SoftTree Technologies SoftTree Technologies
Technical Support Forums
RegisterSearchFAQMemberlistUsergroupsLog in
logon.exe on a VM of Windows Server 2003
Goto page 1, 2, 3  Next
 
Reply to topic    SoftTree Technologies Forum Index » 24x7 Scheduler, Event Server, Automation Suite View previous topic
View next topic
logon.exe on a VM of Windows Server 2003
Author Message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post logon.exe on a VM of Windows Server 2003 Reply with quote
I have a VM of Windows Server 2003 (32bit) Service Pack 2. When I run the following command:

c:\rundll32.exe user32.dll, LockWorkStation /domain && sleep 3 && logon.exe -u <username> -p <password>

I get the following in the command window:

Windows Login version 1.04
Copyright (c) 2003-2010 SoftTree Technologies, Inc.

Logon successful.


However in the System event log i see this:

The Logon service terminated unexpectedly. It has done this 1 time(s).


When the command is ran it does lock the screen but it never logs the user in. Is this because it is a VM and not a true node? I have another VM that is XP and it works perfectly.
Fri Oct 21, 2011 5:06 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
This is not VM, it s the OS and/or security configuration. Does your Windows server show security disclaimer before login?
Fri Oct 21, 2011 8:20 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
No the VM does not show a disclaimer before logging in. However, this is what you find in the c:\logon.log:

Mon Oct 24 10:21:18 2011 Logon successful.
Mon Oct 24, 2011 11:23 am View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
I have verified in the registry the legal caption and notice are blank:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"LegalNoticeCaption"=""
"LegalNoticeText"=""
Mon Oct 24, 2011 11:51 am View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
Let me be more clear on the event log. The first message is this:

The Logon service was successfully sent a start control.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.


The second message is this:

The Logon service terminated unexpectedly. It has done this 1 time(s).

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.

Mon Oct 24, 2011 12:02 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
The "logon successful" message means that the utility was able to locate the logon screen and successful sent user and password to the logon dialog.

I suspect that the logon service crashes after that. I will try to reproduce it on a test W2003K server.
Mon Oct 24, 2011 8:41 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
I failed to reproduce this issue. I tried both standalone W2003K and an instance running within WMWare VM. Both worked flawlessly
Mon Oct 24, 2011 10:28 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
I suggest trying DebugView utility to monitor debug messages that logon service may print to the debug output.

http://technet.microsoft.com/en-us/sysinternals/bb896647

This may help to catch the event triggering logon crash
Mon Oct 24, 2011 10:54 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
Which service in Windows 2003 server is the logon service and/or how do you put this service in debug mode so the debug viewer can see the debug messages?
Tue Oct 25, 2011 11:17 am View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
Simply use the viewer to see if the logon service prints any debugging messages when crashing. nothing special is required for that, start the debugview then run rundll32.exe user32.dll, LockWorkStation /domain && sleep 3 && logon.exe -u <username> -p <password>
Tue Oct 25, 2011 1:21 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
For DebugView i got the following:

[\\BOXNAME01]
00000001 0.00000000 [776] SNACNP::NPGetCaps::WNNC_NET_TYPE
00000002 0.00004430 [776] SNACNP::NPGetCaps::WNNC_USER
00000003 0.00008668 [776] SNACNP::NPGetCaps::WNNC_CONNECTION
00000004 0.00012901 [776] SNACNP::NPGetCaps::WNNC_ENUMERATION
00000005 0.00017118 [776] SNACNP::NPGetCaps::WNNC_ADMIN
00000006 0.00021351 [776] SNACNP::NPGetCaps::WNNC_DIALOG
00000007 0.00027740 [776] SNACNP::NPLogonNotify!
00000008 0.00032139 [776] WinSta0
00000009 0.00037457 [776] SNACNP::NPLogonNotify done.
00000010 1.13986182 [372] SNACNP::NPGetCaps::WNNC_NET_TYPE
00000011 1.13994205 [372] SNACNP::NPGetCaps::WNNC_USER
00000012 1.14002359 [372] SNACNP::NPGetCaps::WNNC_CONNECTION
00000013 1.14010489 [372] SNACNP::NPGetCaps::WNNC_ENUMERATION
00000014 1.14018631 [372] SNACNP::NPGetCaps::WNNC_ADMIN
00000015 1.14026725 [372] SNACNP::NPGetCaps::WNNC_DIALOG
00000016 1.80324125 [2432] SymNetDrvHelper: Unexpected error returned from RegQueryValueEx()
00000017 61.48794937 [2200] SNACNP::NPGetCaps::WNNC_NET_TYPE
00000018 61.48799133 [2200] SNACNP::NPGetCaps::WNNC_USER
00000019 61.48803711 [2200] SNACNP::NPGetCaps::WNNC_CONNECTION
00000020 61.48808289 [2200] SNACNP::NPGetCaps::WNNC_ENUMERATION
00000021 61.48812103 [2200] SNACNP::NPGetCaps::WNNC_ADMIN
00000022 61.48816681 [2200] SNACNP::NPGetCaps::WNNC_DIALOG
00000023 61.48933792 [2200] SNACNP::NPGetCaps::WNNC_START
Tue Oct 25, 2011 1:56 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
To properly use the DebugView I believe you do have to update keys in the registry. I used the MS link (http://support.microsoft.com/kb/221833) to set the registry debug level for winlogon.exe to "...the most verbose details...". I ran the command line to lock the box, wait 3 seconds and (try)unlock the box. I waited 7 minutes before I actually logged on the box so there is no confusion with the log files. Below is what i got from DebugView:

