2013 10:17:18:743 NetpUpdateW32timeConfig: 0x0
    12/20/2013 10:17:18:743 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 10:17:18:743 NetpClearFullJoinState: Status of deleting join state key 0x0
    12/20/2013 10:17:18:743 NetpCompleteOfflineDomainJoin: status: 0x0
    12/20/2013 10:17:18:743 NetpJoinDomain: NetpCompleteOfflineDomainJoin SUCCESS: Requested a reboot :0x0
    12/20/2013 10:17:18:743 NetpDoDomainJoin: status: 0x0
    12/20/2013 10:17:21:953 -----------------------------------------------------------------
    12/20/2013 10:17:21:953 NetpChangeMachineName: from '243WIN7BASETST' to '243WIN7BASEtst' using 'judicial\pcsetup2' [0x1000]
    12/20/2013 10:17:21:953 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 10:17:21:953 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 10:17:21:953 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:21:953 NetpGetDnsHostName: Read NV Domain: jis.state.ct.us
    12/20/2013 10:17:21:969 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\ATREYU1V-PII
    12/20/2013 10:17:21:969 NetpGetComputerObjectDn: Crack results:  (Account already exists) DN = CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:21:969 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 10:17:21:969   DnsHostName  =  243WIN7BASEtst.jis.state.ct.us
    12/20/2013 10:17:21:969   ServicePrincipalName  =  HOST/243WIN7BASEtst.jis.state.ct.us  RestrictedKrbHost/243WIN7BASEtst.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:21:985 NetpModifyComputerObjectInDs: Computer Object already exists in OU:
    12/20/2013 10:17:21:985   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:21:985   ServicePrincipalName  =  RestrictedKrbHost/243WIN7BASETST  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:21:985 NetpModifyComputerObjectInDs: There are _NO_ modifications to do
    12/20/2013 10:17:21:985 ldap_unbind status: 0x0
    12/20/2013 10:17:21:985 NetpChangeMachineName: status of setting DnsHostName and SPN: 0x0
    12/20/2013 13:30:34:370 -----------------------------------------------------------------
    12/20/2013 13:30:34:440 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 13:30:34:460 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 13:30:34:460 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 13:30:34:553 -----------------------------------------------------------------
    12/20/2013 13:30:34:553 NetpValidateName: checking to see if '243WIN7BASEtst.jis.state.ct.us' is valid as type 5 name
    12/20/2013 13:30:34:553 NetpValidateName: name '243WIN7BASEtst.jis.state.ct.us' is valid for type 5
    12/20/2013 13:30:34:569 -----------------------------------------------------------------
    12/20/2013 13:30:34:569 NetpValidateName: checking to see if 'JIS' is valid as type 2 name
    12/20/2013 13:30:34:569 NetpCheckNetBiosNameNotInUse for 'JIS' [ Workgroup as MACHINE]  returned 0x0
    12/20/2013 13:30:34:569 NetpValidateName: name 'JIS' is valid for type 2
    12/20/2013 13:30:34:585 -----------------------------------------------------------------
    12/20/2013 13:30:34:585 NetpUnJoinDomain: unjoin from 'JUDICIAL' using '(null)' creds, options: 0x4
    12/20/2013 13:30:34:585  OS Version: 6.1
    12/20/2013 13:30:34:585  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:34:585  ServicePack: Service Pack 1
    12/20/2013 13:30:34:585  SKU: Windows 7 Professional
    12/20/2013 13:30:34:585 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:34:585 NetpApplyJoinState: actions: 0x2b805a
    12/20/2013 13:30:34:585 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 13:30:34:694 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 13:30:34:819 NetUseAdd to \\ATREYU1V-PII\IPC$ returned 1326
    12/20/2013 13:30:34:819 Trying add to 
    \\ATREYU1V-PII\IPC$ using NULL Session
    12/20/2013 13:30:34:850 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:36:113 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:36:145 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:36:145 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:36:145 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:36:145 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:36:410 SamOpenUser on 48956 failed with 0xc0000022
    12/20/2013 13:30:36:410 NetpManageMachineAccountWithSid: status of disabling account '243WIN7BASETST$' on '\\ATREYU1V-PII': 0x5
    12/20/2013 13:30:36:410 NetpApplyJoinState: status of disabling account: 0x5
    12/20/2013 13:30:36:410 NetpApplyJoinState: initiating a rollback due to earlier errors
    12/20/2013 13:30:36:410 NetpApplyJoinState: actions: 0x440210
    12/20/2013 13:30:36:410 NetpDsGetDcName: trying to find DC in domain '(null)', flags: 0x1020
    12/20/2013 13:30:36:425 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 13:30:36:441 NetUseAdd to
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ returned 1326
    12/20/2013 13:30:36:441 Trying add to 
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ using NULL Session
    12/20/2013 13:30:36:441 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:36:441 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:36:441 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 13:30:36:675 NetpSetMachineAccountPassword: NetUserSetInfo (level 1003) on '\\ATREYU1V-PII.jis.state.ct.us' for '243WIN7BASETST$' failed: 0x5
    12/20/2013 13:30:36:675 NetpApplyJoinState: status of setting machine password: 0x5
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of starting and setting start type of Netlogon to 4: 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: NON FATAL: status of adding DNS registrations: 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:36:956 NetpUnJoinDomain: status: 0x5
    12/20/2013 13:30:41:886 -----------------------------------------------------------------
    12/20/2013 13:30:41:886 NetpUnJoinDomain: unjoin from 'JUDICIAL' using 'jis.state.ct.us\a' creds, options: 0x4
    12/20/2013 13:30:41:886  OS Version: 6.1
    12/20/2013 13:30:41:886  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:41:886  ServicePack: Service Pack 1
    12/20/2013 13:30:41:886  SKU: Windows 7 Professional
    12/20/2013 13:30:41:886 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:41:886 NetpApplyJoinState: actions: 0x2b805a
    12/20/2013 13:30:41:886 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 13:30:41:886 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 13:30:44:974 NetUseAdd to \\ATREYU1V-PII\IPC$ returned 1326
    12/20/2013 13:30:44:974 Trying add to 
    \\ATREYU1V-PII\IPC$ using NULL Session
    12/20/2013 13:30:44:990 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:46:301 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:46:301 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:46:301 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:46:301 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:46:301 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:46:394 SamOpenUser on 48956 failed with 0xc0000022
    12/20/2013 13:30:46:394 NetpManageMachineAccountWithSid: status of disabling account '243WIN7BASETST$' on '\\ATREYU1V-PII': 0x5
    12/20/2013 13:30:46:394 NetpApplyJoinState: status of disabling account: 0x5
    12/20/2013 13:30:46:394 NetpApplyJoinState: initiating a rollback due to earlier errors
    12/20/2013 13:30:46:394 NetpApplyJoinState: actions: 0x440210
    12/20/2013 13:30:46:394 NetpDsGetDcName: trying to find DC in domain '(null)', flags: 0x1020
    12/20/2013 13:30:46:410 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 13:30:46:425 NetUseAdd to
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ returned 1326
    12/20/2013 13:30:46:425 Trying add to 
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ using NULL Session
    12/20/2013 13:30:46:425 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:46:425 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:46:425 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 13:30:46:659 NetpSetMachineAccountPassword: NetUserSetInfo (level 1003) on '\\ATREYU1V-PII.jis.state.ct.us' for '243WIN7BASETST$' failed: 0x5
    12/20/2013 13:30:46:659 NetpApplyJoinState: status of setting machine password: 0x5
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of starting and setting start type of Netlogon to 4: 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: NON FATAL: status of adding DNS registrations: 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:46:815 NetpUnJoinDomain: status: 0x5
    12/20/2013 13:30:46:831 -----------------------------------------------------------------
    12/20/2013 13:30:46:831 NetpUnJoinDomain: unjoin from 'JUDICIAL' using 'jis.state.ct.us\a' creds, options: 0x0
    12/20/2013 13:30:46:831  OS Version: 6.1
    12/20/2013 13:30:46:831  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:46:831  ServicePack: Service Pack 1
    12/20/2013 13:30:46:831  SKU: Windows 7 Professional
    12/20/2013 13:30:46:831 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:46:831 NetpApplyJoinState: actions: 0x2b005a
