Imaged (OSD) Windows 8.1 (HYPER-V) computers do not have a functional Client Certificates in personal store

Hi! I have posted some of this in the ConfigMgr 2012 forum. As indicated above, I seem to have either a group policy/autoenrollment problem getting my Configmgr 2012 OSD images of windows 8.1 to enroll for a client cert.
The imaged machines function fine when they are finished imaging, and the Configmgr 2012 client is fully functional. However the MMC-->Certs-->computer account-->personal. Shows no certs.
Physical machines have the client cert. They are both created in the same OU. If I try to manually import the cert it works just fine, however I want autoenrollment to do this.
the Autoenrollment GP's are setup and functional on the Default domain policy
I recently created a new client cert from a duplicate of the workstation cert and it installed just fine doing a GPUpdate /force on my domain joined computers.
I do not see any negative events in the eventvwr on the hyper v machines. I have built a few.
suggestions?  thx

Frank
Here is the result of the policies on the computer called "nooffice" a hyper- V machine created on Win 8.1 pro running hyper v as admin of the local machine. 
ANDOVER\Administrator on ANDOVER\NOOFFICE Data collected on: 9/16/2014 7:56:58 PM Summary During last computer policy refresh on 9/16/2014 4:42:11 AM No Errors Detected A fast link was detected More information... During last user policy refresh on 9/16/2014
7:52:10 PM No Errors Detected A fast link was detected More information... Computer Details General Computer name ANDOVER\NOOFFICE Domain andover.com Site Default-First-Site-Name Organizational Unit andover.com/Windows 8.1 Computers Security Group Membership
show BUILTIN\Administrators Everyone BUILTIN\Users NT AUTHORITY\NETWORK NT AUTHORITY\Authenticated Users NT AUTHORITY\This Organization ANDOVER\NOOFFICE$ ANDOVER\Domain Computers Authentication authority asserted identity Mandatory Label\System Mandatory Level
Component Status Component Name Status Time Taken Last Process Time Event Log Group Policy Infrastructure Success 2 Second(s) 890 Millisecond(s) 9/16/2014 4:42:11 AM View Log Deployed Printer Connections Success 31 Millisecond(s) 9/16/2014 4:42:11 AM View
Log Group Policy Files Success 532 Millisecond(s) 9/16/2014 4:42:11 AM View Log Internet Explorer Zonemapping Success (no data) 62 Millisecond(s) 9/15/2014 9:50:28 PM View Log Registry Success 2 Second(s) 78 Millisecond(s) 9/16/2014 4:42:10 AM View Log Security
Success 1 Second(s) 187 Millisecond(s) 9/15/2014 9:50:29 PM View Log Software Installation Success 156 Millisecond(s) 9/15/2014 9:50:29 PM View Log Settings Policies Windows Settings Security Settings Account Policies/Password Policy Policy Setting Winning
GPO Enforce password history 24 passwords remembered Default Domain Policy Maximum password age 42 days Default Domain Policy Minimum password age 1 days Default Domain Policy Minimum password length 7 characters Default Domain Policy Password must meet complexity
requirements Enabled Default Domain Policy Store passwords using reversible encryption Disabled Default Domain Policy Account Policies/Account Lockout Policy Policy Setting Winning GPO Account lockout threshold 0 invalid logon attempts Default Domain Policy
Local Policies/User Rights Assignment Policy Setting Winning GPO Allow log on locally Administrators, ANDOVER\Domain Users, ANDOVER\scomadmin, ANDOVER\SQL MP Monitoring Ac, ANDOVER\sqlmon, NETWORK, NETWORK SERVICE, SERVICE, SYSTEM Default Domain Policy Local
Policies/Security Options Network Access Policy Setting Winning GPO Network access: Allow anonymous SID/Name translation Disabled Default Domain Policy Network Security Policy Setting Winning GPO Network security: Do not store LAN Manager hash value on next
password change Enabled Default Domain Policy Network security: Force logoff when logon hours expire Disabled Default Domain Policy Restricted Groups Group Members Member of Winning GPO ANDOVER\ConfigMgr12 Service Accts Administrators Default Domain Policy
System Services AdobeARMservice (Startup Mode: Disabled) Winning GPO Default Domain Policy Permissions No permissions specifiedAuditing No auditing specified Public Key Policies/Certificate Services Client - Auto-Enrollment Settings Policy Setting Winning
GPO Automatic certificate management Enabled Default Domain Policy Option Setting Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificates Enabled Update and manage certificates that use certificate
templates from Active Directory Enabled Public Key Policies/Automatic Certificate Request Settings Automatic Certificate Request Winning GPO Computer Default Domain Policy Domain Controller Default Domain Policy Enrollment Agent (Computer) Default Domain Policy
IPSec Default Domain Policy For additional information about individual settings, launch the Local Group Policy Object Editor. Public Key Policies/Trusted Root Certification Authorities Certificates Issued To Issued By Expiration Date Intended Purposes Winning
GPO configmgr2012r2.andover.com andover-SERVER2012A-CA 11/1/2015 5:24:38 PM Server Authentication Default Domain Policy ConfigMgr2012R2.andover.com ConfigMgr2012R2.andover.com 5/2/2014 10:37:15 PM Server Authentication Default Domain Policy dejuliaw andover-SERVER2012A-CA
7/25/2016 8:21:54 PM Code Signing SCUP Signing Certificate HYPERVDI.andover.com HYPERVDI.andover.com 4/20/2014 1:07:42 PM Server Authentication Default Domain Policy For additional information about individual settings, launch the Local Group Policy Object
Editor. Public Key Policies/Trusted Publishers Certificates Issued To Issued By Expiration Date Intended Purposes Winning GPO dejuliaw andover-SERVER2012A-CA 7/25/2016 8:21:54 PM Code Signing SCUP Signing Certificate For additional information about individual
settings, launch the Local Group Policy Object Editor. Printer Connections Path Winning GPO \\Brother\binary_p1 Default Domain Policy Administrative Templates Policy definitions (ADMX files) retrieved from the central store.Adobe Acrobat XI/Preferences/General
Policy Setting Winning GPO Disable automatic updates Enabled Default Domain Policy Display PDFs in browser Disabled Default Domain Policy Adobe Acrobat XI/Preferences/Startup Policy Setting Winning GPO Protected View (Acrobat) Enabled Default Domain Policy
ProtectedView Enable Protected View for all files Configuration Manager 2012/Configuration Manager 2012 Client Policy Setting Winning GPO Configure Configuration Manager 2012 Client Deployment Settings Enabled Default Domain Policy CCMSetup Policy Setting
Winning GPO Configure Configuration Manager 2012 Site Assignment Enabled Windows 8.1 Policy Preferences Assigned Site AND Site Assignment Retry Interval (Mins) 30 Site Assignment Retry Duration (Hours) Diskeeper 12 Policy Setting Winning GPO Event Logging
Enabled Default Domain Policy Service start and stop Enabled Defragmentation start and stop Enabled Volume information Enabled File information Enabled Directory information Enabled Paging file information Enabled MFT information Enabled Operations manager
information Enabled Policy Setting Winning GPO Volume Shadow Copy Service (VSS) Options Enabled Default Domain Policy Automatic Defragmentation VSS Options VSS defragmentation method Manual Defragmentation VSS Options VSS defragmentation method Microsoft Applications/System
Center Operations Manager (SCOM)/SCOM Client Monitoring Policy Setting Winning GPO Configure Error Notification Enabled Default Domain Policy ShowUI Enabled DoNotDebugErrors Enabled Policy Setting Winning GPO Configure Error Reporting for Windows Vista and
later operating systems Enabled Default Domain Policy Error_Listener UseSSLCertificates Error_ListenerPort UseIntegratedAuthentication Enabled Microsoft Applications/System Center Operations Manager (SCOM)/SCOM Client Monitoring for Office 10.0 Applications
Policy Setting Winning GPO Configure Error Notification Enabled Default Domain Policy ShowUI Enabled Microsoft Applications/System Center Operations Manager (SCOM)/SCOM Client Monitoring for Windows Media Player Policy Setting Winning GPO Configure Error Notification
Enabled Default Domain Policy ShowUI Enabled Microsoft Applications/System Center Operations Manager (SCOM)/SCOM Client Monitoring/Advanced Error Reporting settings Policy Setting Winning GPO Application reporting settings (all or none) Enabled Default Domain
Policy Report all application errors Enabled Report all errors in Microsoft applications. Enabled Report all errors in Windows components. Enabled Policy Setting Winning GPO Report operating system errors Enabled Default Domain Policy Report operating system
errors Enabled Policy Setting Winning GPO Report unplanned shutdown events Enabled Default Domain Policy Report unplanned shutdown events Enabled Network/Background Intelligent Transfer Service (BITS) Policy Setting Winning GPO Limit the maximum network bandwidth
for BITS background transfers Disabled Default Domain Policy Printers Policy Setting Winning GPO Isolate print drivers from applications Enabled Default Domain Policy System Policy Setting Winning GPO Specify settings for optional component installation and
component repair Enabled Default Domain Policy Alternate source file path Never attempt to download payload from Windows Update Disabled Contact Windows Update directly to download repair content instead of Windows Server Update Services (WSUS) Enabled System/Internet
Communication Management/Internet Communication settings Policy Setting Winning GPO Turn off Windows Error Reporting Disabled Default Domain Policy System/Remote Assistance Policy Setting Winning GPO Configure Offer Remote Assistance Enabled Local Group Policy