[\\AUTOMATION01]
00000001 0.00000000 [180] SNACNP::NPGetCaps::WNNC_NET_TYPE
00000002 0.00004429 [180] SNACNP::NPGetCaps::WNNC_USER
00000003 0.00008579 [180] SNACNP::NPGetCaps::WNNC_CONNECTION
00000004 0.00012777 [180] SNACNP::NPGetCaps::WNNC_ENUMERATION
00000005 0.00016966 [180] SNACNP::NPGetCaps::WNNC_ADMIN
00000006 0.00021089 [180] SNACNP::NPGetCaps::WNNC_DIALOG
00000007 0.00027461 [180] SNACNP::NPLogonNotify!
00000008 0.00031738 [180] WinSta0
00000009 0.00037004 [180] SNACNP::NPLogonNotify done.
00000010 0.00291335 [372] USERENV(174.178) 13:03:58:706
00000011 0.00300085 [372] LoadUserProfile: Yes, we can impersonate the user. Running as self
00000012 0.00308524 [372]
00000013 0.00433047 [372] USERENV(174.178) 13:03:58:706
00000014 0.00441777 [372] =========================================================
00000015 0.00450185 [372]
00000016 0.00562682 [372] USERENV(174.178) 13:03:58:706
00000017 0.00571591 [372] LoadUserProfile: Entering, hToken = <0x1d0>, lpProfileInfo = 0x6e5d8
00000018 0.00580546 [372]
00000019 0.00693366 [372] USERENV(174.178) 13:03:58:721
00000020 0.00702235 [372] LoadUserProfile: lpProfileInfo->dwFlags = <0x0>
00000021 0.00710805 [372]
00000022 0.00822268 [372] USERENV(174.178) 13:03:58:721
00000023 0.00831122 [372] LoadUserProfile: lpProfileInfo->lpUserName = <qcadmin>
00000024 0.00839582 [372]
00000025 0.00949950 [372] USERENV(174.178) 13:03:58:721
00000026 0.00958833 [372] LoadUserProfile: NULL central profile path
00000027 0.00967208 [372]
00000028 0.01079293 [372] USERENV(174.178) 13:03:58:721
00000029 0.01088297 [372] LoadUserProfile: lpProfileInfo->lpDefaultPath = <CWYIGDCCRPRW01>
00000030 0.01096741 [372]
00000031 0.01209551 [372] USERENV(174.178) 13:03:58:721
00000032 0.01218374 [372] LoadUserProfile: NULL server name
00000033 0.01227350 [372]
00000034 0.01340078 [372] USERENV(174.178) 13:03:58:721
00000035 0.01348812 [372] LoadUserProfile: In console winlogon process
00000036 0.01357263 [372]
00000037 0.01473489 [372] USERENV(174.178) 13:03:58:721
00000038 0.01482166 [372] In LoadUserProfileP
00000039 0.01490626 [372]
00000040 0.01599699 [372] USERENV(174.178) 13:03:58:721
00000041 0.01608474 [372] =========================================================
00000042 0.01616913 [372]
00000043 0.01727385 [372] USERENV(174.178) 13:03:58:721
00000044 0.01736158 [372] LoadUserProfile: Entering, hToken = <0x1d0>, lpProfileInfo = 0x6e5d8
00000045 0.01744593 [372]
00000046 0.01855140 [372] USERENV(174.178) 13:03:58:721
00000047 0.01863947 [372] LoadUserProfile: lpProfileInfo->dwFlags = <0x0>
00000048 0.01873054 [372]
00000049 0.01983095 [372] USERENV(174.178) 13:03:58:721
00000050 0.01992813 [372] LoadUserProfile: lpProfileInfo->lpUserName = <qcadmin>
00000051 0.02001379 [372]
00000052 0.02113852 [372] USERENV(174.178) 13:03:58:721
00000053 0.02122585 [372] LoadUserProfile: NULL central profile path
00000054 0.02131209 [372]
00000055 0.02255663 [372] USERENV(174.178) 13:03:58:737
00000056 0.02259104 [372] LoadUserProfile: lpProfileInfo->lpDefaultPath = <CWYIGDCCRPRW01>
00000057 0.02267411 [372]
00000058 0.02376692 [372] USERENV(174.178) 13:03:58:737
00000059 0.02385306 [372] LoadUserProfile: NULL server name
00000060 0.02393761 [372]
00000061 0.02505936 [372] USERENV(174.178) 13:03:58:737
00000062 0.02514759 [372] LoadUserProfile: User sid: S-1-5-21-1935655697-1604221776-682003330-212752
00000063 0.02523762 [372]