    12/20/2013 13:30:47:096 [000009d8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:47:611 [000004e8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:173 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:48:173 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:48:173 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:173 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:48:173 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:48:391 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 13:30:48:391 NetpApplyJoinState: status of setting LSA pri. domain: 0x0
    12/20/2013 13:30:48:625 NetpApplyJoinState: status of clearing ComputerNamePhysicalDnsDomain: 0x0
    12/20/2013 13:30:48:625 NetpManageLocalGroups: Populating list of account SIDs.
    12/20/2013 13:30:48:858 [000004e8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:889 NetpApplyJoinState: status of removing from local groups: 0x0
    12/20/2013 13:30:48:889 NetpUpdateW32timeConfig: 0x0
    12/20/2013 13:30:48:905 NetpUnJoinDomain: status: 0x0
    12/20/2013 13:30:48:936 -----------------------------------------------------------------
    12/20/2013 13:30:48:936 NetpDoDomainJoin
    12/20/2013 13:30:48:936 NetpMachineValidToJoin: '243WIN7BASETST'
    12/20/2013 13:30:48:936  OS Version: 6.1
    12/20/2013 13:30:48:936  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:48:936  ServicePack: Service Pack 1
    12/20/2013 13:30:48:952  SKU: Windows 7 Professional
    12/20/2013 13:30:48:952 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:952 NetpMachineValidToJoin: status: 0x0
    12/20/2013 13:30:48:952 NetpJoinWorkgroup: joining computer '243WIN7BASETST' to workgroup 'JIS'
    12/20/2013 13:30:48:952 NetpValidateName: checking to see if 'JIS' is valid as type 2 name
    12/20/2013 13:30:48:952 NetpCheckNetBiosNameNotInUse for 'JIS' [ Workgroup as MACHINE]  returned 0x0
    12/20/2013 13:30:48:952 NetpValidateName: name 'JIS' is valid for type 2
    12/20/2013 13:30:49:077 NetpSetLsaPrimaryDomain: for 'JIS' status: 0x0
    12/20/2013 13:30:49:295 NetpJoinWorkgroup: status:  0x0
    12/20/2013 13:30:49:295 NetpDoDomainJoin: status: 0x0
    12/20/2013 13:39:24:681 -----------------------------------------------------------------
    12/20/2013 13:39:24:697 NetpValidateName: checking to see if 'WIN7SP1BASE' is valid as type 1 name
    12/20/2013 13:39:24:728 NetpCheckNetBiosNameNotInUse for 'WIN7SP1BASE' [MACHINE] returned 0x0
    12/20/2013 13:39:24:728 NetpValidateName: name 'WIN7SP1BASE' is valid for type 1
    12/20/2013 13:39:24:775 -----------------------------------------------------------------
    12/20/2013 13:39:24:775 NetpValidateName: checking to see if 'WIN7SP1BASE' is valid as type 5 name
    12/20/2013 13:39:24:775 NetpValidateName: name 'WIN7SP1BASE' is valid for type 5
    12/20/2013 14:22:43:445 -----------------------------------------------------------------
    12/20/2013 14:22:43:445 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 14:22:43:445 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 14:22:43:445 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 14:22:43:508 -----------------------------------------------------------------
    12/20/2013 14:22:43:508 NetpValidateName: checking to see if '243WIN7BASEtst' is valid as type 5 name
    12/20/2013 14:22:43:508 NetpValidateName: name '243WIN7BASEtst' is valid for type 5
    12/20/2013 14:26:14:548 -----------------------------------------------------------------
    12/20/2013 14:26:14:548 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 14:26:14:548 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 14:26:14:548 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 14:26:14:595 -----------------------------------------------------------------
    12/20/2013 14:26:14:595 NetpValidateName: checking to see if '243WIN7BASEtst' is valid as type 5 name
    12/20/2013 14:26:14:595 NetpValidateName: name '243WIN7BASEtst' is valid for type 5
    12/20/2013 14:26:14:626 -----------------------------------------------------------------
    12/20/2013 14:26:14:626 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 14:26:14:751 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 14:26:14:751 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 14:26:25:156 -----------------------------------------------------------------
    12/20/2013 14:26:25:156 NetpDoDomainJoin
    12/20/2013 14:26:25:156 NetpMachineValidToJoin: '243WIN7BASETST'
    12/20/2013 14:26:25:156  OS Version: 6.1
    12/20/2013 14:26:25:156  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 14:26:25:156  ServicePack: Service Pack 1
    12/20/2013 14:26:25:156  SKU: Windows 7 Professional
    12/20/2013 14:26:25:156 NetpDomainJoinLicensingCheck: ulLicenseValue=1, Status: 0x0
    12/20/2013 14:26:25:156 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 14:26:25:156 NetpMachineValidToJoin: status: 0x0
    12/20/2013 14:26:25:156 NetpJoinDomain
    12/20/2013 14:26:25:156  Machine: 243WIN7BASETST
    12/20/2013 14:26:25:156  Domain: judicial
    12/20/2013 14:26:25:156  MachineAccountOU: (NULL)
    12/20/2013 14:26:25:156  Account: judicial\pcsetup2
    12/20/2013 14:26:25:156  Options: 0x25
    12/20/2013 14:26:25:156 NetpLoadParameters: loading registry parameters...
    12/20/2013 14:26:25:156 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 14:26:25:156 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 14:26:25:156 NetpLoadParameters: status: 0x2
    12/20/2013 14:26:25:156 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 14:26:25:265 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 14:26:25:265 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 14:26:25:265 NetpDsGetDcName: trying to find DC in domain 'judicial', flags: 0x40001010
    12/20/2013 14:26:25:374 NetpLoadParameters: loading registry parameters...
    12/20/2013 14:26:25:374 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 14:26:25:374 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 14:26:25:374 NetpLoadParameters: status: 0x2
    12/20/2013 14:26:25:374 NetpDsGetDcName: status of verifying DNS A record name resolution for 'Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:25:374 NetpDsGetDcName: found DC '\\Wabash00-PII.jis.state.ct.us' in the specified domain
    12/20/2013 14:26:25:374 NetpJoinDomainOnDs: NetpDsGetDcName returned: 0x0
    12/20/2013 14:26:25:608 NetpJoinDomain: status of connecting to dc '\\Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:25:608 NetpProvisionComputerAccount:
    12/20/2013 14:26:25:608  lpDomain: judicial
    12/20/2013 14:26:25:608  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:608  lpMachineAccountOU: (NULL)
    12/20/2013 14:26:25:608  lpDcName: Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:608  lpDnsHostName: (NULL)
    12/20/2013 14:26:25:608  lpMachinePassword: (null)
    12/20/2013 14:26:25:608  lpAccount: judicial\pcsetup2
    12/20/2013 14:26:25:608  lpPassword: (non-null)
    12/20/2013 14:26:25:608  dwJoinOptions: 0x25
    12/20/2013 14:26:25:608  dwOptions: 0x40000003
    12/20/2013 14:26:25:749 NetpLdapBind: Verified minimum encryption strength on Wabash00-PII.jis.state.ct.us: 0x0
    12/20/2013 14:26:25:749 NetpLdapGetLsaPrimaryDomain: reading domain data
    12/20/2013 14:26:25:749 NetpGetNCData: Reading NC data
    12/20/2013 14:26:25:764 NetpGetDomainData: Lookup domain data for: DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:764 NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:764 NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Cracking DNS domain name jis.state.ct.us/ into Netbios on
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Crack results:  name = JUDICIAL\
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:796 NetpGetComputerObjectDn: Crack results:  (Account already exists) DN = CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 14:26:25:796   objectClass  =  Computer
    12/20/2013 14:26:25:796   SamAccountName  =  243WIN7BASETST$
    12/20/2013 14:26:25:796   userAccountControl  =  0x1000
    12/20/2013 14:26:25:796   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 14:26:25:796   unicodePwd  =  <SomePassword>
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Computer Object already exists in OU:
    12/20/2013 14:26:25:796   objectClass  =  top  person  organizationalPerson  user  computer
    12/20/2013 14:26:25:796   SamAccountName  =  243WIN7BASETST$
    12/20/2013 14:26:25:796   userAccountControl  =  0x1000
    12/20/2013 14:26:25:796   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   ServicePrincipalName  =  TERMSRV/243WIN7BASETST  TERMSRV/243WIN7BASEtst.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us 
    HOST/243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   unicodePwd  =  Account exists, resetting password: <SomePassword>
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Attribute values to set:
    12/20/2013 14:26:25:796   unicodePwd  =  <SomePassword>
    12/20/2013 14:26:25:967 NetpModifyComputerObjectInDs: Toggled UserAccountControl successfully
