Domain Joining Related

Hi Dear,
I would like to know that whenever i am joining the new pc in the existing domain
do i need to enable the remote settings...allowed on that pc or not.
Please assist.
Regards, Ravi Kumar

HI
You need to manually allow RDP access on each domain joined PC or you can Create a Group Policy to enable it.

Similar Messages

  • Domain Join Issue during Task Sequence

    SCCM 2012 R2 CU3 running Primary Site.
    Using SCCM task sequence. Everything works except the machine won't join the domain.
    Netsetup.log
    12/20/2013 10:17:01:583 NetpDomainJoinLicensingCheck: ulLicenseValue=1, Status: 0x0
    12/20/2013 10:17:01:583 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:01:583 NetpMachineValidToJoin: status: 0x0
    12/20/2013 10:17:01:583 NetpJoinDomain
    12/20/2013 10:17:01:583  Machine: 243WIN7BASETST
    12/20/2013 10:17:01:583  Domain: judicial
    12/20/2013 10:17:01:583  MachineAccountOU: (NULL)
    12/20/2013 10:17:01:583  Account: judicial\pcsetup2
    12/20/2013 10:17:01:583  Options: 0x27
    12/20/2013 10:17:01:583 NetpLoadParameters: loading registry parameters...
    12/20/2013 10:17:01:583 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 10:17:01:583 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 10:17:01:583 NetpLoadParameters: status: 0x2
    12/20/2013 10:17:01:583 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 10:17:01:692 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 10:17:01:692 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 10:17:01:692 NetpDsGetDcName: trying to find DC in domain 'judicial', flags: 0x40001010
    12/20/2013 10:17:16:699 NetpDsGetDcName: failed to find a DC having account '243WIN7BASETST$': 0x525, last error is 0x0
    12/20/2013 10:17:16:699 NetpLoadParameters: loading registry parameters...
    12/20/2013 10:17:16:699 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 10:17:16:699 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 10:17:16:699 NetpLoadParameters: status: 0x2
    12/20/2013 10:17:16:699 NetpDsGetDcName: status of verifying DNS A record name resolution for 'ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:699 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 10:17:16:699 NetpJoinDomainOnDs: NetpDsGetDcName returned: 0x0
    12/20/2013 10:17:16:746 NetpJoinDomain: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:746 NetpProvisionComputerAccount:
    12/20/2013 10:17:16:746  lpDomain: judicial
    12/20/2013 10:17:16:746  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:746  lpMachineAccountOU: (NULL)
    12/20/2013 10:17:16:746  lpDcName: ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:746  lpDnsHostName: (NULL)
    12/20/2013 10:17:16:746  lpMachinePassword: (null)
    12/20/2013 10:17:16:746  lpAccount: judicial\pcsetup2
    12/20/2013 10:17:16:746  lpPassword: (non-null)
    12/20/2013 10:17:16:746  dwJoinOptions: 0x27
    12/20/2013 10:17:16:746  dwOptions: 0x40000003
    12/20/2013 10:17:16:746 NetpLdapBind: Verified minimum encryption strength on ATREYU1V-PII.jis.state.ct.us: 0x0
    12/20/2013 10:17:16:746 NetpLdapGetLsaPrimaryDomain: reading domain data
    12/20/2013 10:17:16:746 NetpGetNCData: Reading NC data
    12/20/2013 10:17:16:746 NetpGetDomainData: Lookup domain data for: DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:746 NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:746 NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking DNS domain name jis.state.ct.us/ into Netbios on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  name = JUDICIAL\
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  Account does not exist
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Cracking Netbios domain name JUDICIAL\ into root DN on
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Crack results:  name = DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:16:761 NetpGetComputerObjectDn: Got DN CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us from the default computer container
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 10:17:16:761   objectClass  =  Computer
    12/20/2013 10:17:16:761   SamAccountName  =  243WIN7BASETST$
    12/20/2013 10:17:16:761   userAccountControl  =  0x1000
    12/20/2013 10:17:16:761   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:16:761   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:16:761   unicodePwd  =  <SomePassword>
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Computer Object does not exist in OU
    12/20/2013 10:17:16:761 NetpModifyComputerObjectInDs: Attribute values to set:
    12/20/2013 10:17:16:761   objectClass  =  Computer
    12/20/2013 10:17:16:761   SamAccountName  =  243WIN7BASETST$
    12/20/2013 10:17:16:761   userAccountControl  =  0x1000
    12/20/2013 10:17:16:761   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:16:761   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:16:761   unicodePwd  =  <SomePassword>
    12/20/2013 10:17:16:886 NetpEncodeProvisioningBlob: Encoding provisioning data
    12/20/2013 10:17:16:886 NetpInitBlobWin7: Constructing blob...
    12/20/2013 10:17:16:886 Blob version: 1
    12/20/2013 10:17:16:886  lpDomain: judicial
    12/20/2013 10:17:16:886  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:886  lpMachinePassword: <omitted from log>
    12/20/2013 10:17:16:886    DomainDnsPolicy:
    12/20/2013 10:17:16:886     Name: JUDICIAL
    12/20/2013 10:17:16:886     DnsDomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 10:17:16:886    DcInfo:
    12/20/2013 10:17:16:886     DomainControllerName:
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:886     DomainControllerAddress:
    \\10.16.6.99
    12/20/2013 10:17:16:886     DomainControllerAddressType: 1
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     DomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     Flags: 0xe00031fc
    12/20/2013 10:17:16:886     DcSiteName: Judicial-Data-Centers
    12/20/2013 10:17:16:886     ClientSiteName: EHFD-99ERiver
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886 NetpInitBlobWin7: Blob pickling result: 0
    12/20/2013 10:17:16:886 NetpEncodeProvisioningBlob: result: 0x0
    12/20/2013 10:17:16:886 ldap_unbind status: 0x0
    12/20/2013 10:17:16:886 NetpRequestOfflineDomainJoin:
    12/20/2013 10:17:16:886  dwProvisionBinDataSize: 960
    12/20/2013 10:17:16:886  JoinOptions: 0x27
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886  lpWindowsPath: C:\Windows
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Unpickling provisioning blob with size 960 bytes
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Searching 1 blobs for supported ODJ blob, highest supported version: 1
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Found ODJ blob version: 1
    12/20/2013 10:17:16:886 NetpDecodeProvisioningBlob: Selected ODJ blob version: 1
    12/20/2013 10:17:16:886 Blob version: 1
    12/20/2013 10:17:16:886  lpDomain: judicial
    12/20/2013 10:17:16:886  lpMachineName: 243WIN7BASETST
    12/20/2013 10:17:16:886  lpMachinePassword: <omitted from log>
    12/20/2013 10:17:16:886    DomainDnsPolicy:
    12/20/2013 10:17:16:886     Name: JUDICIAL
    12/20/2013 10:17:16:886     DnsDomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 10:17:16:886    DcInfo:
    12/20/2013 10:17:16:886     DomainControllerName:
    \\ATREYU1V-PII.jis.state.ct.us
    12/20/2013 10:17:16:886     DomainControllerAddress:
    \\10.16.6.99
    12/20/2013 10:17:16:886     DomainControllerAddressType: 1
    12/20/2013 10:17:16:886     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 10:17:16:886     DomainName: jis.state.ct.us
    12/20/2013 10:17:16:886     DnsForestName: jis.state.ct.us
    12/20/2013 10:17:16:886     Flags: 0xe00031fc
    12/20/2013 10:17:16:886     DcSiteName: Judicial-Data-Centers
    12/20/2013 10:17:16:886     ClientSiteName: EHFD-99ERiver
    12/20/2013 10:17:16:886  Options: 0x40000003
    12/20/2013 10:17:16:886 NetpDoInitiateOfflineDomainJoin
    12/20/2013 10:17:16:886 NetpDoInitiateOfflineDomainJoin: Setting backup/restore privileges