Permit remote control of this computer: Allow helpers to remotely control the computer Helpers: ANDOVER\Administrator ANDOVER\dejuliaw System/Windows Time Service/Time Providers Policy Setting Winning GPO Enable Windows NTP Server Enabled Default Domain Policy
Windows Components/EMET Policy Setting Winning GPO Default Protections for Internet Explorer Enabled EMET 5 Included products and mitigations: - Microsoft Internet Explorer - all mitigations Policy Setting Winning GPO Default Protections for Recommended Software
Enabled EMET 5 Included products and mitigations: - WordPad - all mitigations - Microsoft Office - all mitigations - Adobe Acrobat - all mitigations except MemProt - Adobe Acrobat Reader - all mitigations except MemProt - Oracle Java - all mitigations except
HeapSpray Policy Setting Winning GPO EMET Agent Visibility Enabled EMET 5 Start Agent Hidden: Enabled Policy Setting Winning GPO Reporting Enabled EMET 5 Event Log: Enabled Tray Icon: Enabled Early Warning: Enabled Windows Components/Internet Explorer Policy
Setting Winning GPO Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar Enabled Default Domain Policy Install new versions of Internet Explorer automatically Enabled Default Domain Policy Let users turn on and use
Enterprise Mode from the Tools menu Enabled Default Domain Policy Type the location (URL) of where to receive reports about the websites for which users turn on and use Enterprise Mode http://server2012a:8000/reportieem.asp Policy Setting Winning GPO Turn
on menu bar by default Enabled Default Domain Policy Turn on Suggested Sites Enabled Default Domain Policy Use the Enterprise Mode IE website list Enabled Default Domain Policy Type the location (URL) of your Enterprise Mode IE website list http://server2012a:8000/ieem.xml
Windows Components/Internet Explorer/Internet Control Panel/Advanced Page Policy Setting Winning GPO Allow Internet Explorer to use the SPDY/3 network protocol Enabled Default Domain Policy Empty Temporary Internet Files folder when browser is closed Enabled
Default Domain Policy Turn off loading websites and content in the background to optimize performance Disabled Default Domain Policy Windows Components/Internet Explorer/Internet Control Panel/Security Page Policy Setting Winning GPO Site to Zone Assignment
List Enabled Default Domain Policy Enter the zone assignments here. Source GPO https://configmgr2012r2.andover.com 1 Default Domain Policy https://hypervdi.andover.com 1 Default Domain Policy http://webaccess.sullcrom.com 2 Default Domain Policy Windows Components/Internet
Explorer/Internet Settings/Advanced settings/Browsing Policy Setting Winning GPO Turn off phone number detection Disabled Default Domain Policy Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections Policy Setting Winning GPO Allow
users to connect remotely by using Remote Desktop Services Enabled Local Group Policy Windows Components/Remote Desktop Services/Remote Desktop Session Host/Licensing Policy Setting Winning GPO Set the Remote Desktop licensing mode Enabled Default Domain Policy
Specify the licensing mode for the RD Session Host server. Per User Policy Setting Winning GPO Use the specified Remote Desktop license servers Enabled Default Domain Policy License servers to use: hypervdi.andover.com Separate license server names with commas.
Example: Server1,Server2.example.com,192.168.1.1 Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security Policy Setting Winning GPO Require user authentication for remote connections by using Network Level Authentication Disabled Local
Group Policy Windows Components/Windows Customer Experience Improvement Program Policy Setting Winning GPO Allow Corporate redirection of Customer Experience Improvement uploads Enabled Default Domain Policy Corporate SQM URL: http://SCOM2012.andover.com:51907/
Windows Components/Windows Error Reporting Policy Setting Winning GPO Automatically send memory dumps for OS-generated error reports Enabled Default Domain Policy Configure Error Reporting Enabled Default Domain Policy Do not display links to any Microsoft
provided 'more information' web sites. Disabled Do not collect additional files Disabled Do not collect additional machine data Disabled Force queue mode for application errors Disabled Corporate upload file path: Replace instances of the word 'Microsoft'
with: Policy Setting Winning GPO Disable Windows Error Reporting Disabled Default Domain Policy Display Error Notification Enabled Default Domain Policy Windows Components/Windows Error Reporting/Advanced Error Reporting Settings Policy Setting Winning GPO
Default application reporting settings Enabled Default Domain Policy Default: Report all application errors Report all errors in Microsoft applications. Enabled Report all errors in Windows components. Enabled Policy Setting Winning GPO Report operating system
errors Enabled Default Domain Policy Report unplanned shutdown events Enabled Default Domain Policy Windows Components/Windows PowerShell Policy Setting Winning GPO Turn on Script Execution Enabled Default Domain Policy Execution Policy Allow local scripts
and remote signed scripts Windows Components/Windows Update Policy Setting Winning GPO Allow signed updates from an intranet Microsoft update service location Enabled WSUS Specify intranet Microsoft update service location Enabled Local Group Policy Set the
intranet update service for detecting updates: http://ConfigMgr2012R2.andover.com:8530 Set the intranet statistics server: http://ConfigMgr2012R2.andover.com:8530 (example: http://IntranetUpd01) Extra Registry Settings Display names for some settings cannot
be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management. Setting State Winning GPO Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\AuthFlags 2 Default Domain
Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Cost 2147483645 Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Flags 20 Default Domain
Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\FriendlyName Active Directory Enrollment Policy Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\PolicyID
{6AF312CA-551D-477C-8931-C2217574F832} Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\URL LDAP: Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\Flags 0 Default
Domain Policy Software\Policies\Microsoft\Microsoft Antimalware\DisableLocalAdminMerge 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.000 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.001
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.002 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.cab 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.cfg
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.chk 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.ci 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.config
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.dia 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.dsc 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.edb
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.grxml 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.iso 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Extensions\.jrs 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.jsl 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.ldf 0 Local Group Policy
Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.log 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.lzx 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.mdf
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.ost 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.pst 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.que
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.txt 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.wid 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.wim
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Extensions\.wsb 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%ALLUSERSPROFILE%\NTuser.pol 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Paths\%appdata%\NirSoft Utilities 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%APPDATA%\Sysinternals Suite\ 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%SystemRoot%\System32\GroupPolicy\Machine\registry.pol
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%SystemRoot%\System32\GroupPolicy\User\registry.pol 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\ccmcache 0 Local Group
Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\Security\Database\*.chk 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\Security\Database\*.edb 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Paths\%windir%\Security\Database\*.jrs 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\Security\Database\*.log 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\Security\Database\*.sdb
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\SoftwareDistribution\Datastore\Datastore.edb 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\SoftwareDistribution\Datastore\Logs\Edb.chk
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\SoftwareDistribution\Datastore\Logs\Res*.jrs 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\SoftwareDistribution\Datastore\Logs\Res*.log
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\%windir%\SoftwareDistribution\Datastore\Logs\Tmp.edb 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Paths\C:\Users\administrator.ANDOVER\AppData\Roaming\NirSoft