    12/20/2013 14:26:25:967 NetpEncodeProvisioningBlob: Encoding provisioning data
    12/20/2013 14:26:25:967 NetpInitBlobWin7: Constructing blob...
    12/20/2013 14:26:25:967 Blob version: 1
    12/20/2013 14:26:25:967  lpDomain: judicial
    12/20/2013 14:26:25:967  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:967  lpMachinePassword: <omitted from log>
    12/20/2013 14:26:25:967    DomainDnsPolicy:
    12/20/2013 14:26:25:967     Name: JUDICIAL
    12/20/2013 14:26:25:967     DnsDomainName: jis.state.ct.us
    12/20/2013 14:26:25:967     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:967     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:967     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 14:26:25:967    DcInfo:
    12/20/2013 14:26:25:967     DomainControllerName:
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:967     DomainControllerAddress:
    \\10.16.8.100
    12/20/2013 14:26:25:967     DomainControllerAddressType: 1
    12/20/2013 14:26:25:967     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:967     DomainName: jis.state.ct.us
    12/20/2013 14:26:25:967     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:967     Flags: 0xe00033fc
    12/20/2013 14:26:25:967     DcSiteName: Judicial-Data-Centers
    12/20/2013 14:26:25:967     ClientSiteName: EHFD-99ERiver
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983 NetpInitBlobWin7: Blob pickling result: 0
    12/20/2013 14:26:25:983 NetpEncodeProvisioningBlob: result: 0x0
    12/20/2013 14:26:25:983 ldap_unbind status: 0x0
    12/20/2013 14:26:25:983 NetpRequestOfflineDomainJoin:
    12/20/2013 14:26:25:983  dwProvisionBinDataSize: 960
    12/20/2013 14:26:25:983  JoinOptions: 0x25
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983  lpWindowsPath: C:\Windows
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Unpickling provisioning blob with size 960 bytes
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Searching 1 blobs for supported ODJ blob, highest supported version: 1
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Found ODJ blob version: 1
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Selected ODJ blob version: 1
    12/20/2013 14:26:25:983 Blob version: 1
    12/20/2013 14:26:25:983  lpDomain: judicial
    12/20/2013 14:26:25:983  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:983  lpMachinePassword: <omitted from log>
    12/20/2013 14:26:25:983    DomainDnsPolicy:
    12/20/2013 14:26:25:983     Name: JUDICIAL
    12/20/2013 14:26:25:983     DnsDomainName: jis.state.ct.us
    12/20/2013 14:26:25:983     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:983     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:983     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 14:26:25:983    DcInfo:
    12/20/2013 14:26:25:983     DomainControllerName:
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:983     DomainControllerAddress:
    \\10.16.8.100
    12/20/2013 14:26:25:983     DomainControllerAddressType: 1
    12/20/2013 14:26:25:983     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:983     DomainName: jis.state.ct.us
    12/20/2013 14:26:25:983     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:983     Flags: 0xe00033fc
    12/20/2013 14:26:25:983     DcSiteName: Judicial-Data-Centers
    12/20/2013 14:26:25:983     ClientSiteName: EHFD-99ERiver
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin: Setting backup/restore privileges
    12/20/2013 14:26:25:983 NetpInitiateOfflineJoin
    12/20/2013 14:26:25:983  lpLocalRegistryPath: C:\Windows\system32\config\SYSTEM
    12/20/2013 14:26:25:983  dwOptions: 0x40000003
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: Translating provisioning data to internal format
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: Selecting version 1
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: exiting: 0x0
    12/20/2013 14:26:25:983 NetpValidateFullJoinState: Validating provisioning data...
    12/20/2013 14:26:25:983 NetpValidateFullJoinState: exiting: 0x0
    12/20/2013 14:26:25:983 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 14:26:25:983 NetpClearFullJoinState: Status of deleting join state key 0x2
    12/20/2013 14:26:25:983 NetpSaveFullJoinStateInternal: Injecting provisioning data into image...
    12/20/2013 14:26:25:983 NetpSaveFullJoinStateInternal: exiting: 0x0
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Checking for pending name changes...
    12/20/2013 14:26:25:983  SetHostName: TRUE
    12/20/2013 14:26:25:983  SetDnsDomain: TRUE
    12/20/2013 14:26:25:983  SetNetBiosName: TRUE
    12/20/2013 14:26:25:983  SetCurrentValues: TRUE
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting Hostname to 243WIN7BASETST
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting Domain name to jis.state.ct.us
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting NetBios computer name to 243WIN7BASETST
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin: status: 0x0
    12/20/2013 14:26:25:983 NetRequestOfflineDomainJoin: Successfully initiated the offline domain join
    12/20/2013 14:26:25:983 NetpJoinDomainOnDs: Setting netlogon cache.
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: status of setting netlogon cache: 0x0
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: Function exits with status of: 0x0
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: status of disconnecting from '\\Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:26:014 NetpCompleteOfflineDomainJoin
    12/20/2013 14:26:26:014  fBootTimeCaller: FALSE
    12/20/2013 14:26:26:014  fSetLocalGroups: TRUE
    12/20/2013 14:26:26:014 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 14:26:26:030 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 14:26:26:030 NetpJoinDomainLocal: NetpHandleJoinedStateInfo returned: 0x0
    12/20/2013 14:26:26:030 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 14:26:26:326 NetpJoinDomainLocal: NetpManageMachineSecret returned: 0x0.
    12/20/2013 14:26:26:326 Calling NetpQueryService to get Netlogon service state.
    12/20/2013 14:26:26:326 NetpJoinDomainLocal: NetpQueryService returned: 0x0.
    12/20/2013 14:26:26:420 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 14:26:26:420 NetpJoinDomainLocal: status of setting LSA pri. domain: 0x0
    12/20/2013 14:26:26:420 NetpManageLocalGroupsForJoin: Adding groups for new domain, removing groups from old domain, if any.
    Windows IP Configuration from machine not joining the domain
       Host Name . . . . . . . . . . . . : 243sccmtest5
       Primary Dns Suffix  . . . . . . . :
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : jis.state.ct.us
    Ethernet adapter Local Area Connection:
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection #2
       Physical Address. . . . . . . . . : B4-B5-2F-C0-D1-08
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::857e:ee89:64be:e243%12(Preferred)
       IPv4 Address. . . . . . . . . . . : 10.16.211.236(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Wednesday, November 12, 2014 11:59:47 AM
       Lease Expires . . . . . . . . . . : Wednesday, November 12, 2014 7:59:46 PM
       Default Gateway . . . . . . . . . : fe80::21f:6cff:febf:4bf%12
                                           10.16.211.1
       DHCP Server . . . . . . . . . . . : 10.16.204.101
       DNS Servers . . . . . . . . . . . : 10.16.8.100
                                           10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
                                           10.16.204.100
       Primary WINS Server . . . . . . . : 10.16.8.100
       Secondary WINS Server . . . . . . : 10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
       NetBIOS over Tcpip. . . . . . . . : Enabled
    Tunnel adapter Local Area Connection* 9:
       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Microsoft ISATAP Adapter
       Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
    Windows IP Configuration from Domain Joined Machine
       Host Name . . . . . . . . . . . . : 2433ZENTEST01PC
       Primary Dns Suffix  . . . . . . . : jis.state.ct.us
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : jis.state.ct.us
    Ethernet adapter Local Area Connection:
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection
       Physical Address. . . . . . . . . : 74-46-A0-90-37-49
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       IPv4 Address. . . . . . . . . . . : 10.16.211.201(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Wednesday, October 15, 2014 7:39:26 AM
       Lease Expires . . . . . . . . . . : Wednesday, November 12, 2014 8:40:50 PM
       Default Gateway . . . . . . . . . : 10.16.211.1
       DHCP Server . . . . . . . . . . . : 10.16.4.101
       DNS Servers . . . . . . . . . . . : 10.16.8.100
                                           10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
       Primary WINS Server . . . . . . . : 10.16.5.100
       Secondary WINS Server . . . . . . : 10.16.8.100
       NetBIOS over Tcpip. . . . . . . . : Enabled
    Seems like DNS Issue