    12/20/2013 10:17:16:902 NetpInitiateOfflineJoin
    12/20/2013 10:17:16:902  lpLocalRegistryPath: C:\Windows\system32\config\SYSTEM
    12/20/2013 10:17:16:902  dwOptions: 0x40000003
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: Translating provisioning data to internal format
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: Selecting version 1
    12/20/2013 10:17:16:902 NetpConvertBlobToJoinState: exiting: 0x0
    12/20/2013 10:17:16:902 NetpValidateFullJoinState: Validating provisioning data...
    12/20/2013 10:17:16:902 NetpValidateFullJoinState: exiting: 0x0
    12/20/2013 10:17:16:902 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 10:17:16:902 NetpClearFullJoinState: Status of deleting join state key 0x2
    12/20/2013 10:17:16:902 NetpSaveFullJoinStateInternal: Injecting provisioning data into image...
    12/20/2013 10:17:16:902 NetpSaveFullJoinStateInternal: exiting: 0x0
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Checking for pending name changes...
    12/20/2013 10:17:16:902  SetHostName: TRUE
    12/20/2013 10:17:16:902  SetDnsDomain: TRUE
    12/20/2013 10:17:16:902  SetNetBiosName: TRUE
    12/20/2013 10:17:16:902  SetCurrentValues: TRUE
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting Hostname to 243WIN7BASETST
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting Domain name to jis.state.ct.us
    12/20/2013 10:17:16:902 NetpSetComputerNamesOffline: Setting NetBios computer name to 243WIN7BASETST
    12/20/2013 10:17:16:917 NetpDoInitiateOfflineDomainJoin: status: 0x0
    12/20/2013 10:17:16:917 NetRequestOfflineDomainJoin: Successfully initiated the offline domain join
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: Setting netlogon cache.
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: status of setting netlogon cache: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: Function exits with status of: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainOnDs: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 10:17:16:917 NetpCompleteOfflineDomainJoin
    12/20/2013 10:17:16:917  fBootTimeCaller: FALSE
    12/20/2013 10:17:16:917  fSetLocalGroups: TRUE
    12/20/2013 10:17:16:917 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 10:17:16:917 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:16:917 NetpJoinDomainLocal: NetpHandleJoinedStateInfo returned: 0x0
    12/20/2013 10:17:16:917 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 10:17:17:292 NetpJoinDomainLocal: NetpManageMachineSecret returned: 0x0.
    12/20/2013 10:17:17:292 Calling NetpQueryService to get Netlogon service state.
    12/20/2013 10:17:17:292 NetpJoinDomainLocal: NetpQueryService returned: 0x0.
    12/20/2013 10:17:17:417 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 10:17:17:417 NetpJoinDomainLocal: status of setting LSA pri. domain: 0x0
    12/20/2013 10:17:17:417 NetpManageLocalGroupsForJoin: Adding groups for new domain, removing groups from old domain, if any.
    12/20/2013 10:17:17:417 NetpManageLocalGroups: Populating list of account SIDs.
    12/20/2013 10:17:17:760 [000004ec] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:17:791 NetpManageLocalGroupsForJoin: status of modifying groups related to domain 'JUDICIAL' to local groups: 0x0
    12/20/2013 10:17:17:791 NetpManageLocalGroupsForJoin: INFO: No old domain groups to process.
    12/20/2013 10:17:17:791 NetpJoinDomainLocal: Status of managing local groups: 0x0
    12/20/2013 10:17:18:275 [00000164] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: status of setting ComputerNamePhysicalDnsDomain to 'jis.state.ct.us': 0x0
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: Controlling services and setting service start type.
    12/20/2013 10:17:18:665 NetpJoinDomainLocal: Updating W32TimeConfig
    12/20/2013 10:17:18:743 NetpUpdateW32timeConfig: 0x0
    12/20/2013 10:17:18:743 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 10:17:18:743 NetpClearFullJoinState: Status of deleting join state key 0x0
    12/20/2013 10:17:18:743 NetpCompleteOfflineDomainJoin: status: 0x0
    12/20/2013 10:17:18:743 NetpJoinDomain: NetpCompleteOfflineDomainJoin SUCCESS: Requested a reboot :0x0
    12/20/2013 10:17:18:743 NetpDoDomainJoin: status: 0x0
    12/20/2013 10:17:21:953 -----------------------------------------------------------------
    12/20/2013 10:17:21:953 NetpChangeMachineName: from '243WIN7BASETST' to '243WIN7BASEtst' using 'judicial\pcsetup2' [0x1000]
    12/20/2013 10:17:21:953 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 10:17:21:953 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 10:17:21:953 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 10:17:21:953 NetpGetDnsHostName: Read NV Domain: jis.state.ct.us
    12/20/2013 10:17:21:969 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\ATREYU1V-PII
    12/20/2013 10:17:21:969 NetpGetComputerObjectDn: Crack results:  (Account already exists) DN = CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 10:17:21:969 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 10:17:21:969   DnsHostName  =  243WIN7BASEtst.jis.state.ct.us
    12/20/2013 10:17:21:969   ServicePrincipalName  =  HOST/243WIN7BASEtst.jis.state.ct.us  RestrictedKrbHost/243WIN7BASEtst.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 10:17:21:985 NetpModifyComputerObjectInDs: Computer Object already exists in OU:
    12/20/2013 10:17:21:985   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:21:985   ServicePrincipalName  =  RestrictedKrbHost/243WIN7BASETST  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST.jis.state.ct.us
    12/20/2013 10:17:21:985 NetpModifyComputerObjectInDs: There are _NO_ modifications to do
    12/20/2013 10:17:21:985 ldap_unbind status: 0x0
    12/20/2013 10:17:21:985 NetpChangeMachineName: status of setting DnsHostName and SPN: 0x0
    12/20/2013 13:30:34:370 -----------------------------------------------------------------
    12/20/2013 13:30:34:440 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 13:30:34:460 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 13:30:34:460 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 13:30:34:553 -----------------------------------------------------------------
    12/20/2013 13:30:34:553 NetpValidateName: checking to see if '243WIN7BASEtst.jis.state.ct.us' is valid as type 5 name
    12/20/2013 13:30:34:553 NetpValidateName: name '243WIN7BASEtst.jis.state.ct.us' is valid for type 5
    12/20/2013 13:30:34:569 -----------------------------------------------------------------
    12/20/2013 13:30:34:569 NetpValidateName: checking to see if 'JIS' is valid as type 2 name
    12/20/2013 13:30:34:569 NetpCheckNetBiosNameNotInUse for 'JIS' [ Workgroup as MACHINE]  returned 0x0
    12/20/2013 13:30:34:569 NetpValidateName: name 'JIS' is valid for type 2
    12/20/2013 13:30:34:585 -----------------------------------------------------------------
    12/20/2013 13:30:34:585 NetpUnJoinDomain: unjoin from 'JUDICIAL' using '(null)' creds, options: 0x4
    12/20/2013 13:30:34:585  OS Version: 6.1
    12/20/2013 13:30:34:585  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:34:585  ServicePack: Service Pack 1
    12/20/2013 13:30:34:585  SKU: Windows 7 Professional
    12/20/2013 13:30:34:585 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:34:585 NetpApplyJoinState: actions: 0x2b805a
    12/20/2013 13:30:34:585 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 13:30:34:694 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 13:30:34:819 NetUseAdd to \\ATREYU1V-PII\IPC$ returned 1326
    12/20/2013 13:30:34:819 Trying add to 
    \\ATREYU1V-PII\IPC$ using NULL Session
    12/20/2013 13:30:34:850 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:36:113 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:36:145 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:36:145 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:36:145 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:36:145 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:36:410 SamOpenUser on 48956 failed with 0xc0000022