Utilities 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Cdb.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Cidaemon.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\Clussvc.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Dsamain.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\EdgeCredentialSvc.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\EdgeTransport.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\ExFBA.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\hostcontrollerservice.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Inetinfo.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.AntispamUpdateSvc.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.ContentFilter.Wrapper.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Diagnostics.Service.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Directory.TopologyService.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.EdgeSyncSvc.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Imap4.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Imap4service.exe 0 Local
Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Monitoring.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Pop3.exe 0 Local Group Policy
Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Pop3service.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.ProtectedServiceHost.exe 0 Local Group
Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.RPCClientAccess.Service.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Search.Service.exe 0
Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Servicehost.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Store.Service.exe 0
Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.Store.Worker.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.TransportSyncManagerSvc.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Microsoft.Exchange.UM.CallRouter.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeDagMgmt.exe 0 Local Group
Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeDelivery.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeFrontendTransport.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\MSExchangeHMHost.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeHMWorker.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeLESearchWorker.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeMailboxAssistants.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeMailboxReplication.exe 0 Local
Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeMigrationWorkflow.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeRepl.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\MSExchangeSubmission.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeThrottling.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeTransport.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\MSExchangeTransportLogSearch.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Msftefd.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\Msftesql.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\OleConverter.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\Powershell.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\ScanEngineTest.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\ScanningProcess.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Exclusions\Processes\TranscodingService.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\UmService.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\UmWorkerProcess.exe
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\UpdateService.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Exclusions\Processes\W3wp.exe 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Quarantine\LocalSettingOverridePurgeItemsAfterDelay 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Quarantine\PurgeItemsAfterDelay 30 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\RandomizeScheduleTaskTimes
1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\DisableBehaviorMonitoring 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\DisableIntrusionPreventionSystem 0 Local Group
Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\DisableIOAVProtection 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\DisableOnAccessProtection 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Real-Time Protection\DisableRealtimeMonitoring 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\DisableScriptScanning 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableRealTimeMonitoring
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideDisableScriptScanning 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\LocalSettingOverrideRealTimeScanDirection
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Real-Time Protection\RealTimeScanDirection 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\AvgCPULoadFactor 50 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Scan\CheckForSignaturesBeforeRunningScan 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableArchiveScanning 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableCatchupFullScan 0 Local
Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableCatchupQuickScan 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableEmailScanning 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableHeuristics
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableRemovableDriveScanning 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableReparsePointScanning 1 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Scan\DisableRestorePoint 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableScanningMappedNetworkDrivesForFullScan 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\DisableScanningNetworkFiles
1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\LocalSettingOverrideAvgCPULoadFactor 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\LocalSettingOverrideScanParameters 0 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Scan\LocalSettingOverrideScheduleDay 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\LocalSettingOverrideScheduleQuickScanTime 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\LocalSettingOverrideScheduleTime
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\ScanOnlyIfIdle 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\ScanParameters 2 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\ScheduleDay
2 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\ScheduleQuickScanTime 421 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Scan\ScheduleTime 240 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature
Updates\AuGracePeriod 480 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature Updates\DefinitionUpdateFileSharesSources Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature Updates\FallbackOrder InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC
Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature Updates\ScheduleDay 8 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature Updates\ScheduleTime 120 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Signature Updates\SignatureUpdateCatchupInterval 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Signature Updates\SignatureUpdateInterval 4 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\SpyNet\LocalSettingOverrideSpyNetReporting
0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\SpyNet\SpyNetReporting 1 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Threats\ThreatSeverityDefaultAction\1 6 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\Threats\ThreatSeverityDefaultAction\2 2 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Threats\ThreatSeverityDefaultAction\4 2 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\Threats\ThreatSeverityDefaultAction\5
2 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\UX Configuration\DisablePrivacyMode 0 Local Group Policy Software\Policies\Microsoft\Microsoft Antimalware\UX Configuration\Notification_Suppress 1 Local Group Policy Software\Policies\Microsoft\Microsoft
Antimalware\UX Configuration\UILockdown 0 Local Group Policy Software\Policies\Microsoft\System Center\Health Service\Runtime CLR Version v4.0.30319 Default Domain Policy Software\Policies\Microsoft\System Center\Health Service\Runtime Use Concurrent GC 0
Default Domain Policy Software\Policies\Microsoft\System Center\Health Service\Runtime Use Workstation GC 1 Default Domain Policy Software\Policies\Microsoft\System Center\Health Service\Worker Process Logon Type 2 Default Domain Policy Preferences Windows
Settings Files File (Target Path: c:\windows\safesenders.txt) The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.safesenders.txt Winning GPO
Office 2013 Result: SuccessGeneral Action Update PropertiesSource file(s) \\SERVER2012A\safesender\safesenders.txt Destination file c:\windows\safesenders.txt Suppress errors on individual file actions Disabled AttributesRead-only Disabled Hidden Disabled
Archive Enabled Group Policy Objects Applied GPOs Default Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}] Link Location andover.com Extensions Configured Software Installation {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A} Deployed Printer Connections Security
Internet Explorer Zonemapping Registry Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated Users Revision AD (154), SYSVOL (154) WMI Filter EMET 5 [{2C4287A2-7E57-4CEE-AEAC-436E25628F31}] Link Location andover.com Extensions Configured Registry
Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated Users Revision AD (4), SYSVOL (4) WMI Filter Local Group Policy [LocalGPO] Link Location Local Extensions Configured Registry Enforced No Disabled None Security Filters Revision AD (14),
SYSVOL (14) WMI Filter Office 2013 [{4E3C0D91-646B-4DF7-A9F1-B15B45B3334A}] Link Location andover.com Extensions Configured Group Policy Files Group Policy Infrastructure Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated Users Revision
AD (54), SYSVOL (54) WMI Filter SCUP Signing Certificate [{B8EC6602-BC25-4A62-8F13-D225E5AAB46D}] Link Location andover.com Extensions Configured {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A} Registry Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated
Users Revision AD (4), SYSVOL (4) WMI Filter Windows 8.1 Policy Preferences [{3F103DE1-A223-48FA-84B2-5584A129CC7E}] Link Location andover.com/Windows 8.1 Computers Extensions Configured Software Installation Registry Enforced No Disabled None Security Filters
NT AUTHORITY\Authenticated Users Revision AD (41), SYSVOL (41) WMI Filter Windows 8.1 WMI Filter WSUS [{90680992-AACB-487B-B5CD-6E936F4A3C6F}] Link Location andover.com Extensions Configured Registry Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated
Users Revision AD (2), SYSVOL (2) WMI Filter Denied GPOs WMI Filters Name Value Reference GPO(s) Windows 8.1 WMI Filter True Windows 8.1 Policy Preferences User Details General User name ANDOVER\Administrator Domain andover.com Security Group Membership show
ANDOVER\Domain Users Everyone NOOFFICE\ConfigMgr Remote Control Users BUILTIN\Users BUILTIN\Administrators NT AUTHORITY\INTERACTIVE CONSOLE LOGON NT AUTHORITY\Authenticated Users NT AUTHORITY\This Organization LOCAL ANDOVER\Group Policy Creator Owners ANDOVER\Mobile
Enrollment ANDOVER\Mac Enrollment ANDOVER\Domain Admins ANDOVER\SCVMMAdmins ANDOVER\CSAdministrator ANDOVER\RTCUniversalServerAdmins ANDOVER\RTCUniversalGlobalReadOnlyGroup ANDOVER\Enterprise Admins ANDOVER\RTCUniversalGlobalWriteGroup ANDOVER\Organization
Management ANDOVER\Schema Admins ANDOVER\RTCUniversalServerReadOnlyGroup ANDOVER\RTCUniversalUserReadOnlyGroup ANDOVER\CSServerAdministrator Authentication authority asserted identity ANDOVER\ConfigMgr Remote Control Users ANDOVER\Denied RODC Password Replication
Group Mandatory Label\High Mandatory Level Component Status Component Name Status Time Taken Last Process Time Event Log Group Policy Infrastructure Success 16 Second(s) 892 Millisecond(s) 9/16/2014 7:52:10 PM View Log Group Policy Registry Success 140 Millisecond(s)
9/15/2014 9:50:32 PM View Log Group Policy Shortcuts Success 500 Millisecond(s) 9/15/2014 9:50:32 PM View Log Registry Success 281 Millisecond(s) 9/15/2014 9:50:31 PM View Log Settings Policies Windows Settings Security Settings Public Key Policies/Certificate
Services Client - Auto-Enrollment Settings Policy Setting Winning GPO Automatic certificate management Enabled Default Domain Policy Option Setting Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked
certificates Enabled Update and manage certificates that use certificate templates from Active Directory Enabled Log expiry events, and, for user policy, only show expiry notifications when the percentage of remaining certificate lifetime is 10% Default Domain
Policy Additional stores to log expiry events Default Domain Policy Display user notifications for expiring certificates in user and computer MY store Disabled Default Domain Policy Administrative Templates Policy definitions (ADMX files) retrieved from the
central store.Microsoft Outlook 2013/Outlook Options/Preferences/Junk E-mail Policy Setting Winning GPO Specify path to Blocked Senders list Enabled Office 2013 Specify full path and filename to Blocked Senders list \\SERVER2012A\safesender\blockedsender.txt
Policy Setting Winning GPO Specify path to Safe Recipients list Enabled Office 2013 Specify full path and filename to Safe Recipients list \\server2012a\safesender\safesenders.txt Policy Setting Winning GPO Specify path to Safe Senders list Enabled Office
2013 Specify full path and filename to Safe Senders list \\server2012a\safesender\safesenders.txt Policy Setting Winning GPO Trigger to apply junk email list settings Enabled Office 2013 Microsoft Word 2013/Word Options/Customize Ribbon Policy Setting Winning
GPO Display Developer tab in the Ribbon Enabled Office 2013 Microsoft Word 2013/Word Options/Save Policy Setting Winning GPO Save AutoRecover info Enabled Office 2013 Save AutoRecover info every (minutes) 3 Start Menu and Taskbar Policy Setting Winning GPO
Go to the desktop instead of Start when signing in or when all the apps on a screen are closed Enabled Default Domain Policy Windows Components/EMET Policy Setting Winning GPO Default Protections for Internet Explorer Enabled EMET 5 Included products and mitigations:
- Microsoft Internet Explorer - all mitigations Policy Setting Winning GPO Default Protections for Recommended Software Enabled EMET 5 Included products and mitigations: - WordPad - all mitigations - Microsoft Office - all mitigations - Adobe Acrobat - all
mitigations except MemProt - Adobe Acrobat Reader - all mitigations except MemProt - Oracle Java - all mitigations except HeapSpray Windows Components/Windows Error Reporting Policy Setting Winning GPO Automatically send memory dumps for OS-generated error
reports Enabled Default Domain Policy Disable Windows Error Reporting Disabled Default Domain Policy Do not send additional data Disabled Default Domain Policy Windows Components/Windows Error Reporting/Advanced Error Reporting Settings Policy Setting Winning
GPO Configure Report Archive Enabled Default Domain Policy Archive behavior: Store parameters only Maximum number of reports to store: 500 Windows Components/Windows Error Reporting/Consent Policy Setting Winning GPO Configure Default consent Enabled Default
Domain Policy Consent level Send all data Windows Components/Windows PowerShell Policy Setting Winning GPO Turn on Script Execution Enabled Default Domain Policy Execution Policy Allow local scripts and remote signed scripts Extra Registry Settings Display
names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management. Setting State Winning GPO Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\AuthFlags
2 Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Cost 2147483645 Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Flags
20 Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\FriendlyName Active Directory Enrollment Policy Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\PolicyID
{6AF312CA-551D-477C-8931-C2217574F832} Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\URL LDAP: Default Domain Policy Software\Policies\Microsoft\Cryptography\PolicyServers\Flags 0 Default
Domain Policy Preferences Windows Settings Shortcuts Shortcut (Path: C:\Users\administrator\Desktop\Remote Desktop.url) The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings
when resolving conflicts.Remote Desktop Winning GPO Default Domain Policy Result: SuccessGeneral Action Replace AttributesTarget type URL Shortcut path C:\Users\administrator\Desktop\Remote Desktop.url Target URL https://hypervdi.andover.com/RDWeb/Pages/en-US/Default.aspx
Icon path C:\WINDOWS\system32\SHELL32.dll Icon index 150 Shortcut key None Run Normal window Shortcut (Path: C:\Users\administrator\Desktop\Application Catalog.url) The following settings have applied to this object. Within this category, settings nearest
the top of the report are the prevailing settings when resolving conflicts.Application Catalog Winning GPO Default Domain Policy Result: SuccessGeneral Action Replace AttributesTarget type URL Shortcut path C:\Users\administrator\Desktop\Application Catalog.url
Target URL https://configmgr2012r2.andover.com/cmapplicationcatalog/ Icon path C:\WINDOWS\system32\SHELL32.dll Icon index 135 Shortcut key None Run Normal window Shortcut (Path: C:\Users\administrator\Desktop\Report Server.url) The following settings have
applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.Report Server Winning GPO Default Domain Policy Result: SuccessGeneral Action Replace AttributesTarget type URL Shortcut
path C:\Users\administrator\Desktop\Report Server.url Target URL http://configmgr2012r2/Reportserver Icon path C:\WINDOWS\system32\SHELL32.dll Icon index 165 Shortcut key None Run Normal window Shortcut (Path: C:\Users\administrator\Desktop\SCOM Reports.url)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.SCOM Reports Winning GPO Default Domain Policy Result: SuccessGeneral Action Replace AttributesTarget
type URL Shortcut path C:\Users\administrator\Desktop\SCOM Reports.url Target URL http://scom2012/reportserver Icon path C:\WINDOWS\system32\SHELL32.dll Icon index 44 Shortcut key None Run Normal window Shortcut (Path: C:\Users\administrator\Desktop\Reporting.url)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.Reporting Winning GPO Default Domain Policy Result: SuccessGeneral Action Replace AttributesTarget
type URL Shortcut path C:\Users\administrator\Desktop\Reporting.url Target URL http://configmgr2012r2/Reports/Pages/Folder.aspx Icon path C:\WINDOWS\system32\SHELL32.dll Icon index 165 Shortcut key None Run Normal window Group Policy Objects Applied GPOs Default
Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}] Link Location andover.com Extensions Configured Group Policy Shortcuts {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A} Registry Group Policy Infrastructure Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated
Users Revision AD (102), SYSVOL (102) WMI Filter EMET 5 [{2C4287A2-7E57-4CEE-AEAC-436E25628F31}] Link Location andover.com Extensions Configured Registry Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated Users Revision AD (2), SYSVOL (2)
WMI Filter Office 2013 [{4E3C0D91-646B-4DF7-A9F1-B15B45B3334A}] Link Location andover.com Extensions Configured Group Policy Registry Registry Group Policy Infrastructure Enforced No Disabled None Security Filters NT AUTHORITY\Authenticated Users Revision
AD (55), SYSVOL (55) WMI Filter Denied GPOs Java Files [{906C2069-E35E-4DAD-8A06-E234C1F5072E}] Link Location andover.com Extensions Configured {7150F9BF-48AD-4DA4-A49C-29EF4A8369BA} Group Policy Infrastructure Enforced No Disabled None Security Filters NT
AUTHORITY\Authenticated Users Revision AD (98), SYSVOL (98) WMI Filter Windows 7 WMI Filter Reason Denied False WMI Filter Local Group Policy [LocalGPO] Link Location Local Extensions Configured Enforced No Disabled None Security Filters Revision AD (0), SYSVOL
(0) WMI Filter Reason Denied Empty WMI Filters Name Value Reference GPO(s) Windows 7 WMI Filter False Java Files