    Hi,
    Have you tried to delete the computer account from AD?
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Windows 7 or Windows Server 2008 R2 domain join displays error "Changing the Primary Domain DNS name of this computer to "" failed...."

    Hi,
    Windows 7 or Windows Server 2008 R2 domain join displays error "Changing the Primary Domain DNS name of this computer to "" failed...."
    DC:windows Server 2008 R2
    Domain functional level:Windows Server 2003
    When Winxp join domain, have no this error message.
    I checked http://support.microsoft.com/kb/2018583?wa=wsignin1.0 does't work.
    There have 3 suggestion in this article:
    1.The "Disable NetBIOS over TCP/IP" checkbox has been disabled in the IPv4 properties of the computer being joined.
    Doesnt's work.
    2.Connectivity over UDP port 137 is blocked between client and the helper DC servicing the join operation in the target domain.
    On my DC, I run netstat -an, reslut as below:
     UDP    192.168.20.3:137       *:*
    3.The TCP/IPv4 protocol has been disabled so that the client being joined or the DC in the destination domain targeted by the LDAP BIND is running TCP/IPv6 only.
    We are not using IPV6.
    This server recently updated from Windows Server 2003 to Windows Server 2008 R2. Before upgrade, when Win7 and Win2008 join this domain, also have the same error message.
    Please help to check this issue.
    Thank you very much.
    BR
    Guo YingHui 