    12/20/2013 13:30:36:410 NetpManageMachineAccountWithSid: status of disabling account '243WIN7BASETST$' on '\\ATREYU1V-PII': 0x5
    12/20/2013 13:30:36:410 NetpApplyJoinState: status of disabling account: 0x5
    12/20/2013 13:30:36:410 NetpApplyJoinState: initiating a rollback due to earlier errors
    12/20/2013 13:30:36:410 NetpApplyJoinState: actions: 0x440210
    12/20/2013 13:30:36:410 NetpDsGetDcName: trying to find DC in domain '(null)', flags: 0x1020
    12/20/2013 13:30:36:425 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 13:30:36:441 NetUseAdd to
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ returned 1326
    12/20/2013 13:30:36:441 Trying add to 
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ using NULL Session
    12/20/2013 13:30:36:441 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:36:441 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:36:441 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 13:30:36:675 NetpSetMachineAccountPassword: NetUserSetInfo (level 1003) on '\\ATREYU1V-PII.jis.state.ct.us' for '243WIN7BASETST$' failed: 0x5
    12/20/2013 13:30:36:675 NetpApplyJoinState: status of setting machine password: 0x5
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of starting and setting start type of Netlogon to 4: 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: NON FATAL: status of adding DNS registrations: 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:36:956 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:36:956 NetpUnJoinDomain: status: 0x5
    12/20/2013 13:30:41:886 -----------------------------------------------------------------
    12/20/2013 13:30:41:886 NetpUnJoinDomain: unjoin from 'JUDICIAL' using 'jis.state.ct.us\a' creds, options: 0x4
    12/20/2013 13:30:41:886  OS Version: 6.1
    12/20/2013 13:30:41:886  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:41:886  ServicePack: Service Pack 1
    12/20/2013 13:30:41:886  SKU: Windows 7 Professional
    12/20/2013 13:30:41:886 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:41:886 NetpApplyJoinState: actions: 0x2b805a
    12/20/2013 13:30:41:886 NetpDsGetDcName: trying to find DC in domain 'JUDICIAL', flags: 0x1010
    12/20/2013 13:30:41:886 NetpDsGetDcName: found DC '\\ATREYU1V-PII' in the specified domain
    12/20/2013 13:30:44:974 NetUseAdd to \\ATREYU1V-PII\IPC$ returned 1326
    12/20/2013 13:30:44:974 Trying add to 
    \\ATREYU1V-PII\IPC$ using NULL Session
    12/20/2013 13:30:44:990 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:46:301 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:46:301 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:46:301 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:46:301 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:46:301 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:46:394 SamOpenUser on 48956 failed with 0xc0000022
    12/20/2013 13:30:46:394 NetpManageMachineAccountWithSid: status of disabling account '243WIN7BASETST$' on '\\ATREYU1V-PII': 0x5
    12/20/2013 13:30:46:394 NetpApplyJoinState: status of disabling account: 0x5
    12/20/2013 13:30:46:394 NetpApplyJoinState: initiating a rollback due to earlier errors
    12/20/2013 13:30:46:394 NetpApplyJoinState: actions: 0x440210
    12/20/2013 13:30:46:394 NetpDsGetDcName: trying to find DC in domain '(null)', flags: 0x1020
    12/20/2013 13:30:46:410 NetpDsGetDcName: found DC '\\ATREYU1V-PII.jis.state.ct.us' in the specified domain
    12/20/2013 13:30:46:425 NetUseAdd to
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ returned 1326
    12/20/2013 13:30:46:425 Trying add to 
    \\ATREYU1V-PII.jis.state.ct.us\IPC$ using NULL Session
    12/20/2013 13:30:46:425 NetpApplyJoinState: status of connecting to dc '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:46:425 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:46:425 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 13:30:46:659 NetpSetMachineAccountPassword: NetUserSetInfo (level 1003) on '\\ATREYU1V-PII.jis.state.ct.us' for '243WIN7BASETST$' failed: 0x5
    12/20/2013 13:30:46:659 NetpApplyJoinState: status of setting machine password: 0x5
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of starting and setting start type of Netlogon to 4: 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: NON FATAL: status of adding DNS registrations: 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII.jis.state.ct.us': 0x0
    12/20/2013 13:30:46:815 NetpApplyJoinState: status of disconnecting from '\\ATREYU1V-PII': 0x0
    12/20/2013 13:30:46:815 NetpUnJoinDomain: status: 0x5
    12/20/2013 13:30:46:831 -----------------------------------------------------------------
    12/20/2013 13:30:46:831 NetpUnJoinDomain: unjoin from 'JUDICIAL' using 'jis.state.ct.us\a' creds, options: 0x0
    12/20/2013 13:30:46:831  OS Version: 6.1
    12/20/2013 13:30:46:831  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:46:831  ServicePack: Service Pack 1
    12/20/2013 13:30:46:831  SKU: Windows 7 Professional
    12/20/2013 13:30:46:831 NetpUnJoinDomain: status of getting computer name: 0x0
    12/20/2013 13:30:46:831 NetpApplyJoinState: actions: 0x2b005a
    12/20/2013 13:30:47:096 [000009d8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:47:611 [000004e8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:173 NetpApplyJoinState: status of stopping and setting start type of Netlogon to 16: 0x0
    12/20/2013 13:30:48:173 NetpApplyJoinState: NON FATAL: status of removing DNS registrations: 0x0
    12/20/2013 13:30:48:173 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:173 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:48:173 NetpLsaOpenSecret: status: 0x0
    12/20/2013 13:30:48:391 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 13:30:48:391 NetpApplyJoinState: status of setting LSA pri. domain: 0x0
    12/20/2013 13:30:48:625 NetpApplyJoinState: status of clearing ComputerNamePhysicalDnsDomain: 0x0
    12/20/2013 13:30:48:625 NetpManageLocalGroups: Populating list of account SIDs.
    12/20/2013 13:30:48:858 [000004e8] NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:889 NetpApplyJoinState: status of removing from local groups: 0x0
    12/20/2013 13:30:48:889 NetpUpdateW32timeConfig: 0x0
    12/20/2013 13:30:48:905 NetpUnJoinDomain: status: 0x0
    12/20/2013 13:30:48:936 -----------------------------------------------------------------
    12/20/2013 13:30:48:936 NetpDoDomainJoin
    12/20/2013 13:30:48:936 NetpMachineValidToJoin: '243WIN7BASETST'
    12/20/2013 13:30:48:936  OS Version: 6.1
    12/20/2013 13:30:48:936  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 13:30:48:936  ServicePack: Service Pack 1
    12/20/2013 13:30:48:952  SKU: Windows 7 Professional
    12/20/2013 13:30:48:952 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 13:30:48:952 NetpMachineValidToJoin: status: 0x0
    12/20/2013 13:30:48:952 NetpJoinWorkgroup: joining computer '243WIN7BASETST' to workgroup 'JIS'
    12/20/2013 13:30:48:952 NetpValidateName: checking to see if 'JIS' is valid as type 2 name
    12/20/2013 13:30:48:952 NetpCheckNetBiosNameNotInUse for 'JIS' [ Workgroup as MACHINE]  returned 0x0
    12/20/2013 13:30:48:952 NetpValidateName: name 'JIS' is valid for type 2
    12/20/2013 13:30:49:077 NetpSetLsaPrimaryDomain: for 'JIS' status: 0x0
    12/20/2013 13:30:49:295 NetpJoinWorkgroup: status:  0x0
    12/20/2013 13:30:49:295 NetpDoDomainJoin: status: 0x0
    12/20/2013 13:39:24:681 -----------------------------------------------------------------
    12/20/2013 13:39:24:697 NetpValidateName: checking to see if 'WIN7SP1BASE' is valid as type 1 name
    12/20/2013 13:39:24:728 NetpCheckNetBiosNameNotInUse for 'WIN7SP1BASE' [MACHINE] returned 0x0
    12/20/2013 13:39:24:728 NetpValidateName: name 'WIN7SP1BASE' is valid for type 1
    12/20/2013 13:39:24:775 -----------------------------------------------------------------
    12/20/2013 13:39:24:775 NetpValidateName: checking to see if 'WIN7SP1BASE' is valid as type 5 name
    12/20/2013 13:39:24:775 NetpValidateName: name 'WIN7SP1BASE' is valid for type 5
    12/20/2013 14:22:43:445 -----------------------------------------------------------------