00000064 0.02633917 [372] USERENV(174.178) 13:03:58:737
00000065 0.02642596 [372] CSyncManager::EnterLock <S>
00000066 0.02651053 [372]
00000067 0.02762548 [372] USERENV(174.178) 13:03:58:737
00000068 0.02771512 [372] CSyncManager::EnterLock: No existing entry found
00000069 0.02780234 [372]
00000070 0.02891601 [372] USERENV(174.178) 13:03:58:737
00000071 0.02900324 [372] CSyncManager::EnterLock: New entry created
00000072 0.02908765 [372]
00000073 0.03020806 [372] USERENV(174.178) 13:03:58:737
00000074 0.03030018 [372] CHashTable::HashAdd: S-1-5-21-1935655697-1604221776-682003330-212752 added in bucket 0
00000075 0.03038258 [372]
00000076 0.03154172 [372] USERENV(174.178) 13:03:58:737
00000077 0.03162937 [372] LoadUserProfile: Wait succeeded. In critical section.
00000078 0.03171599 [372]
00000079 0.03286008 [372] USERENV(174.178) 13:03:58:737
00000080 0.03294826 [372] TestIfUserProfileLoaded: Profile already loaded.
00000081 0.03303339 [372]
00000082 0.03418972 [372] USERENV(174.178) 13:03:58:737
00000083 0.03427734 [372] LoadUserClasses: classes hive already loaded.
00000084 0.03436360 [372]
00000085 0.03552189 [372] USERENV(174.178) 13:03:58:737
00000086 0.03560988 [372] Profile Ref Count is 2
00000087 0.03569626 [372]
00000088 0.03679883 [372] USERENV(174.178) 13:03:58:737
00000089 0.03688729 [372] LoadUserProfile: Leaving critical Section.
00000090 0.03697169 [372]
00000091 0.03813875 [372] USERENV(174.178) 13:03:58:753
00000092 0.03823035 [372] CSyncManager::LeaveLock <S>
00000093 0.03838002 [372]
00000094 0.03954389 [372] USERENV(174.178) 13:03:58:753
00000095 0.03962982 [372] CSyncManager::LeaveLock: Lock released
00000096 0.03971635 [372]
00000097 0.04098742 [372] USERENV(174.178) 13:03:58:753
00000098 0.04103430 [372] CHashTable::HashDelete: S-1-5-21-1935655697-1604221776-682003330-212752 deleted
00000099 0.04111782 [372]
00000100 0.04252423 [372] USERENV(174.178) 13:03:58:753
00000101 0.04261117 [372] CSyncManager::LeaveLock: Lock deleted
00000102 0.04274800 [372]
00000103 0.04390874 [372] USERENV(174.178) 13:03:58:753
00000104 0.04403491 [372] LoadUserProfile: Impersonated user: 000001d0, 00000000
00000105 0.04411509 [372]
00000106 0.04553781 [372] USERENV(174.178) 13:03:58:753
00000107 0.04562147 [372] LoadUserProfile: 002 About Reverted to user: 00000000
00000108 0.04570511 [372]
00000109 0.04690370 [372] USERENV(174.178) 13:03:58:753
00000110 0.04699134 [372] LoadUserProfile: Leaving with a value of 1.
00000111 0.04707735 [372]
00000112 0.04818807 [372] USERENV(174.178) 13:03:58:753
00000113 0.04827565 [372] =========================================================
00000114 0.04836023 [372]
00000115 0.04966575 [372] USERENV(174.178) 13:03:58:753
00000116 0.04975578 [372] LoadUserProfile: LoadUserProfileP succeeded
00000117 0.04983947 [372]
00000118 0.05105321 [372] USERENV(174.178) 13:03:58:753
00000119 0.05114171 [372] LoadUserProfile: Returning success. Final Information follows:
00000120 0.05122611 [372]
00000121 0.05229881 [372] USERENV(174.178) 13:03:58:753
00000122 0.05238580 [372] lpProfileInfo->UserName = <qcadmin>
00000123 0.05247370 [372]
00000124 0.05359226 [372] USERENV(174.178) 13:03:58:768
00000125 0.05368026 [372] lpProfileInfo->lpProfilePath = <null>
00000126 0.05376405 [372]
00000127 0.05488230 [372] USERENV(174.178) 13:03:58:768
00000128 0.05496955 [372] lpProfileInfo->dwFlags = 0x0