    Hi Guo Ying,
    I have faced this critical error which makes over-writes the host names in the domain when you join.
    For example: Already you had a host name called as PC.domain.com in the domain.com Domain.
    When you try to add the another host name called as PC in the domain.com Domain, it doesn't give you the duplicate name error on the network it does over-write the existing host name called as PC.domain.com & it will add the new host name into the domain.
    Host name which got over-written will get removed from the domain. I faced this issue in my project. My DPM host name got removed from the Domain & new host name got joined into the domain which halted my backups for one day.
    Final Resolution is as follows:
    You need to start the dns console on the DC & drop down the domain name.
    Select the _msdcs when you click on _msdcs it will show the Name Server's list on the right hand side.
    You need to add the Domain Naming Master under the _msdcs or add all the domain controllers which you had.
    After you add the Name server's try joining the PC OR Laptop to the domain which is successfully joins it.
    Regards
    Anand S
    Thanks & Regards Anand Sunka MCSA+CCNA+MCTS

  • Change default key size on non Domain joined CA.

    Hello,
    I have one standalone non domain joined CA I would like to change the default key size of all issued certs to 2048.  Since it is a stand along, there are no AD template to modify.  Can this be changed in the registry?
    Shawn

    CAPolicy.inf is the way to go.
    See the following thread
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/ce001d8f-c722-4429-83cb-328b92876292/how-to-change-root-certificate-keys-length-and-validity-period?forum=winserversecurity
    Hth, Anders Janson Enfo Zipper

  • Non-Domain joined clients connect to server initially but cannot connect via Launchpad

    Running SBS 2011 Essentials in a small office. Running XP/Vista/7 clients. All working fine until we swapped routers. Old router died, new router was installed. 
    Now all domain-joined PC's connect as normal, but all NON-Domain-Joined PC's cannot access the server via the launchpad. I get the "The server appears to be offline. Do you want to sign in to offline mode?" box. 
    Tried removing PC from the SBS Dashboard, uninstalling the connector from the client, restarting client, and reinstalling the connector. I can install the connector (using
    http://<server ip>/connect , but not http://<servername>/connect
    ). Connector installs but it still tells me the server is offline when trying to use dashboard or launchpad on the client.
    Note: I can add a network location or Map a network drive to ther server after inputting my network password from Windows.
    Any Services to check? Firewalls exceptions to ensure? Advice?
    EDIT: Dashboard on Server shows Client, sometimes as online, sometimes as offline. 