    12/20/2013 14:22:43:445 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 14:22:43:445 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 14:22:43:445 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 14:22:43:508 -----------------------------------------------------------------
    12/20/2013 14:22:43:508 NetpValidateName: checking to see if '243WIN7BASEtst' is valid as type 5 name
    12/20/2013 14:22:43:508 NetpValidateName: name '243WIN7BASEtst' is valid for type 5
    12/20/2013 14:26:14:548 -----------------------------------------------------------------
    12/20/2013 14:26:14:548 NetpValidateName: checking to see if '243WIN7BASETST' is valid as type 1 name
    12/20/2013 14:26:14:548 NetpCheckNetBiosNameNotInUse for '243WIN7BASETST' [MACHINE] returned 0x0
    12/20/2013 14:26:14:548 NetpValidateName: name '243WIN7BASETST' is valid for type 1
    12/20/2013 14:26:14:595 -----------------------------------------------------------------
    12/20/2013 14:26:14:595 NetpValidateName: checking to see if '243WIN7BASEtst' is valid as type 5 name
    12/20/2013 14:26:14:595 NetpValidateName: name '243WIN7BASEtst' is valid for type 5
    12/20/2013 14:26:14:626 -----------------------------------------------------------------
    12/20/2013 14:26:14:626 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 14:26:14:751 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 14:26:14:751 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 14:26:25:156 -----------------------------------------------------------------
    12/20/2013 14:26:25:156 NetpDoDomainJoin
    12/20/2013 14:26:25:156 NetpMachineValidToJoin: '243WIN7BASETST'
    12/20/2013 14:26:25:156  OS Version: 6.1
    12/20/2013 14:26:25:156  Build number: 7601 (7601.win7sp1_rtm.101119-1850)
    12/20/2013 14:26:25:156  ServicePack: Service Pack 1
    12/20/2013 14:26:25:156  SKU: Windows 7 Professional
    12/20/2013 14:26:25:156 NetpDomainJoinLicensingCheck: ulLicenseValue=1, Status: 0x0
    12/20/2013 14:26:25:156 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 14:26:25:156 NetpMachineValidToJoin: status: 0x0
    12/20/2013 14:26:25:156 NetpJoinDomain
    12/20/2013 14:26:25:156  Machine: 243WIN7BASETST
    12/20/2013 14:26:25:156  Domain: judicial
    12/20/2013 14:26:25:156  MachineAccountOU: (NULL)
    12/20/2013 14:26:25:156  Account: judicial\pcsetup2
    12/20/2013 14:26:25:156  Options: 0x25
    12/20/2013 14:26:25:156 NetpLoadParameters: loading registry parameters...
    12/20/2013 14:26:25:156 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 14:26:25:156 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 14:26:25:156 NetpLoadParameters: status: 0x2
    12/20/2013 14:26:25:156 NetpValidateName: checking to see if 'judicial' is valid as type 3 name
    12/20/2013 14:26:25:265 NetpCheckDomainNameIsValid [ Exists ] for 'judicial' returned 0x0
    12/20/2013 14:26:25:265 NetpValidateName: name 'judicial' is valid for type 3
    12/20/2013 14:26:25:265 NetpDsGetDcName: trying to find DC in domain 'judicial', flags: 0x40001010
    12/20/2013 14:26:25:374 NetpLoadParameters: loading registry parameters...
    12/20/2013 14:26:25:374 NetpLoadParameters: DNSNameResolutionRequired not found, defaulting to '1' 0x2
    12/20/2013 14:26:25:374 NetpLoadParameters: DomainCompatibilityMode not found, defaulting to '0' 0x2
    12/20/2013 14:26:25:374 NetpLoadParameters: status: 0x2
    12/20/2013 14:26:25:374 NetpDsGetDcName: status of verifying DNS A record name resolution for 'Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:25:374 NetpDsGetDcName: found DC '\\Wabash00-PII.jis.state.ct.us' in the specified domain
    12/20/2013 14:26:25:374 NetpJoinDomainOnDs: NetpDsGetDcName returned: 0x0
    12/20/2013 14:26:25:608 NetpJoinDomain: status of connecting to dc '\\Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:25:608 NetpProvisionComputerAccount:
    12/20/2013 14:26:25:608  lpDomain: judicial
    12/20/2013 14:26:25:608  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:608  lpMachineAccountOU: (NULL)
    12/20/2013 14:26:25:608  lpDcName: Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:608  lpDnsHostName: (NULL)
    12/20/2013 14:26:25:608  lpMachinePassword: (null)
    12/20/2013 14:26:25:608  lpAccount: judicial\pcsetup2
    12/20/2013 14:26:25:608  lpPassword: (non-null)
    12/20/2013 14:26:25:608  dwJoinOptions: 0x25
    12/20/2013 14:26:25:608  dwOptions: 0x40000003
    12/20/2013 14:26:25:749 NetpLdapBind: Verified minimum encryption strength on Wabash00-PII.jis.state.ct.us: 0x0
    12/20/2013 14:26:25:749 NetpLdapGetLsaPrimaryDomain: reading domain data
    12/20/2013 14:26:25:749 NetpGetNCData: Reading NC data
    12/20/2013 14:26:25:764 NetpGetDomainData: Lookup domain data for: DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:764 NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:764 NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Cracking DNS domain name jis.state.ct.us/ into Netbios on
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Crack results:  name = JUDICIAL\
    12/20/2013 14:26:25:780 NetpGetComputerObjectDn: Cracking account name JUDICIAL\243WIN7BASETST$ on
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:796 NetpGetComputerObjectDn: Crack results:  (Account already exists) DN = CN=243WIN7BASETST,OU=JB New Computers,DC=jis,DC=state,DC=ct,DC=us
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Initial attribute values:
    12/20/2013 14:26:25:796   objectClass  =  Computer
    12/20/2013 14:26:25:796   SamAccountName  =  243WIN7BASETST$
    12/20/2013 14:26:25:796   userAccountControl  =  0x1000
    12/20/2013 14:26:25:796   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   ServicePrincipalName  =  HOST/243WIN7BASETST.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST
    12/20/2013 14:26:25:796   unicodePwd  =  <SomePassword>
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Computer Object already exists in OU:
    12/20/2013 14:26:25:796   objectClass  =  top  person  organizationalPerson  user  computer
    12/20/2013 14:26:25:796   SamAccountName  =  243WIN7BASETST$
    12/20/2013 14:26:25:796   userAccountControl  =  0x1000
    12/20/2013 14:26:25:796   DnsHostName  =  243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   ServicePrincipalName  =  TERMSRV/243WIN7BASETST  TERMSRV/243WIN7BASEtst.jis.state.ct.us  RestrictedKrbHost/243WIN7BASETST  HOST/243WIN7BASETST  RestrictedKrbHost/243WIN7BASETST.jis.state.ct.us 
    HOST/243WIN7BASETST.jis.state.ct.us
    12/20/2013 14:26:25:796   unicodePwd  =  Account exists, resetting password: <SomePassword>
    12/20/2013 14:26:25:796 NetpModifyComputerObjectInDs: Attribute values to set:
    12/20/2013 14:26:25:796   unicodePwd  =  <SomePassword>
    12/20/2013 14:26:25:967 NetpModifyComputerObjectInDs: Toggled UserAccountControl successfully
    12/20/2013 14:26:25:967 NetpEncodeProvisioningBlob: Encoding provisioning data
    12/20/2013 14:26:25:967 NetpInitBlobWin7: Constructing blob...
    12/20/2013 14:26:25:967 Blob version: 1
    12/20/2013 14:26:25:967  lpDomain: judicial
    12/20/2013 14:26:25:967  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:967  lpMachinePassword: <omitted from log>
    12/20/2013 14:26:25:967    DomainDnsPolicy:
    12/20/2013 14:26:25:967     Name: JUDICIAL
    12/20/2013 14:26:25:967     DnsDomainName: jis.state.ct.us
    12/20/2013 14:26:25:967     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:967     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:967     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 14:26:25:967    DcInfo:
    12/20/2013 14:26:25:967     DomainControllerName:
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:967     DomainControllerAddress:
    \\10.16.8.100
    12/20/2013 14:26:25:967     DomainControllerAddressType: 1
    12/20/2013 14:26:25:967     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:967     DomainName: jis.state.ct.us
    12/20/2013 14:26:25:967     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:967     Flags: 0xe00033fc
    12/20/2013 14:26:25:967     DcSiteName: Judicial-Data-Centers