Similar Messages

  • Imaged Windows 8.1 computers do not have a functional ConfigMgr Client- Certificates are not being installed

    Using ConfigMgr 2012 R2 (no CU). OSD was working fine prior to the recent black tuesday patch problems. Domain Contoller (and also CA) as well as all clients got all the recent August patches. Just built 2 machines, one physical (inspiron 15, other hyper
    V) Both imaged computers went fine, OS added all security patches, and left me at ctrl alt delete. Logging on i noticed that software never got deployed, configmgr client was single tiered. ran ccmrepair, no affect, group policy repair, wmi reset, etc. Client
    never fully installed. SCEP patches for DEFs worked but that was through WSUS. uninstalled client completely, cleaned smscfg.ini, regedit to remove entries for install and then re ran \\server\share\ccmsetup /usepkicert SMSSITECODE=XXX
    same problem
    opened MMC computer account logged in as local admin, and there are NO certs under personal
    this is what i should have below(based on an old image that worked) There are some errors on the Domain Controller, CA (same one box) 
    Certificate enrollment for Local system is successfully authenticated by policy server ldap: using authentication mechanism windows integrated (Credential: credential is private). Policy Id: {6AF312CA-551D-477C-8931-C2217574F832}
    Certificate enrollment for Local system successfully load policy from policy server 
    Certificate enrollment for Local system for the template DomainController was not performed because this template has been superseded.
    The "Microsoft Platform Crypto Provider" provider was not loaded because initialization failed.
    Certificate enrollment for Local system could not enroll for a Machine certificate.  Read or enrollment access is not allowed for this template.
    Certificate enrollment for Local system could not enroll for a MachineEnrollmentAgent certificate.  Read or enrollment access is not allowed for this template.
    Certificate enrollment for Local system could not enroll for a IPSECIntermediateOnline certificate.  A valid certification authority cannot be found to issue this template.
    Certificate enrollment for ANER\Administrator is successfully authenticated by policy server ldap: using authentication mechanism windows integrated (Credential: credential is private). Policy Id: {6AF312CA-551D-477C-8931-C2217574F832}
    these repeat over and over periodically. 
    Certificate enrollment for ANER\Administrator successfully load policy from policy server 
    Not sure what could have happened here. The errors appear to go back until several months so i dont know if they are the cause of this. I know group policy is responsible for getting the certs installed. I have configured autoenrollment in the user and computer
    areas of GP for both default policy and domain controller policy.
    I am deeply perplexed. Any assistance greatly appreciated. 