    Sounds like name resolution issue to me.
    Are all your clients set to use the IP of the Essentials Server for their primary DNS?
    Robert Pearman SBS MVP
    itauthority.co.uk |
    Title(Required)
    Facebook |
    Twitter |
    Linked in |
    Google+

  • Non domain-joined Clients (CES/CEP)

    Hello Everyone!
    This is my first post to the security forum and it is not an overly familiar tech for me so please be gentle. :)
    I am looking at building a lab to test a web based application for a client.  The client has very stringent security requirements and as such have mandated the need for both the web server to be secured using SSL certs and requires the connecting
    users to have a certificate.  The infrastructure will be hosted in a central DC in it's own AD forest whilst the users connecting in will have their own AD as they work for different companies.  Each user will have an AD account within the hosted
    environment.  My initial thought was to provide public certs for the web servers but my problem was providing certificates to the clients.  Clearly using public certs would be very expensive.  After a bit of research I stumbled across the following:
    http://blogs.technet.com/b/askds/archive/2010/05/25/enabling-cep-and-ces-for-enrolling-non-domain-joined-computers-for-certificates.aspx
    What I am trying to understand is, will the combination of Certificate services & CES/CEP effectively do away with the need for public certs in this instance?  Can I simply use the internal authority to publish certificates to the web server and
    to the end users?

    Yes - I think this is one of the scenarios CES/CEP have been developed for.
    End users would have to trust your internal CA and validate the chain, so intermediate CAs should be found via AIA URLs. But since you need user - not computer - certificates this is simpler than described in the article as users do not need to be local
    admins to import a root. (But on principle the admin of a user's home AD could restrict this though I have never encountered that.)
    You would need to publish the CES/CEP services via a reverse proxy and external users would have to configure the enrollment HTTP URLs and enter their AD credentials in the hosted AD when connecting.
    As users have imported your CA certificate they will also trust the web server's certificate issued from the same CA.
    Elke

  • Problems connecting a non-domain joined outlook to exchange

    Hello,
    i'm having issues configuring outlook (be it 2007, 2010 or 2013 all fail the same) on non-domain joined computers in the LAN to a exchange 2013 server.
    I select manual config, in server we put "mail.domain.local" and user "domain\user" and it bounces with "cannot complete action, the connection to exchange is not available, outlook must be online".
    We tried with external full email address, nothing
    tried setting the outlook anywhere proxy, same, tried using ip address, same
    it simply refuses to configure.
    any ideaS?

    Hi,
    Generally, the external non-domain joined computers can connect to Exchange 2013 by using Outlook Anywhere and the Autodiscover service to auto-setup the Exchange account.
    If the auto-setup for Exchange account fails, please check the Autodiscover service and Outlook Anywhere configuration by the following command:
    Get-OutlookAnywhere | FL
    Directly access the following URL in IE respectively, and check whether an Error 600 returns:
    Https://autodiscover.domain.com/autodiscover/autodiscover.xml
    Https://mail.domain.com/autodiscover/autodiscover.xml
    Please make sure the the ExternalHostName parameter for Outlook Anywhere is configured to your external namespace for Exchange 2013 (for example: mail.domain.com).
    In Exchange certificate, please make sure the namespace mail.domain.com is included in your trusted certificate which is assigned with IIS service.
    For manual Exchange account setup, please run the following command to get the mailbox GUID for server name configuration:
    Get-Mailbox UserA | FL Identity,ExchangeGuid
    Then go to Control Pane > Mail to configure the Outlook profile. In Server Settings, import the [email protected] into the Server box and click Check Name to have a try.
    Regards,
    Winnie Liang
    TechNet Community Support

  • Domain joined Windows 8.1 using OneDrive to sync passwords across devices

    Background : Domain joined Windows 8.1 devices using OneDrive to sync settings across devices, including "Passwords" under Other Settings. Domain user accounts are NOT local administrators.
    Issue : When one drive goes to sync Wireless network security settings (passphrases etc...), a User Account Control (UAC) dialogue pops up from "Program Name : Networks" to enter administrator credentials. Domain users do not have administrator access
    to local computers by strict policy.
    The only way identified so far to stop the dialogue pop-up is to disable the password sync by group policy. However, that turns off ALL password syncing, including passwords desired to be sync'd, that do not encounter this issue.
    Can the UAC be suppressed? Is there a way to NOT sync the wireless password settings?
    Welcome any thoughts, direction, assistance, etc... :) Thanks much and have a good day!