    12/20/2013 14:26:25:967     ClientSiteName: EHFD-99ERiver
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983 NetpInitBlobWin7: Blob pickling result: 0
    12/20/2013 14:26:25:983 NetpEncodeProvisioningBlob: result: 0x0
    12/20/2013 14:26:25:983 ldap_unbind status: 0x0
    12/20/2013 14:26:25:983 NetpRequestOfflineDomainJoin:
    12/20/2013 14:26:25:983  dwProvisionBinDataSize: 960
    12/20/2013 14:26:25:983  JoinOptions: 0x25
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983  lpWindowsPath: C:\Windows
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Unpickling provisioning blob with size 960 bytes
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Searching 1 blobs for supported ODJ blob, highest supported version: 1
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Found ODJ blob version: 1
    12/20/2013 14:26:25:983 NetpDecodeProvisioningBlob: Selected ODJ blob version: 1
    12/20/2013 14:26:25:983 Blob version: 1
    12/20/2013 14:26:25:983  lpDomain: judicial
    12/20/2013 14:26:25:983  lpMachineName: 243WIN7BASETST
    12/20/2013 14:26:25:983  lpMachinePassword: <omitted from log>
    12/20/2013 14:26:25:983    DomainDnsPolicy:
    12/20/2013 14:26:25:983     Name: JUDICIAL
    12/20/2013 14:26:25:983     DnsDomainName: jis.state.ct.us
    12/20/2013 14:26:25:983     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:983     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:983     Sid: S-1-5-21-1552756269-800212831-618671499
    12/20/2013 14:26:25:983    DcInfo:
    12/20/2013 14:26:25:983     DomainControllerName:
    \\Wabash00-PII.jis.state.ct.us
    12/20/2013 14:26:25:983     DomainControllerAddress:
    \\10.16.8.100
    12/20/2013 14:26:25:983     DomainControllerAddressType: 1
    12/20/2013 14:26:25:983     DomainGuid: 8108ed1e-d08f-40a0-8089-598b7f58e1e7
    12/20/2013 14:26:25:983     DomainName: jis.state.ct.us
    12/20/2013 14:26:25:983     DnsForestName: jis.state.ct.us
    12/20/2013 14:26:25:983     Flags: 0xe00033fc
    12/20/2013 14:26:25:983     DcSiteName: Judicial-Data-Centers
    12/20/2013 14:26:25:983     ClientSiteName: EHFD-99ERiver
    12/20/2013 14:26:25:983  Options: 0x40000003
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin: Setting backup/restore privileges
    12/20/2013 14:26:25:983 NetpInitiateOfflineJoin
    12/20/2013 14:26:25:983  lpLocalRegistryPath: C:\Windows\system32\config\SYSTEM
    12/20/2013 14:26:25:983  dwOptions: 0x40000003
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: Translating provisioning data to internal format
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: Selecting version 1
    12/20/2013 14:26:25:983 NetpConvertBlobToJoinState: exiting: 0x0
    12/20/2013 14:26:25:983 NetpValidateFullJoinState: Validating provisioning data...
    12/20/2013 14:26:25:983 NetpValidateFullJoinState: exiting: 0x0
    12/20/2013 14:26:25:983 NetpClearFullJoinState:  Removing cached state from the registry...
    12/20/2013 14:26:25:983 NetpClearFullJoinState: Status of deleting join state key 0x2
    12/20/2013 14:26:25:983 NetpSaveFullJoinStateInternal: Injecting provisioning data into image...
    12/20/2013 14:26:25:983 NetpSaveFullJoinStateInternal: exiting: 0x0
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Checking for pending name changes...
    12/20/2013 14:26:25:983  SetHostName: TRUE
    12/20/2013 14:26:25:983  SetDnsDomain: TRUE
    12/20/2013 14:26:25:983  SetNetBiosName: TRUE
    12/20/2013 14:26:25:983  SetCurrentValues: TRUE
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting Hostname to 243WIN7BASETST
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting Domain name to jis.state.ct.us
    12/20/2013 14:26:25:983 NetpSetComputerNamesOffline: Setting NetBios computer name to 243WIN7BASETST
    12/20/2013 14:26:25:983 NetpDoInitiateOfflineDomainJoin: status: 0x0
    12/20/2013 14:26:25:983 NetRequestOfflineDomainJoin: Successfully initiated the offline domain join
    12/20/2013 14:26:25:983 NetpJoinDomainOnDs: Setting netlogon cache.
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: status of setting netlogon cache: 0x0
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: Function exits with status of: 0x0
    12/20/2013 14:26:26:014 NetpJoinDomainOnDs: status of disconnecting from '\\Wabash00-PII.jis.state.ct.us': 0x0
    12/20/2013 14:26:26:014 NetpCompleteOfflineDomainJoin
    12/20/2013 14:26:26:014  fBootTimeCaller: FALSE
    12/20/2013 14:26:26:014  fSetLocalGroups: TRUE
    12/20/2013 14:26:26:014 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 14:26:26:030 NetpGetLsaPrimaryDomain: status: 0x0
    12/20/2013 14:26:26:030 NetpJoinDomainLocal: NetpHandleJoinedStateInfo returned: 0x0
    12/20/2013 14:26:26:030 NetpLsaOpenSecret: status: 0xc0000034
    12/20/2013 14:26:26:326 NetpJoinDomainLocal: NetpManageMachineSecret returned: 0x0.
    12/20/2013 14:26:26:326 Calling NetpQueryService to get Netlogon service state.
    12/20/2013 14:26:26:326 NetpJoinDomainLocal: NetpQueryService returned: 0x0.
    12/20/2013 14:26:26:420 NetpSetLsaPrimaryDomain: for 'JUDICIAL' status: 0x0
    12/20/2013 14:26:26:420 NetpJoinDomainLocal: status of setting LSA pri. domain: 0x0
    12/20/2013 14:26:26:420 NetpManageLocalGroupsForJoin: Adding groups for new domain, removing groups from old domain, if any.
    Windows IP Configuration from machine not joining the domain
       Host Name . . . . . . . . . . . . : 243sccmtest5
       Primary Dns Suffix  . . . . . . . :
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : jis.state.ct.us
    Ethernet adapter Local Area Connection:
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection #2
       Physical Address. . . . . . . . . : B4-B5-2F-C0-D1-08
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::857e:ee89:64be:e243%12(Preferred)
       IPv4 Address. . . . . . . . . . . : 10.16.211.236(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Wednesday, November 12, 2014 11:59:47 AM
       Lease Expires . . . . . . . . . . : Wednesday, November 12, 2014 7:59:46 PM
       Default Gateway . . . . . . . . . : fe80::21f:6cff:febf:4bf%12
                                           10.16.211.1
       DHCP Server . . . . . . . . . . . : 10.16.204.101
       DNS Servers . . . . . . . . . . . : 10.16.8.100
                                           10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
                                           10.16.204.100
       Primary WINS Server . . . . . . . : 10.16.8.100
       Secondary WINS Server . . . . . . : 10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
       NetBIOS over Tcpip. . . . . . . . : Enabled
    Tunnel adapter Local Area Connection* 9:
       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Microsoft ISATAP Adapter
       Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
    Windows IP Configuration from Domain Joined Machine
       Host Name . . . . . . . . . . . . : 2433ZENTEST01PC
       Primary Dns Suffix  . . . . . . . : jis.state.ct.us
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : jis.state.ct.us
    Ethernet adapter Local Area Connection:
       Connection-specific DNS Suffix  . : jis.state.ct.us
       Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection
       Physical Address. . . . . . . . . : 74-46-A0-90-37-49
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       IPv4 Address. . . . . . . . . . . : 10.16.211.201(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Wednesday, October 15, 2014 7:39:26 AM
       Lease Expires . . . . . . . . . . : Wednesday, November 12, 2014 8:40:50 PM
       Default Gateway . . . . . . . . . : 10.16.211.1
       DHCP Server . . . . . . . . . . . : 10.16.4.101
       DNS Servers . . . . . . . . . . . : 10.16.8.100
                                           10.16.5.100
                                           10.16.6.100
                                           10.16.206.100
       Primary WINS Server . . . . . . . : 10.16.5.100
       Secondary WINS Server . . . . . . : 10.16.8.100
       NetBIOS over Tcpip. . . . . . . . : Enabled
    Seems like DNS Issue