    SMSTS log on the client without certs: (did you want one on the configmgr box?)
    <![LOG[Successfully finalized logs to SMS client log directory from C:\WINDOWS\CCM\Logs]LOG]!><time="22:43:38.652+240" date="08-27-2014" component="OSDSetupHook" context="" type="1" thread="1088" file="tslogging.cpp:1542">
     older one is:
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{BD8504DF-10E1-47C9-A665-50465C05B865}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{4E0944BD-6A6C-48A7-A1D2-A44A5823CC82}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{1F1BF36C-1820-4E5C-823E-34B2E487B999}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{709E184A-A599-469E-A762-CDD8D0044767}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{CFD388C6-CD22-42CC-952B-5483FAB6167E}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{E6E6BF22-C95E-4E02-9DFF-5FF8F75FE49D}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{2125003B-3160-45CF-8AC2-68338C4ED5E3}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{E4C65A44-063E-4827-B2FD-A3518F25412A}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{FC16DBD9-DD66-4D33-AC8D-E43D7E450AEE}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{CB649F95-764C-4491-B4E2-7C068A9B8F3E}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{ED903082-D523-4FE0-BB7C-28561D2ACC5B}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{4861265B-07DE-44A8-8E8C-D6BDBD684C5A}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{52E66067-0AD4-4891-BD3C-732643F73620}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{AF4A5641-682B-4FB0-B9CF-3B4B1DF2CA05}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{159E0E6B-ED60-4590-B557-2BAB3DBFA104}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{2A739F20-7F05-49D6-81D3-0A8E1037CFE3}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{E33411BF-F0A2-4EEA-8005-45C0EE368BC2}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{192CE59E-6FC9-4040-8F05-635F8E9590C3}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{A7647304-7727-4520-A23F-348EF65875D4}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{948AD2DF-7F0E-4A77-A5FE-08C65D0EE773}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{39252788-DB6A-4174-844A-67DE576CD949}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{3A84557B-3A3D-42F7-B237-6907CE532806}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{4D9D6559-49FA-4915-BF26-EDB2578A1824}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{95388B41-5F4C-4A95-9CE6-434936222B9A}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{2641E7BE-0735-42A6-B907-1ABC47ECBA37}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{BED5199D-D876-440F-883D-CE401F48C3A5}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{B11D84B9-F4DB-45A8-9062-6070F22DE215}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{3BCD2242-E9C5-4390-BC57-F80146F6E705}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{2FC619AC-AE77-4BB6-ABCF-EAE96CA2DE6B}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{D4A05D7E-E3F4-430A-A25D-B842FA642536}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{F1076D6A-BD02-4129-87AC-AF501567E234}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{A903BC88-4107-4EB5-93ED-409D403042C9}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{60AF64AC-93CC-42E7-BDB5-B35DD3C6F8F9}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{3AAECA7C-F5C9-4554-AED8-AA2167847F3C}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/RequiredApplication_bfee10b7-e1f5-4b6a-b109-0b83206accd4/VI/VS",PolicyInstanceID="{44A0199C-7CAD-40D7-AD13-B63FBE9320DE}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/RequiredApplication_bfee10b7-e1f5-4b6a-b109-0b83206accd4/VI/VS}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{C44E24BB-B4BF-4AAE-9132-1F7B04130190}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{AE60CBAC-E351-4AE5-B1B5-B03B868C7184}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{E1221271-5D5A-4D91-8F5E-99D1D82C6276}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{A28A290A-5F48-4000-BA74-1A406DEB396E}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI",PolicyInstanceID="{0D00F671-7FFA-4793-B0EC-DCAAC083A9C8}",PolicyRuleID="{Rule_ScopeId_122C12A8-8BB6-4207-99F0-FE10D9094C9D/AuthList_991E71F0-2232-4F83-AE72-F1813BE613DF/VI}",PolicySource="CcmTaskSequence",PolicyVersion=""'.
    TSManager 8/27/2014 10:43:14 PM
    2140 (0x085C)
    TS deleting 'CCM_CIVersionInfo.PolicyID="ScopeId_122C12A8-8BB6-4207-99F0-FE
    There doesnt seem to be a smoking gun since the image is completely built and works except its missing certs and the sccm client is broken

  • No matter what wi-fi I'm connected to or browser I'm using, webpages take forever to load or they never load at all. Other computers do not have any problems. How can i fix this?

    No matter what wi-fi I'm connected to or browser I'm using, webpages take forever to load or they never load at all. Other computers do not have any problems. How can i fix this?
    I've tried safari, chrome, firefox...I've cleared the cache as well. This has been going on for several months and used to be tolerable as it was not every website. Now it has become every website and is impossible to deal with. My roommates computer and my cell phone connect fine. I'm fully connected to the router yet websites don't load. I'm using 10.7.5. Thank you!!

    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches. 
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards. Boot in safe mode and log in to the account with the problem. Note: If FileVault is enabled on some models, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem? After testing, reboot as usual (i.e., not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Why is HP SimplePass on my new windows 8.1 machine, when I do not have a finger or card reader?

    Why is HP SimplePass on my new windows 8.1 machine, when I do not have a finger print or card reader?
    It keeps popping up and asking me to use it?
    Can it be used to keep my passwords?
    What Version of SimplePass are you using?   Unknown, apparently you have to use it to find the version number.
    What is your Operating System? Windows 7 32 or 64bit? or?   Windows 8.1  64 Bit
    Which browser are you using?  Internet explorer version 11, and Fire fox version 34.0
    Can you give me a example of a Website that is giving you this problem?  Have not used it yet.
    Is is every webcard or just one or two websites that have this problem?  Have not used it yet
    What is your computer product number? (NOT serial number?)  HP 15-f039wm Notebook PC
    Thanks for any help you can offer.

    Hi,
    You could check the blog below.
    How to Enable Group Policy Debugging on Windows 7 / 8 Clients
    http://clintboessen.blogspot.jp/2014/01/how-to-enable-group-policy-debugging-on.html
    Note: Microsoft provides third-party contact information to help you find technical support. This contact
    information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.
    If you have any questions about Group Policy, you could get better support from Group Policy forum.
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/home?forum=winserverGP
    Best Regards,
    Joyce
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • I have just upgraded from Elements/Premiere elements 11 to version 12. I am running on a PC with Windows 7. When I try to run video from the existing catalogue or video newly imported I get a window stating "....system does not have the required compresso

    I have just upgraded from Elements/Premiere elements 11 to version 12. I am running on a PC with Windows 7. When I try to run video from the existing catalogue or video newly imported I get a window stating "....system does not have the required compressor/decompressor (codec) installed" Where has it gone? Where do I get a new one? I am getting REALLY REALLY fed up with trying to find an answer!!!!!!!!

    Try to disable hardware acceleration in Firefox.
    *Firefox > Preferences > Advanced > General > Browsing: "Use hardware acceleration when available"
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes

  • Tried to sync an app onto my touch off of my computer, and a window popped up stating that I did not have the proper software for the app...HELP

    I tried to sync an app from my computer to my touch and a window popped up stating that I did not have the proper software for that app. How do I get the software update??

    This is the iPhone hardware forum. It sounds like you need to upgrade the version of iOS on your device, though. Plug it in and click check for updates in iTunes.