    Hi,
    I searched around but haven't find one way to achieve this, thus I'm afraid that we're unable to prevent the specific network password setting. the syncing settings for all passwords are combined together.
    To suppress UAC, we can turn off the UAC under control panel\User Account or via GP  Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options ,but we don't recommend this.
    Yolanda Zhu
    TechNet Community Support

  • DNS working intermittently for non-domain joined machines

    I have a small single Server 2012 based network, with about 90% windows clients.  DNS is running on the Windows Server 2008 machine, but DHCP is provided via a unix based firewall machine.  Within the DNS configuration I have all of my windows
    clients (mostly Windows 8.x clients, but there are a few Windows 7 ones as well) and a few *nix ones as well.  All of the Windows clients are domain joined, except for one machine which is currently running Windows 10 preview, though it was a Windows
    7 machine originally.  In the DNS configuration I have a number of statically entered A records, used to give my *nix machines a name on the local network.
    When trying to access systems by name (via ping or by other services), there is a very consistent behavior - my domain joined machines are able to resolve all names 100% of the time without any issues.  However, the non-domain joined machines, both
    Windows and not, are consistently inconsistent.  To be more precise, when I try to resolve a name it will randomly work and randomly not.  IP setup and configuration looks correct, meaning they have  valid IP, DNS is set to my Windows Server,
    default gateway, etc. are all correct.  Pinging external machines (ie google.com, etc.) works 100% of the time, but trying to ping any internal machine is a total crap shoot.  The only exception to this is the Windows Server 2012 machine itself,
    which always works.
    From past experience I know that the moment I join a machine to the domain all of the DNS issues goes away, which is fine for the Windows boxes but not so much for the rest.  I also have visitors occasionally come by, who I cannot expect to join my
    domain just to make things work normally.
    This network originally started life out as Windows Server 2003 domain, but was upgraded to 2012 about two months ago.  I have been seeing this problem for years, but have always assumed it to be a Server 2003 issue and figured it would go away when
    I upgraded.  Nope...
    Any ideas as to the cause of this and what I can do about it?
    Thanks,
    peter

    Its really weird - I can ping an address and not have it work, then do a NSLookup of the same address against my DNS server and it resolves just fine.  Take a look at this screen copy below:
    C:\Users\Peter>ping apollo.bakonet.local
    Ping request could not find host apollo.bakonet.local. Please check the name and try again.
    C:\Users\Peter>nslookup apollo.bakonet.local 192.168.124.9
    Server:  orac.bakonet.local
    Address:  192.168.124.9
    Name:    apollo.bakonet.local
    Address:  192.168.124.27
    C:\Users\Peter>ping apollo.bakonet.local
    Ping request could not find host apollo.bakonet.local. Please check the name and try again.
    C:\Users\Peter>ipconfig /all |more
    Windows IP Configuration
       Host Name . . . . . . . . . . . . : Win10
       Primary Dns Suffix  . . . . . . . :
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : bakonet.local
    Ethernet adapter Ethernet:
       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection
       Physical Address. . . . . . . . . : 00-21-CC-65-1B-8F
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
    Wireless LAN adapter Local Area Connection* 3:
       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
       Physical Address. . . . . . . . . : A0-88-B4-A2-41-81
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
    Wireless LAN adapter Wi-Fi:
       Connection-specific DNS Suffix  . : bakonet.local
       Description . . . . . . . . . . . : Intel(R) Centrino(R) Advanced-N 6205
       Physical Address. . . . . . . . . : A0-88-B4-A2-41-80
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::fc47:8a91:6b25:bd0e%2(Preferred)
       IPv4 Address. . . . . . . . . . . : 192.168.124.64(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Monday, January 5, 2015 7:34:47 PM
       Lease Expires . . . . . . . . . . : Tuesday, February 3, 2015 7:15:20 PM
       Default Gateway . . . . . . . . . : 192.168.124.1
       DHCP Server . . . . . . . . . . . : 192.168.124.1
       DHCPv6 IAID . . . . . . . . . . . : 60852404
       DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1B-C6-18-82-00-21-CC-65-1B-8F
       DNS Servers . . . . . . . . . . . : 192.168.124.9
                                           24.229.54.212
                                           216.144.187.199
       Primary WINS Server . . . . . . . : 192.168.124.9
       NetBIOS over Tcpip. . . . . . . . : Enabled
    Ethernet adapter Bluetooth Network Connection:
       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
       Physical Address. . . . . . . . . : EC-55-F9-F5-14-76
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
    Does this actually make sense?  Obviously the DNS server is online, it works and when a lookup is requested directly it works, and the DNS server is listed as first in the IP configuration.  So why would it not work?!

  • Domain Join against RODC

    Hi All,
    We are facing a issue with domain joining against RODC
    We have a RODC which is separated from RWDC using firewall. The replication is configured using IPSEC and all is working fine.
    The servers in RODC site do not have any connectivity to RWDC. We add the Servers in RODC site by following the script mentioned in the below link
    https://technet.microsoft.com/en-us/library/dd728035(v=ws.10).aspx
    The Servers which are in same subnet as RODC are able to join and login properly into the Domain. But the servers which are in different subnet are not able to join Domain and giving error “ Specified Domain either does not exist or cannot be contacted”
    I am able to ping the RODC using IP and FQDN but not using netbios name
    Nslookup works for FQDN of RODC and Domain name but fails for netbios names
    I have checked the link http://blogs.technet.com/b/networking/archive/2008/07/25/netbios-browsing-across-subnets-may-fail-after-upgrading-to-windows-server-2008.aspx and as per that the browser service is started in PDC as well as in RODC
    The subnet of Server is associated to RODC site
    I have created a registry entry SiteName in the server and specified the RODC site
    Checked at network level and nothing is blocked there
    Tried creating the record for in host file but no use

    Hi All,
    We are facing a issue with domain joining against RODC
    We have a RODC which is separated from RWDC using firewall. The replication is configured using IPSEC and all is working fine.
    The servers in RODC site do not have any connectivity to RWDC. We add the Servers in RODC site by following the script mentioned in the below link
    Firstly if you have RODC in a site, place a RWDC in that site as well OR enable
    Bridge all site links. Also you need to provision the computer accounts in your RWDC, in that case the computer accounts will be replicated to the RODC and you can join. Look at RODC section here:
    Offline Domain Join
    Reading this link by Jorge is highly recommended:
    Domain Join through an RODC instead of an RWDC
    Do not forget that if your windows server are 2003 they need to have direct connectivity to the RWDC for tasks like password changing. Also for time synchronization, an RODC is authorized to sync the computers time if and only if the computer password is
    cached, otherwise the computer must contact the RWDC directly.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or
    to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Create a certificate for non domain-joined PCs