    Hi,
    Have you tried to delete the computer account from AD?
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • ModernUI app fail to install from Intune Company Portal on Windows 8.1 Enteprise domain joined

    i know that using sideloading keys are required in all scenario's whenever i want to deploy modernUI apps to windows 8.1 devices. Using a domain joined enterprise Windows 8.1 device it should be required as i've heard. However, i'm looking for the exact
    technical requirements to be able to deploy a modernUI app through the company portal from Intune. So far i know the following requirements:
    device must be domain joined enterprise version OR use sideloading keys;
    the device must be joined to the domain that is dirsynced with the Intune subscription;
    AllowAllTrustedApps reg key must be set to 1 OR configure the corresponding GPO;
    a Microsoft account is required to access the Windows Store;
    a Windows Intune subscription user account is required to enroll the device into Windows Intune;
    the modernUI (demo) app must be visible in the company portal;
    app must be signed and the device must trust the corresponding cert OR use a developer sideloading key: Show-WindowsDeveloperLicenseRegistration;
    does someone have a good overview of all requirements in relation to deploying modernUI apps? 
    I find it very confusing when to determine which requirements apply. thanks in advance!

    i know that using sideloading keys are required in all scenario's whenever i want to deploy modernUI apps to windows 8.1 devices. Using a domain joined enterprise Windows 8.1 device it should be required as i've heard. However, i'm looking for the exact
    technical requirements to be able to deploy a modernUI app through the company portal from Intune. So far i know the following requirements:
    device must be domain joined enterprise version OR use sideloading keys;
    the device must be joined to the domain that is dirsynced with the Intune subscription;
    AllowAllTrustedApps reg key must be set to 1 OR configure the corresponding GPO;
    a Microsoft account is required to access the Windows Store;
    a Windows Intune subscription user account is required to enroll the device into Windows Intune;
    the modernUI (demo) app must be visible in the company portal;
    app must be signed and the device must trust the corresponding cert OR use a developer sideloading key: Show-WindowsDeveloperLicenseRegistration;
    does someone have a good overview of all requirements in relation to deploying modernUI apps? 
    I find it very confusing when to determine which requirements apply. thanks in advance!
    If you have a domain joined Windows 8.x Enterprise workstation, you do not need the sideloading keys. You only need sideloading keys for Windows 8 Pro, RT etc.
    It will install as long as:
    Domain joined
    AllowAllTrustedApps - GPO or Local Policy enabled
    Signed by a trusted certificate

  • Trying to use Variables with the Unknown Computer collection to prompt Task Sequence for Domain, Join Account, Join Password, and Join Location.

    I want to use SCCM 2012 R2 and OSD, to boot a bare metal machine, install and OS, and bind it to Active Directory. The catch is that I want the deployment process in SCCM to prompt for the following pieces of information, and then use that information to
    bind the computer to Active Directory (W/O using MDT) instead of supply the data in the task sequence.
    Computer Name
    Domain
    Domain OU
    Domain Join Account
    I am approaching this in a similar fashion as stated in this blog.
    http://osdblog.com/2013/06/26/add-a-prompt-for-a-computer-name-in-your-sccm-deployment/
    I have added the following collection variables to the unknown computers collection:
    When I launch the task sequence, I am prompted as I would expect. I input the desired information, the deployment competes, but it does not bind to the domain.  Here is what my TS looks like. I intentally disabbled  the apply Network Settings step
    because it forces you to enter specific information if it enabled. I don't want to that, thus why I am trying to use the variables.
    My SMSTS log does not have a whole lot of meaningfull data, but I can post it if someone wants to see it. The only possible thing I could think of would be drivers, their are some driver errors in the log. However, if I turn on the Apply Networking setting
    process in the task sequence and turn off the variables, the machines bind fine. With that in mind, I would not think my problem would be driver related. Anyone out there have expertise in using a process like this, that could assist?
    --Tony

    Awesome! Thanks. One more thing, how should I supply the OSDJoinPassword variable? Should I just enter %OSDJoinPassword%
    for Password and Confirm Password? I can not tell if it will actually read it as a variable or try to use "%OSDJoinPassword%" for
    the actual password.
    --Tony

  • Windows 7 MDT Offline Domain Join

    In a scenario where a user does not have access to the corporate network, a mostly automated media-based refresh is implemented.
    - Refresh laptops from Windows XP/Vista to Windows 7
    - MDT task sequence, OS, drivers, apps, contained on a supplied DVD
    - User needs only to select the task sequence from the Wizard menu, all else is automated
    - Hardlink user state capture and migration
    The problem exists with joining the offline computer to the corporate domain.  If the domain join fails, the user can't log on to his/her restored domain user profile.
    Does anyone have any experience or tips related to using the Win7/2008 djoin.exe utility with an automated MDT task sequence?  I can't find much information on it, and it's new to me.
    I gather that you have to join the object at the domain first, then extract the required metadata, and somehow inject this individual computer data (aka Base64 blob) in the 'Microsoft-Windows-UnattendJoin/Identification/Provisioning' section of the unattend.xml
    ... but how to do that with some type of variable?  I'd like to avoid creating a customized DVD for every single computer in the field.
    I'll keep searching, but if anyone has done this before please let me know your experiences.