00000129 0.05505374 [372]
00000130 0.05615459 [372] USERENV(174.178) 13:03:58:768
00000131 0.05624332 [372] LoadUserProfile: Returning TRUE. hProfile = <0x850>
00000132 0.05632786 [372]
00000133 0.06904621 [372] USERENV(174.178) 13:03:58:768
00000134 0.06914305 [372] IsSyncForegroundPolicyRefresh: Synchronous, Reason: policy set to SYNC
00000135 0.06921976 [372]
00000136 0.07046871 [372] USERENV(174.d0) 13:03:58:784
00000137 0.07051439 [372] IsSyncForegroundPolicyRefresh: Synchronous, Reason: policy set to SYNC
00000138 0.07055658 [372]
00000139 0.07198895 [372] USERENV(174.d0) 13:03:58:784
00000140 0.07203498 [372] ApplyGroupPolicy: Entering. Flags = 6
00000141 0.07207755 [372]
00000142 0.07312595 [372] USERENV(174.d0) 13:03:58:784
00000143 0.07317070 [372] ApplyGroupPolicy: Duplicating handles
00000144 0.07321268 [372]
00000145 0.07434076 [372] USERENV(174.d0) 13:03:58:784
00000146 0.07438597 [372] ProcessGPOs:
00000147 0.07442835 [372]
00000148 0.07546746 [372] USERENV(174.d0) 13:03:58:784
00000149 0.07551228 [372] ProcessGPOs:
00000150 0.07555446 [372]
00000151 0.07659367 [372] USERENV(174.d0) 13:03:58:784
00000152 0.07664247 [372] ProcessGPOs: Starting user Group Policy (Sync forground) processing...
00000153 0.07668249 [372]
00000154 0.07774127 [372] USERENV(174.d0) 13:03:58:784
00000155 0.07778742 [372] ProcessGPOs:
00000156 0.07782793 [372]
00000157 0.07890686 [372] USERENV(174.d0) 13:03:58:784
00000158 0.07895111 [372] ProcessGPOs:
00000159 0.07899316 [372]
00000160 0.08005483 [372] USERENV(174.d0) 13:03:58:784
00000161 0.08010171 [372] EnterCriticalPolicySectionEx: Entering with timeout 600000 and flags 0x0
00000162 0.08014424 [372]
00000163 0.08119544 [372] USERENV(174.d0) 13:03:58:784
00000164 0.08124236 [372] EnterCriticalPolicySectionEx: User critical section has been claimed. Handle = 0x894
00000165 0.08128487 [372]
00000166 0.08235002 [372] USERENV(174.d0) 13:03:58:784
00000167 0.08239418 [372] EnterCriticalPolicySectionEx: Leaving successfully.
00000168 0.08243642 [372]
00000169 0.08356514 [372] USERENV(174.d0) 13:03:58:784
00000170 0.08361071 [372] ProcessGPOs: Machine role is 2.
00000171 0.08365301 [372]
00000172 0.09796675 [372] USERENV(174.d0) 13:03:58:799
00000173 0.09801163 [372] PingComputer: PingBufferSize set as 2048
00000174 0.09805403 [372]
00000175 0.09966606 [372] USERENV(174.d0) 13:03:58:799
00000176 0.09971320 [372] PingComputer: Adapter speed 1410065408 bps
00000177 0.09975515 [372]
00000178 0.10134524 [372] USERENV(174.d0) 13:03:58:815
00000179 0.10139044 [372] PingComputer: First time: 0
00000180 0.10143249 [372]
00000181 0.10251018 [372] USERENV(174.d0) 13:03:58:815
00000182 0.10259612 [372] PingComputer: Fast link. Exiting.
00000183 0.10262997 [372]
00000184 0.10374962 [372] USERENV(174.d0) 13:03:58:815
00000185 0.10379598 [372] ProcessGPOs: User name is: CN=qcadmin - qcadmin,OU=Service Accounts,OU=Conway,OU=US,DC=Corp,DC=company,DC=net, Domain name is: CORP.company.NET
00000186 0.10383858 [372]
00000187 0.10493989 [372] USERENV(174.d0) 13:03:58:815
00000188 0.10515506 [372] ProcessGPOs: Domain controller is: \\CWYSDDCCRPRO00.Corp.company.net Domain DN is CORP.company.NET
00000189 0.10544308 [372]
00000190 0.10655492 [372] USERENV(174.d0) 13:03:58:815
00000191 0.10657207 [372] ReadGPExtensions: Rsop entry point not found for dskquota.dll.
00000192 0.10669812 [372]
00000193 0.10782807 [372] USERENV(174.d0) 13:03:58:815