  • W530 Windows 8.1 Hyper-V nVidia Optimus not working

    Well, I only just noticed when I tried to run a CUDA enabled application that my nVidia Optimus drivers are not working.
    If I look in "Device Manager" then it only shows the Intel HD 4000 device, no sign of my nVidia card at all.
    This only started happening after I enabled the Hyper-V role, and was working fine when I was using VMWare Workstation.
    Setup:
    Intel i7-3840QM | 32GB RAM | nVidia K2000M Optimus | 2x 512GB SSD
    Windows 8.1 Pro | Hyper-V Role Enabled
    Note - I don't want to force Discrete Graphics in the BIOS because I need decent battery life!

    To me it seems that this will not work under Win 8 Pro.
    I think that this would require the Windows OS Feature "RemoteFX", which is bundled by Microsoft only with the Server version of the OS.
    If you are able to check whether it works fine with "RemoteFX", please inform me with a note here.
    I had a similar issue.  I opened the thread
    Windows Phone 8.1 Emulator incompatible to nVidia Quadro graphic control?
    I'm  still waiting for a qualified response by Microsoft.
    Maybe you can inform them, too, that bundling  "RemoteFX" with Win Pro would be a good thing.
    Greetings, pet-ro

  • Windows 8 Pro volume license version does not have "Add Features" therefore cannot install media center.

    As the title describes, Windows 8 Pro installed from the Volume License ISO does not have the Add Features wizard, and as such it appears to be impossible to install the Windows Media Pack.
    I've consulted with Live Chat support who cannot provide an answer to this, they simply said it should be done through "Add Features" which does not exist.
    A similar thread was answered by saying install from a Retail disc and upgrade. However this is hardly a solution, paying for an additional Windows license when you already have a volume license.
    Can anyone, preferably MSFT, provide a proper answer on how Windows Media Center can be install on Windows 8 Pro which is volume licensed. If it can't be done can some reason or justification be given as to why it can't be done.
    Please see previous thread here: http://social.technet.microsoft.com/Forums/en-US/w8itproinstall/thread/d63b46e5-c542-4dbe-be41-c46cda440723

    I would like to pile on here and say "ditto" to all of the above. you have a licensed product and they don't even support the MSFT version of a DVD player. Nah, no one EVER has to play a older technology in corporate America due to training or presentation
    (A funny clip of a movie before a ppt)? Nah.
    But, I'd like to add a warning to MSFT senior management.  I know you want to force everyone to use YOUR cloud just like apple did to theirs.  Wont' work.  Some of us refuse to sign onto a web site and let you track all of our moves... some
    distrust the cloud (Target anyone?) etc etc.  All good points, now for the out of the park.  The Harvard Business Review some years ago did a study on long term profitability of a company (you have to have a profit to stay in business).  The
    most highly correlated factor: Customer Sat.  Sorry, but I don't see customer sat in all of these entries. 
    IF you made your product easier to use and NOT have to have a IT support person to move from a small workgroup to a server configuration (and PS, what in the heck to you get from a workgroup?  File Replication, Remote access to outlook files as one
    does via exchange?  Really, every computer is in a workgoup any more, so there is ZERO value add in a workgroup on a MSFDT platform, however there is great value, even with a couple of users, in an Exchange/Windows Server Platform -- so why so you make
    it so damned hard to implement one... Difficult for one to implement in an SMB environment (so lets just kill SBS) but growth from small business is where your growth is... just like IBM did before you, MSFT only appears to be listening to Fortune 500 it execs,
    but I really digressed)  This is just one more pain in the butt to use MSFT in the small environment.  So what is the rational business decision?  Yes one can pick MSFT but with Zero value add in the workgroup, why not them other guys (who may
    be apple, or android or even some Linux platforms)
    SO you want to continue to mil the cash cow, listen to your forums.
    One more note on the STORE.  Lets say you do pick a competitive product in the windows store.  Have them been verified they don't contain malware like MSFT products?  I believe the answer here is "NO"  So this adds another layer of complexity
    and security risk on the corporate problem of "How do I play a DVD on my laptop"  I am sure none of you has ever played a movie on your laptop flying for business?
    So, MSFT management, let me paraphrase the posts above:  "WHY don't you support our business needs" 
    And remember, people buy to have their needs met.....  (IBM Planned Sales Call)
    If you don't meet small business needs, someone will... and that too is fraught with risk.
    (For example of how to make computers easy to use in SMB I reference SBS, the Systems Management Interface tool in IBM Unix, or best of all, the AS/400.... something even Ellison couldn't kill, though he tried.

  • Deploying the FEP client (SCCM 2012 R2) on computers that already have the FEP client from a previouse failed site installation

    Hello All
    I am in the process of rebuilding our SCCM 2012 R2 site server (single site). The FEP client from the previous sccm 2012 r2 deployment was successfully installed on all of our endpoints and communicating with no issue with the site server. Since losing that
    server we are in the process of deploying a one. My question is, when I configure FEP and the site server attemtps to deploy the FEP client will the current one be reinstalled even though its same version? Or will SCCM just recognize there is already
    a compatible client installed. I asked a similar question about the SCCM client in another post which was very helpful.
    Any advice would be greatly appreciated
    Phillip
    http://social.technet.microsoft.com/Forums/en-US/84923512-b456-4850-b2ba-8d22bb54ab5c/deploying-sccm-2012-r2-clients-to-computers-that-already-have-the-sccm-2012-r2-client-from-failed?forum=configmanagerdeployment#ab630267-6f25-45ff-a732-231b8008876c
    Phil Balderos

    No, the Endpoint Protection client is still a separate client. By, enabling the client settings the ConfigMgr client will make sure that the Endpoint Protection client is installed and makes sure it will be 'managed'. After re-installing the ConfigMgr
    client, the ConfigMgr client will see that Endpoint Protection is already installed and the new ConfigMgr client will start 'managing' the Endpoint Protection client.
    My Blog: http://www.petervanderwoude.nl/
    Follow me on twitter: pvanderwoude

  • Restart or reset during OSD Windows 7 on Hyper-V VM

    Got started with SCCM 2012 and WDS.
    The VM boot into Windows PE until a certain point.
    I got passed pressing F12 and windows loading files (boot.ett00015.wim),
    Then System Center 2012 Configuration screen appeared and the initializing Windows PE.
    Last message I read there was "preparing network connections" and than the VM got reset.
    Can anyone tell me what to look for, or mayby you had a similar problem.
    Thanks for your reply

    Yes I can ping the MP and took a look at the smsts.log file.
    But I can't ping the VM and make a share to copy the smsts.log file.
    The log shows an error when trying to get information from http://<FQDN>/sms_mp/.sms_aut?mpcert and return error code 400
    tried to connect to http://<FQDN>/sms_mp/.sms_aut?mpcert, http://<FQDN>/sms_mp/.sms_aut?mplist and http://<FQDN>/sms_mp/.sms_aut?mplist1 from a random server and they all returned valid data.
    So, It looks like only during the WIN-PE boot the process is not able to connect to http://<FQDN>/sms_mp/.sms_aut?mpcert.
    Any suggestions?

  • How can I get Firefox to load "Background" images in Windows 7(32 Bit)? They will not load in Windows 7 Professional but will load in XP Virtual console when I installed Firefox there. How do I get it to load properly in the normal Windows 7 window?