    Appreciate the reply, but I've already read through that.  I'm looking for information specific to MDT and suggestion on how to include the process in a [semi] automated task sequence in a media-based offline scenario.
    A general idea would be to compile a text file of target computer names, run a script to execute djoin.exe against the list to provision all the computers, generating a base64 blob text file for each.  Then, store that repository of files in the deployment
    share so it is included on the MDT media.  Call the file as a Run Command step using the computer name variable during the task sequence State Restore phase to execute the offline join.   eg: 
    cmd.exe /c djoin.exe /requestODJ /loadfile %ScriptRoot%\Blobs\%OSDComputerName%.txt /windowspath %windir% /localos
    In testing, provisioning an existing computer on the DC breaks any domain relationship because the computer account is reset by the /reuse parameter.  The relationship can be fixed by running the /requestODJ command on the computer - essentially 'rejoining'
    the machine to the domain - but it presents a problem for the time lapse between pre-staging computers and distributing the media.  Since the users are all currently running XP or Vista, it doesn't make sense to explore a theory of re-using the same blob
    data multiple times, such as immediately after provisioning and then again during the reimage.
    I'm opening a call with MS support, but still interested to hear if anyone has used this utility with MDT at all.

  • Windows 7 or Windows Server 2008 R2 domain join displays error "Changing the Primary Domain DNS name of this computer to "" failed...."

    Hi,
    Windows 7 or Windows Server 2008 R2 domain join displays error "Changing the Primary Domain DNS name of this computer to "" failed...."
    DC:windows Server 2008 R2
    Domain functional level:Windows Server 2003
    When Winxp join domain, have no this error message.
    I checked http://support.microsoft.com/kb/2018583?wa=wsignin1.0 does't work.
    There have 3 suggestion in this article:
    1.The "Disable NetBIOS over TCP/IP" checkbox has been disabled in the IPv4 properties of the computer being joined.
    Doesnt's work.
    2.Connectivity over UDP port 137 is blocked between client and the helper DC servicing the join operation in the target domain.
    On my DC, I run netstat -an, reslut as below:
     UDP    192.168.20.3:137       *:*
    3.The TCP/IPv4 protocol has been disabled so that the client being joined or the DC in the destination domain targeted by the LDAP BIND is running TCP/IPv6 only.
    We are not using IPV6.
    This server recently updated from Windows Server 2003 to Windows Server 2008 R2. Before upgrade, when Win7 and Win2008 join this domain, also have the same error message.
    Please help to check this issue.
    Thank you very much.
    BR
    Guo YingHui 

    Hi Guo Ying,
    I have faced this critical error which makes over-writes the host names in the domain when you join.
    For example: Already you had a host name called as PC.domain.com in the domain.com Domain.
    When you try to add the another host name called as PC in the domain.com Domain, it doesn't give you the duplicate name error on the network it does over-write the existing host name called as PC.domain.com & it will add the new host name into the domain.
    Host name which got over-written will get removed from the domain. I faced this issue in my project. My DPM host name got removed from the Domain & new host name got joined into the domain which halted my backups for one day.
    Final Resolution is as follows:
    You need to start the dns console on the DC & drop down the domain name.
    Select the _msdcs when you click on _msdcs it will show the Name Server's list on the right hand side.
    You need to add the Domain Naming Master under the _msdcs or add all the domain controllers which you had.
    After you add the Name server's try joining the PC OR Laptop to the domain which is successfully joins it.
    Regards
    Anand S
    Thanks & Regards Anand Sunka MCSA+CCNA+MCTS

  • Restrict Outlook Access Only To Domain Joined PCs?

    We have contractors that use their employers laptops to access various LAN resources on our network such as access to shared network drives, printers, Remote Desktop and access to our Intranet sites.  They have mailboxes on our Exchange servers and
    we would like their mailbox access to be restricted to EAS and OWA, not Outlook unless they are using one of our domain-joined computers.  
    The main reason for this is to restrict these users from downloading their mailbox contents into into a personal folder.  We can create PST restrictions on our domain-joined PCs via group policy, but these policies would not apply to computers not joined
    to our domain.
    Of course we would also like to prevent Outlook access to their mail from their home PCs that they may have installed Outlook on, but we still need seamless remote access to Outlook on domain-joined laptops used remotely.
    How can this be done?

    PS -- Andy are you going to MEC ?
    Cheers,
    Rhoderick
    Microsoft Senior Exchange PFE
    Blog:
    http://blogs.technet.com/rmilne 
    Twitter:   LinkedIn:
      Facebook:
      XING:
    Note: Posts are provided “AS IS” without warranty of any kind, either expressed or implied, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.
    I will be there will bells on!
    Twitter!: Please Note: My Posts are provided “AS IS” without warranty of any kind, either expressed or implied.

  • Change default key size on non Domain joined CA.

    Hello,
    I have one standalone non domain joined CA I would like to change the default key size of all issued certs to 2048.  Since it is a stand along, there are no AD template to modify.  Can this be changed in the registry?
    Shawn

    CAPolicy.inf is the way to go.
    See the following thread
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/ce001d8f-c722-4429-83cb-328b92876292/how-to-change-root-certificate-keys-length-and-validity-period?forum=winserversecurity
    Hth, Anders Janson Enfo Zipper

  • Non-Domain joined clients connect to server initially but cannot connect via Launchpad

    Running SBS 2011 Essentials in a small office. Running XP/Vista/7 clients. All working fine until we swapped routers. Old router died, new router was installed. 
    Now all domain-joined PC's connect as normal, but all NON-Domain-Joined PC's cannot access the server via the launchpad. I get the "The server appears to be offline. Do you want to sign in to offline mode?" box. 
    Tried removing PC from the SBS Dashboard, uninstalling the connector from the client, restarting client, and reinstalling the connector. I can install the connector (using
    http://<server ip>/connect , but not http://<servername>/connect
    ). Connector installs but it still tells me the server is offline when trying to use dashboard or launchpad on the client.
    Note: I can add a network location or Map a network drive to ther server after inputting my network password from Windows.
    Any Services to check? Firewalls exceptions to ensure? Advice?
    EDIT: Dashboard on Server shows Client, sometimes as online, sometimes as offline. 