00000194 0.10789087 [372] ReadGPExtensions: Rsop entry point not found for gptext.dll.
00000195 0.10908875 [372]
00000196 0.10916388 [372] USERENV(174.d0) 13:03:58:815
00000197 0.10922679 [372] ReadGPExtensions: Rsop entry point not found for C:\WINDOWS\system32\iedkcs32.dll.
00000198 0.11043642 [372]
00000199 0.11049786 [372] USERENV(174.d0) 13:03:58:815
00000200 0.11055603 [372] ReadGPExtensions: Rsop entry point not found for C:\WINDOWS\system32\iedkcs32.dll.
00000201 0.11161945 [372]
00000202 0.11163340 [372] USERENV(174.d0) 13:03:58:815
00000203 0.11173667 [372] ReadGPExtensions: Rsop entry point not found for scecli.dll.
00000204 0.11201164 [372]
00000205 0.11282502 [372] USERENV(174.d0) 13:03:58:815
00000206 0.11287141 [372] ReadGPExtensions: Rsop entry point not found for C:\WINDOWS\System32\cscui.dll.
00000207 0.11291312 [372]
00000208 0.11402705 [372] USERENV(174.d0) 13:03:58:815
00000209 0.11407378 [372] ReadGPExtensions: Rsop entry point not found for C:\WINDOWS\system32\iedkcs32.dll.
00000210 0.11411685 [372]
00000211 0.11522350 [372] USERENV(174.d0) 13:03:58:815
00000212 0.11526556 [372] ReadExtStatus: Reading Previous Status for extension {35378EAC-683F-11D2-A89A-00C04FBBCFA2}
00000213 0.11531000 [372]
00000214 0.11640992 [372] USERENV(174.d0) 13:03:58:831
00000215 0.11645292 [372] ReadStatus: Read Extension's Previous status successfully.
00000216 0.11649221 [372]
00000217 0.11756287 [372] USERENV(174.d0) 13:03:58:831
00000218 0.11760554 [372] ReadExtStatus: Reading Previous Status for extension {0ACDD40C-75AC-47ab-BAA0-BF6DE7E7FE63}
00000219 0.11764476 [372]
00000220 0.11874552 [372] USERENV(174.d0) 13:03:58:831
00000221 0.11878838 [372] ReadExtStatus: Reading Previous Status for extension {25537BA6-77A8-11D2-9B6C-0000F8080861}
00000222 0.11882763 [372]
00000223 0.11989544 [372] USERENV(174.d0) 13:03:58:831
00000224 0.11993928 [372] ReadExtStatus: Reading Previous Status for extension {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
00000225 0.11997864 [372]
00000226 0.12104239 [372] USERENV(174.d0) 13:03:58:831
00000227 0.12108572 [372] ReadExtStatus: Reading Previous Status for extension {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
00000228 0.12112486 [372]
00000229 0.12217698 [372] USERENV(174.d0) 13:03:58:831
00000230 0.12221923 [372] ReadExtStatus: Reading Previous Status for extension {42B5FAAE-6536-11d2-AE5A-0000F87571E3}
00000231 0.12225772 [372]
00000232 0.12330639 [372] USERENV(174.d0) 13:03:58:831
00000233 0.12334941 [372] ReadExtStatus: Reading Previous Status for extension {4CFB60C1-FAA6-47f1-89AA-0B18730C9FD3}
00000234 0.12339044 [372]
00000235 0.12445297 [372] USERENV(174.d0) 13:03:58:831
00000236 0.12449615 [372] ReadExtStatus: Reading Previous Status for extension {7B849a69-220F-451E-B3FE-2CB811AF94AE}
00000237 0.12453607 [372]
00000238 0.12560792 [372] USERENV(174.d0) 13:03:58:831
00000239 0.12565133 [372] ReadExtStatus: Reading Previous Status for extension {827D319E-6EAC-11D2-A4EA-00C04F79F83A}
00000240 0.12569252 [372]
00000241 0.12673759 [372] USERENV(174.d0) 13:03:58:831
00000242 0.12678081 [372] ReadExtStatus: Reading Previous Status for extension {A2E30F80-D7DE-11d2-BBDE-00C04F86AE3B}
00000243 0.12681982 [372]
00000244 0.12788603 [372] USERENV(174.d0) 13:03:58:831
00000245 0.12792911 [372] ReadExtStatus: Reading Previous Status for extension {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}