    We have a standard AD domain wit a CA and SharePoint/Exchange servers, hosted internally and externally with TMG 2010 as our firewall. For the external hosting, we have an external certificate from one of the main certificate providers. Internally, our domain-joined
    PCs look to the CA to get their trusted certificate from.
    This is the issue I am encountering:
    Our external users (the ones whose PC is not joined to our domain) are fine when they access our SharePoint and Exchange services externally.
    However, when they are connected via VPN, they receive a certificate error and when I look in Certificate > Certification path, I can see that it says:
    "DOMAIN NAME" Issuing CA1 > "NAME OF SHAREPOINT WEBSITE".
    When such a PC connects to the same website when NOT connected via VPN to the domain, they receive:
    "DOMAIN NAME" Root CA > "DOMAIN NAME" Issuing CA1 > "NAME OF SHAREPOINT WEBSITE".
    How can I create a certificate for these non-domain joined PCs so that I can import the certificate in the Trusted Root Certification Authorities store? Thank you!

    It sounds like the question you are really asking is :
    How do I designate the internal root CA as a trusted root CA
    Run certutil -addstore root RootCert.crt (this must be run from an administrative command prompt)
    This designates the root CA as a trusted root on the client. You also may want to install the intermediate cert to the store (you are not clear on what VPN product you are using, so it may or may not do proper chain building).
    Run Certutil -addstore CA IssuingCA.crt 
    Brian

  • Are sideloading keys required to sideload Apps to domain joined OEM/retail Windows 8.1 Pro devices?

    Hello,
    I want to sideload a Microsoft Store App to a Lenovo Thinkpad 2 device. The device has an OEM / retail version of Windows 8.1 Pro installed and is part of an active directory domain network.
    With this preconditions and according to announcements by Microsoft, it seems to be possible since May 2014 to deploy Apps directly to these devices. Without the need to buy a sideloading key.
    To check this, I have generated an code signing certificate with makecert/Pvk2Pfx and then I followed the instructions in this
    blog article.
    Everything went fine, only the actual deployment with add-appxPackage didn't work. The installation aborts with the error message, that a developer or sideloading license is required, as no license or sideloading policy can be applied.
    Can anybody in this forum give me some advice to these questions:
    1. Does the new sideload licensing model for May 2014 also applies to OEM/retail versions of Windows 8.1, or is is volume licensing required?
    2. Has anybody managed to successfully sideload an App to a OEM / retail Windows 8.1 Pro device?
    3. At the moment I don't have access to the domain network. I can login with a domain user locally but changes to the local group policies and to the local certificate stores can't be confirmed by the domain controller. I'm not an administrator, so might this
    be a source of error?
    Thanks
    Tobias

    Hello Tobias,
    Please check if you can normally sideload Windows Store App in other domain-joined OEM computer.
    About the OEM issue, it is recommended to contact the manufacturer.
    Best regards,
    Fangzhou CHEN
    Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Windows 8.1 modern shortcut icons are not displayed in taskbar after domain join

    Hello,
    Like the title says: modern (metro) shortcut icons in taskbar are not displayed after domain join. There's just blank space where the icon should be for Store, OneDrive etc. Shortcuts work for classic and 3rd part applications.
    Shortcut icons work properly if I log in with local account. The applications work properly whether the icons are displayed or not for every user (local and domain).

    Hi,
    Since this issue only happened for domain account, I suggest you check whether there're some GPOs\logon scripts applied to the domain accounts which controls the taskbar icons.
    Have you tried to unpin the modern taskbar icons and re-pin the icons to the taskbar? What is the result?
    Yolanda Zhu
    TechNet Community Support

  • Install AADSync on a Workgroup server (non-domain joined)

    Does anyone has experiences with installing AADSync on a non-domain joined server (workgroup). A company with multiple forests wants to have a "neutral" server for the identity synchronisation. It looks like the tool is installing fine, but can
    there be some configuration issues?

    This is supported.  See here:
    "Your computer can be stand-alone, a member server or a domain controller. "
    ref: http://msdn.microsoft.com/en-us/library/azure/dn757602.aspx
    Mike Crowley | MVP
    My Blog --
    Planet Technologies

  • Restrict Outlook Access Only To Domain Joined PCs?

    We have contractors that use their employers laptops to access various LAN resources on our network such as access to shared network drives, printers, Remote Desktop and access to our Intranet sites.  They have mailboxes on our Exchange servers and
    we would like their mailbox access to be restricted to EAS and OWA, not Outlook unless they are using one of our domain-joined computers.  
    The main reason for this is to restrict these users from downloading their mailbox contents into into a personal folder.  We can create PST restrictions on our domain-joined PCs via group policy, but these policies would not apply to computers not joined
    to our domain.
    Of course we would also like to prevent Outlook access to their mail from their home PCs that they may have installed Outlook on, but we still need seamless remote access to Outlook on domain-joined laptops used remotely.
    How can this be done?

    PS -- Andy are you going to MEC ?
    Cheers,
    Rhoderick
    Microsoft Senior Exchange PFE
    Blog:
    http://blogs.technet.com/rmilne 
    Twitter:   LinkedIn:
      Facebook:
      XING:
    Note: Posts are provided “AS IS” without warranty of any kind, either expressed or implied, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.
    I will be there will bells on!
    Twitter!: Please Note: My Posts are provided “AS IS” without warranty of any kind, either expressed or implied.

Maybe you are looking for