    Sounds like name resolution issue to me.
    Are all your clients set to use the IP of the Essentials Server for their primary DNS?
    Robert Pearman SBS MVP
    itauthority.co.uk |
    Title(Required)
    Facebook |
    Twitter |
    Linked in |
    Google+

  • Non domain-joined Clients (CES/CEP)

    Hello Everyone!
    This is my first post to the security forum and it is not an overly familiar tech for me so please be gentle. :)
    I am looking at building a lab to test a web based application for a client.  The client has very stringent security requirements and as such have mandated the need for both the web server to be secured using SSL certs and requires the connecting
    users to have a certificate.  The infrastructure will be hosted in a central DC in it's own AD forest whilst the users connecting in will have their own AD as they work for different companies.  Each user will have an AD account within the hosted
    environment.  My initial thought was to provide public certs for the web servers but my problem was providing certificates to the clients.  Clearly using public certs would be very expensive.  After a bit of research I stumbled across the following:
    http://blogs.technet.com/b/askds/archive/2010/05/25/enabling-cep-and-ces-for-enrolling-non-domain-joined-computers-for-certificates.aspx
    What I am trying to understand is, will the combination of Certificate services & CES/CEP effectively do away with the need for public certs in this instance?  Can I simply use the internal authority to publish certificates to the web server and
    to the end users?

    Yes - I think this is one of the scenarios CES/CEP have been developed for.
    End users would have to trust your internal CA and validate the chain, so intermediate CAs should be found via AIA URLs. But since you need user - not computer - certificates this is simpler than described in the article as users do not need to be local
    admins to import a root. (But on principle the admin of a user's home AD could restrict this though I have never encountered that.)
    You would need to publish the CES/CEP services via a reverse proxy and external users would have to configure the enrollment HTTP URLs and enter their AD credentials in the hosted AD when connecting.
    As users have imported your CA certificate they will also trust the web server's certificate issued from the same CA.
    Elke

  • Problems connecting a non-domain joined outlook to exchange

    Hello,
    i'm having issues configuring outlook (be it 2007, 2010 or 2013 all fail the same) on non-domain joined computers in the LAN to a exchange 2013 server.
    I select manual config, in server we put "mail.domain.local" and user "domain\user" and it bounces with "cannot complete action, the connection to exchange is not available, outlook must be online".
    We tried with external full email address, nothing
    tried setting the outlook anywhere proxy, same, tried using ip address, same
    it simply refuses to configure.
    any ideaS?

    Hi,
    Generally, the external non-domain joined computers can connect to Exchange 2013 by using Outlook Anywhere and the Autodiscover service to auto-setup the Exchange account.
    If the auto-setup for Exchange account fails, please check the Autodiscover service and Outlook Anywhere configuration by the following command:
    Get-OutlookAnywhere | FL
    Directly access the following URL in IE respectively, and check whether an Error 600 returns:
    Https://autodiscover.domain.com/autodiscover/autodiscover.xml
    Https://mail.domain.com/autodiscover/autodiscover.xml
    Please make sure the the ExternalHostName parameter for Outlook Anywhere is configured to your external namespace for Exchange 2013 (for example: mail.domain.com).
    In Exchange certificate, please make sure the namespace mail.domain.com is included in your trusted certificate which is assigned with IIS service.
    For manual Exchange account setup, please run the following command to get the mailbox GUID for server name configuration:
    Get-Mailbox UserA | FL Identity,ExchangeGuid
    Then go to Control Pane > Mail to configure the Outlook profile. In Server Settings, import the [email protected] into the Server box and click Check Name to have a try.
    Regards,
    Winnie Liang
    TechNet Community Support

  • IE 11 security settings / Server 2012 domain joined server

    Can someone clarify how the Security settings are automatically managed on domain jointed computers in IE 11 / Server 2012 R2:
    There seem to be different settings depending on the IE Enhanced Security Settings.
    I particular if IE Enhanced Security Settings are on, Security is forced to High for Internet and admins cannot change it.
    If IE Enhanced Security Settings is off for admins Security is forced to Medium High and admins cannot change it
    If IE Enhanced Security Settings is off Security is Medium-High and admins can change it
    Is this by design?
    Run As Administrator seems to have no effect.
    This only happens on domain joined systems
    CarolChi

    Hi CarolChi,
    IE-ESC is a feature from Windows Server. Yes, just as what your think, this behavior is by design.
    For more information, please read this article:
    Internet Explorer Enhanced Security Configuration changes the browsing experience
    http://support.microsoft.com/kb/815141
    Karen Hu
    TechNet Community Support

  • Best Practice of Essbase Cube Join Relational Table

    Hi,
    As the topic mentioned, what's the best practice of Essbase cube join relational table?
    Please notice that I want description columns, not measure columns, from relational table.
    Thanks.

    As a starting point, check out what Ed wrote together a while ago:
    [https://community.altiusconsulting.com/blogs/altiustechblog/archive/2008/10/24/are-essbase-and-oracle-bi-enterprise-edition-obiee-a-match-made-in-heaven.aspx|https://community.altiusconsulting.com/blogs/altiustechblog/archive/2008/10/24/are-essbase-and-oracle-bi-enterprise-edition-obiee-a-match-made-in-heaven.aspx]
    [http://community.altiusconsulting.com/blogs/altiustechblog/archive/2008/11/03/enhance-your-essbase-month-dimension-to-aid-sorting.aspx|http://community.altiusconsulting.com/blogs/altiustechblog/archive/2008/11/03/enhance-your-essbase-month-dimension-to-aid-sorting.aspx]
    Cheers,
    C.

  • Domain Joining port

    What all network port are required for join a machine in Domain. One of my server is not able to join the Domain. Please let me know what all port i have to opened to this server side.
    Nirmal Singh IT Administrator

    If, you are not sure whether port is opened or not or some port is filtered, you can use portquery tool. For AD port requirements, see the below link.
    http://support.microsoft.com/kb/832017
    http://blogs.technet.com/b/abizerh/archive/2009/06/11/troubleshooting-rpc-server-is-unavailable-error-reported-in-failing-ad-replication-scenario.aspx
    Troubleshooting Domain Join Error Messages
    http://social.technet.microsoft.com/wiki/contents/articles/troubleshooting-domain-join-error-messages.aspx
    http://technet.microsoft.com/en-us/library/cc961817.aspx
    Regards
    Awinish Vishwakarma
    MVP-Directory Services
    MY BLOG:
     http://awinish.wordpress.com
    This posting is provided AS-IS with no warranties/guarantees and confers no rights.

  • Domain joined Windows 8.1 using OneDrive to sync passwords across devices

    Background : Domain joined Windows 8.1 devices using OneDrive to sync settings across devices, including "Passwords" under Other Settings. Domain user accounts are NOT local administrators.
    Issue : When one drive goes to sync Wireless network security settings (passphrases etc...), a User Account Control (UAC) dialogue pops up from "Program Name : Networks" to enter administrator credentials. Domain users do not have administrator access
    to local computers by strict policy.
    The only way identified so far to stop the dialogue pop-up is to disable the password sync by group policy. However, that turns off ALL password syncing, including passwords desired to be sync'd, that do not encounter this issue.
    Can the UAC be suppressed? Is there a way to NOT sync the wireless password settings?
    Welcome any thoughts, direction, assistance, etc... :) Thanks much and have a good day!

    Hi,
    I searched around but haven't find one way to achieve this, thus I'm afraid that we're unable to prevent the specific network password setting. the syncing settings for all passwords are combined together.
    To suppress UAC, we can turn off the UAC under control panel\User Account or via GP  Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options ,but we don't recommend this.
    Yolanda Zhu
    TechNet Community Support

Maybe you are looking for