00000246 0.12796849 [372]
00000247 0.12903532 [372] USERENV(174.d0) 13:03:58:831
00000248 0.12907845 [372] ReadExtStatus: Reading Previous Status for extension {C631DF4C-088F-4156-B058-4375F0853CD8}
00000249 0.12911749 [372]
00000250 0.13017341 [372] USERENV(174.d0) 13:03:58:831
00000251 0.13021934 [372] ReadExtStatus: Reading Previous Status for extension {c6dc5466-785a-11d2-84d0-00c04fb169f7}
00000252 0.13025765 [372]
00000253 0.13129683 [372] USERENV(174.d0) 13:03:58:831
00000254 0.13133918 [372] ReadExtStatus: Reading Previous Status for extension {CF7639F3-ABA2-41DB-97F2-81E2C5DBFC5D}
00000255 0.13137841 [372]
00000256 0.13249923 [372] USERENV(174.d0) 13:03:58:846
00000257 0.13254197 [372] ReadExtStatus: Reading Previous Status for extension {e437bc1c-aa7d-11d2-a382-00c04f991e27}
00000258 0.13258107 [372]
00000259 0.13385361 [372] USERENV(174.d0) 13:03:58:846
00000260 0.13389577 [372] ProcessGPOs: Calling GetGPOInfo for normal policy mode
00000261 0.13393521 [372]
00000262 0.13497627 [372] USERENV(174.d0) 13:03:58:846
00000263 0.13501854 [372] GetGPOInfo: ********************************
00000264 0.13505790 [372]
00000265 0.13611856 [372] USERENV(174.d0) 13:03:58:846
00000266 0.13616118 [372] GetGPOInfo: Entering...
00000267 0.13620076 [372]
00000268 0.13730228 [372] USERENV(174.d0) 13:03:58:846
00000269 0.13734381 [372] GetGPOInfo: Server connection established.
00000270 0.13738331 [372]
00000271 0.14144175 [372] USERENV(174.d0) 13:03:58:846
00000272 0.14148375 [372] GetGPOInfo: Bound successfully.
00000273 0.14152344 [372]
00000274 0.14431325 [372] USERENV(174.d0) 13:03:58:846
00000275 0.14436938 [372] SearchDSObject: Searching <OU>
00000276 0.14441188 [372]
00000277 0.14548506 [372] USERENV(174.d0) 13:03:58:846
00000278 0.14553364 [372] SearchDSObject: No GPO(s) for this object.
00000279 0.14557371 [372]
00000280 0.14663719 [372] USERENV(174.d0) 13:03:58:846
00000281 0.14669348 [372] SearchDSObject: Searching <OU>
00000282 0.14673664 [372]
00000283 0.14782546 [372] USERENV(174.d0) 13:03:58:862
00000284 0.14786845 [372] SearchDSObject: No GPO(s) for this object.
00000285 0.14790794 [372]
00000286 0.14896035 [372] USERENV(174.d0) 13:03:58:862
00000287 0.14900410 [372] SearchDSObject: Searching <OU>
00000288 0.14904308 [372]
00000289 0.15010570 [372] USERENV(174.d0) 13:03:58:862
00000290 0.15015326 [372] SearchDSObject: Found GPO(s): <LDAP>
00000291 0.15019323 [372]
00000292 0.15124801 [372] USERENV(174.d0) 13:03:58:862
00000293 0.15129109 [372] ProcessGPO: ==============================
00000294 0.15133071 [372]
00000295 0.15240698 [372] USERENV(174.d0) 13:03:58:862
00000296 0.15244907 [372] ProcessGPO: Deferring search for <LDAP>
00000297 0.15248756 [372]
00000298 0.15356341 [372] USERENV(174.d0) 13:03:58:862
00000299 0.15360530 [372] ProcessGPO: ==============================
00000300 0.15364477 [372]
00000301 0.15468353 [372] USERENV(174.d0) 13:03:58:862
00000302 0.15472668 [372] ProcessGPO: Deferring search for <LDAP>
00000303 0.15476711 [372]
00000304 0.15584283 [372] USERENV(174.d0) 13:03:58:862
00000305 0.15588517 [372] ProcessGPO: ==============================
00000306 0.15592487 [372]
00000307 0.15698907 [372] USERENV(174.d0) 13:03:58:862
00000308 0.15703347 [372] ProcessGPO: Deferring search for <LDAP>
00000309 0.15707323 [372]
00000310 0.15814674 [372] USERENV(174.d0) 13:03:58:862