    I have a Toshiba laptop Intel(R) Core(TM) i7 CPU Q740 @1.73GHz 1.73 GHz , 4.00 GB RAM, 32-bit Operating system
    I noticed the problem after installing Firefox 4.0.1, but by uninstalling and reinstalling found it was also a problem with the previous version.
    There are no boxes displayed on this form, but on my XP desktop computer, they are displayed. I have both open so I know where to type.
    I installed Firefox on the XP virtual console on this machine and it worked fine, but not using Windows 7.
    None of the posted suggestions for similar questions on this forum worked.

    Make sure that you allow pages to choose their colors and that you haven't enabled High Contrast in the Windows Accessibility settings.
    * http://kb.mozillazine.org/Website_colors_are_wrong
    * http://kb.mozillazine.org/Websites_look_wrong

  • I have Lightroom 5 and am trying to create some HDR Images for my Real Estate Business. I do not have the option to even be able to stack my photos. My headings are: Lightroom- File-Edit-Window-Help. Why does it not give me the option to be able to Stack?

    Can i stack JPEG images or do they have to be Raw Files? The other help videos I have seen have the shortcut CommandG to stack, mine does not respond that command nor do i have a heading labeled Photos.

    In order to stack images they must be all highlighted as a group. And the group must be contiguous, in other words next to each other. However, if you are talking about stacking images for the purposes of creating an HDR image, that cannot be done using Lightroom. You will need Photoshop or some other software with HDR capabilities in order to do that. It is possible to stack any file type or combination of file types, including  virtual copies.

  • A webpage suddenly stops loading and just shows 'connecting...'. Opening new webpages in new tabs in the same window or in a new window gives same problem, while IE does not have any such problem opening the same page simultaneously

    this issue is not limited to one website, it seems to be problem with the browser or possibly any plugins but not any specific webpage

    The default of the pref network.http.max-connections has been increased from 30 to 256 in Firefox 6+ versions.
    Try to decrease the value of the pref <b>network.http.max-connections</b> from 255 to a setting like 30 as used in Firefox 3 versions.
    *https://support.mozilla.com/kb/Firefox+never+finishes+loading+certain+websites

  • TS1538 My iTunes does not recognise any of the six i-devices in my household... the Apple Mobile device is still listed in my windows 8 control panel and I did not have this problem prior to the last month.  Is there something to help?  Anything?!

    SIX devices... not one recognized by ITunes.  Three IPods, two iphones and an ipad.. This is ridiculous.  It's been a month.   When am I going to be able to fix this?!

    Who are you?  Me?  I have an iPad, 3 iPods, and an iPhone (ok, only 5 devices, maybe you aren't me).  None of them will synch with iTunes ever since I upgraded iTunes to 11.1.4.62.  I am trying to figure out how to revert to 11.0 or 10.x.
    If you want, you can try the official technote, but none of them worked for me, and they take quite a bit of time to slog through : http://support.apple.com/kb/TS1363?viewlocale=en_US

  • Error trying to mount the DVD to a network based ISO image in Windows 2008 Hyper-V RC0

    Greetings,
    When I try to configre the guest OS settings to mount the CD/DVD drive to an ISO image I have setting on a file share, I consistently get an error. The only time I have been able to mount an ISO since upgrading to RC0 (I don't remember if I tested this in the BETA) is when the ISO is locally on the Windows 2008 Hyper-V server.
    To be specific, I get the following error:
    Virtual Machine Connection (title of the window)
    Inserting the disk failed.
    Failed to add device 'Microsoft Virtual CD/DVD disk'.
    User account does not have sufficient privelage to open attachment '\\remoteserver\share\ISONAME.ISO'.
    Error: 'General access denied error'
    'NEWGUESTOSNAME' failed to add device 'Microsoft Virtual CD/DVD Disk'. (VMID 26C8B66F-5D3F-47F9-9D80-474D0F778522)
    'NEWGUESTOSNAME': User Account does not have sufficient privelage to open attachement '\\remoteserver\share\ISONAME.ISO'.
    Error: 'General access denied error' (0x80070005). (VMID 26C8B66F-5D3F-47F9-9D80-474D0F778522)
    I am not sure what credentials it is using. It looks almost like it is using the new computer name as credentials or something like that. The account I am logged in as at the time is a Domain Admin and has access to every server and every share. I can browse to the ISO just fine through the Hyper-V Insert Disk function, it just won't take.
    I have checked the Hyper-V server settings and the Guest OS settings and can't find where to specifcy what account to use to connect to remote ISOs. Anyone have any clue on what I am doing wrong?

    Thanks for the various replies.
    Understood it is an issue with the Hyper-V server computer account getting the files, and not the actual guest OS. At this point I think I will just copy some ISO's to the server. I did note the last time I used a "local" ISO that I had to manually type out the local path to the files on the server, as when I tried to browse to the local server drives through the console I got an error about connecting to the local server (which wasn't really local) through the network drives. I don't remember the exact error, but I know I couldn't get it to point to the ISO on the D:\ drive through the browse feature, but rather I just typed out the path and it was fine. That too seems like a bit of a buy/annoyance as I should be able to browse files local to the Hyper-V server, and not have to type out the path.
    I guess I would ask MSFT to consider changing the behavior of the console just a little before RTM if it is being run remotely against the Hyper-V server, versus locally on it, if the permissions being used to get to the remote files are going to be different depending. I.E. It is not intuitive that the same exact action in the same exact console would behave any differently when the console is run on the Hyper-V server versus remotely against the Hyper-V server. I.E. Add in a pop-up when remotely connected to the Hyper-V server to let the user know that some permissions may not proxy through (or whatever verbiage you want to use).
    This will pop-up more and more as people like me try to deploy Hyper-V on Core servers, and they used Hyper-V on a normal Windows 2008 server previously.
    Thanks!

Maybe you are looking for

  • Why READ_IMAGE_FILE is not working in Linux Appln Server?

    Hello! I have a form with a new_form_instance Trigger I wrote the read_image_file trigger to read a GIF file in an image item.It works fine on windows XP(development machine).I copied the GIF file to the same location where my fmx files are there in

  • How do I sync music without erasing all data?

    Hi everyone, This is actually two questions in one. So appreciate all your time, I also apologise if this should be posted in iPhone and not iTunes. Most important question is this: How do I sync the music in my iTunes onto my iPhone without first er

  • I need to load my old acrobat 9 standard version on a new computer?

    I need to know how to download an old purchased version of Acrobat 9 standard on my new computer?

  • Error importing policies in OAM

    Hi Experts, I am getting following error while importing in OAM:- wls:/internal_iam_domain/serverConfig> importPolicy(pathTempOAMPolicyFile='/oracle/app/deploy/staging/sec-oam/oam_policy_internal.xml') Jan 3, 2013 4:29:49 PM oracle.security.am.wlst.W

  • Convert currency to character in smartforms.

    Hi Friends, I need one solution. I have 5 currency fields and i wanna print these currencies fields into character format in SMARTFORMS. How can we do it. Plz reply me as soon as possible. Thanks & Regards, Swapnika