00000311 0.15819490 [372] SearchDSObject: Searching <DC>
00000312 0.15823601 [372]
00000313 0.15932451 [372] USERENV(174.d0) 13:03:58:862
00000314 0.15938762 [372] SearchDSObject: Found GPO(s): <LDAP>
00000315 0.15942788 [372]
00000316 0.16057830 [372] USERENV(174.d0) 13:03:58:862
00000317 0.16062100 [372] ProcessGPO: ==============================
00000318 0.16066405 [372]
00000319 0.16173434 [372] USERENV(174.d0) 13:03:58:862
00000320 0.16177958 [372] ProcessGPO: Deferring search for <LDAP>
00000321 0.16181834 [372]
00000322 0.16290815 [372] USERENV(174.d0) 13:03:58:878
00000323 0.16295069 [372] ProcessGPO: ==============================
00000324 0.16299044 [372]
00000325 0.16407193 [372] USERENV(174.d0) 13:03:58:878
00000326 0.16411598 [372] ProcessGPO: Deferring search for <LDAP>
00000327 0.16415550 [372]
00000328 0.16524322 [372] USERENV(174.d0) 13:03:58:878
00000329 0.16528612 [372] ProcessGPO: ==============================
00000330 0.16532573 [372]
00000331 0.16639929 [372] USERENV(174.d0) 13:03:58:878
00000332 0.16644317 [372] ProcessGPO: Deferring search for <LDAP>
00000333 0.16648500 [372]
00000334 0.16757074 [372] USERENV(174.d0) 13:03:58:878
00000335 0.16761240 [372] ProcessGPO: ==============================
00000336 0.16765372 [372]
00000337 0.16874874 [372] USERENV(174.d0) 13:03:58:878
00000338 0.16879322 [372] ProcessGPO: Deferring search for <LDAP>
00000339 0.16883305 [372]
00000340 0.16992576 [372] USERENV(174.d0) 13:03:58:878
00000341 0.16996825 [372] ProcessGPO: ==============================
00000342 0.17000806 [372]
00000343 0.17108771 [372] USERENV(174.d0) 13:03:58:878
00000344 0.17113206 [372] ProcessGPO: Deferring search for <LDAP>
00000345 0.17117172 [372]
00000346 0.17229007 [372] USERENV(174.d0) 13:03:58:878
00000347 0.17233536 [372] SearchDSObject: The link to GPO LDAP://cn={4399296C-5598-4723-95E6-159DCDF8D1F9},cn=policies,cn=system,DC=Corp,DC=company,DC=net is disabled. It will be skipped for processing.
00000348 0.17237498 [372]
00000349 0.17346339 [372] USERENV(174.d0) 13:03:58:878
00000350 0.17350632 [372] ProcessGPO: ==============================
00000351 0.17354816 [372]
00000352 0.17461444 [372] USERENV(174.d0) 13:03:58:878
00000353 0.17466082 [372] ProcessGPO: Deferring search for <LDAP>
00000354 0.17469738 [372]
00000355 0.17577547 [372] USERENV(174.d0) 13:03:58:878
00000356 0.17582132 [372] SearchDSObject: The link to GPO LDAP://CN={6DAD7795-236F-45E3-8589-8B531094543B},CN=Policies,CN=System,DC=Corp,DC=company,DC=net is disabled. It will be skipped for processing.
00000357 0.17586128 [372]
00000358 0.17694128 [372] USERENV(174.d0) 13:03:58:878
00000359 0.17698556 [372] ProcessGPO: ==============================
00000360 0.17702550 [372]
00000361 0.17809434 [372] USERENV(174.d0) 13:03:58:878
00000362 0.17813814 [372] ProcessGPO: Deferring search for <LDAP>
00000363 0.17817780 [372]
00000364 0.17926349 [372] USERENV(174.d0) 13:03:58:893
00000365 0.17930588 [372] ProcessGPO: ==============================
00000366 0.17934529 [372]
00000367 0.18042387 [372] USERENV(174.d0) 13:03:58:893
00000368 0.18046939 [372] ProcessGPO: Deferring search for <LDAP>
00000369 0.18050876 [372]
00000370 0.18158667 [372] USERENV(174.d0) 13:03:58:893
00000371 0.18163046 [372] ProcessGPO: ==============================
00000372 0.18166792 [372]
00000373 0.18273027 [372] USERENV(174.d0) 13:03:58:893
00000374 0.18277138 [372] ProcessGPO: Deferring search for <LDAP>
00000375 0.18281060 [372]
00000376 0.18388851 [372] USERENV(174.d0) 13:03:58:893
00000377 0.18393102 [372] ProcessGPO: ==============================
00000378 0.18397048 [372]
00000379 0.18504949 [372] USERENV(174.d0) 13:03:58:893
00000380 0.18509369 [372] ProcessGPO: Deferring search for <LDAP>
00000381 0.18513344 [372]
00000382 0.18621905 [372] USERENV(174.d0) 13:03:58:893
00000383 0.18626209 [372] ProcessGPO: ==============================
00000384 0.18630156 [372]
00000385 0.18734844 [372] USERENV(174.d0) 13:03:58:893
00000386 0.18739264 [372] ProcessGPO: Deferring search for <LDAP>
00000387 0.18743198 [372]
00000388 0.18850215 [372] USERENV(174.d0) 13:03:58:893
00000389 0.18854222 [372] ProcessGPO: ==============================
00000390 0.18858173 [372]
00000391 0.18971837 [372] USERENV(174.d0) 13:03:58:893
00000392 0.18976240 [372] ProcessGPO: Deferring search for <LDAP>
00000393 0.18980166 [372]
00000394 0.19418469 [372] USERENV(174.d0) 13:03:58:909
00000395 0.19422710 [372] SearchDSObject: Searching <CN>
00000396 0.19426668 [372]
00000397 0.19580038 [372] USERENV(174.d0) 13:03:58:909
00000398 0.19584228 [372] SearchDSObject: No GPO(s) for this object.
00000399 0.19588168 [372]
00000400 0.19704974 [372] USERENV(174.d0) 13:03:58:909
00000401 0.19709361 [372] EvaluateDeferredGPOs: Searching for GPOs in cn=policies,cn=system,DC=Corp,DC=company,DC=net
00000402 0.19713262 [372]
00000403 0.20054044 [372] USERENV(174.d0) 13:03:58:909
00000404 0.20058389 [372] ProcessGPO: ==============================
00000405 0.20062305 [372]
00000406 0.20191172 [372] USERENV(174.d0) 13:03:58:909
00000407 0.20195517 [372] ProcessGPO: Searching <cn>
00000408 0.20199424 [372]
00000409 0.20312561 [372] USERENV(174.d0) 13:03:58:909
00000410 0.20316818 [372] ProcessGPO: User has access to this GPO.
00000411 0.20321310 [372]
00000412 0.20430532 [372] USERENV(174.d0) 13:03:58:909
00000413 0.20434833 [372] ProcessGPO: GPO passes the filter check.
00000414 0.20438796 [372]
00000415 0.20548533 [372] USERENV(174.d0) 13:03:58:909
00000416 0.20553452 [372] ProcessGPO: Found functionality version of: 2
00000417 0.20557438 [372]
00000418 0.20669585 [372] USERENV(174.d0) 13:03:58:909
00000419 0.20674193 [372] ProcessGPO: Found file system path of: <Corp>
00000420 0.20678201 [372]
00000421 0.23059539 [372] USERENV(174.d0) 13:03:58:940
00000422 0.23063900 [372] ProcessGPO: Found common name of: <05BC4B42>
00000423 0.23067932 [372]
00000424 0.23176214 [372] USERENV(174.d0) 13:03:58:940
00000425 0.23180465 [372] ProcessGPO: Found display name of: <Block>
00000426 0.23184438 [372]
00000427 0.23291443 [372] USERENV(174.d0) 13:03:58:940
00000428 0.23295845 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000429 0.23299690 [372]
00000430 0.23405780 [372] USERENV(174.d0) 13:03:58:940
00000431 0.23410125 [372] ProcessGPO: Found flags of: 0
00000432 0.23414046 [372]
00000433 0.23520127 [372] USERENV(174.d0) 13:03:58:940
00000434 0.23524444 [372] ProcessGPO: No client-side extensions for this object.
00000435 0.23528351 [372]
00000436 0.23635839 [372] USERENV(174.d0) 13:03:58:940
00000437 0.23640220 [372] ProcessGPO: GPO Block IE7 doesn't contain any data since the version number is 0. It will be skipped.
00000438 0.23644154 [372]
00000439 0.23750955 [372] USERENV(174.d0) 13:03:58:940
00000440 0.23755227 [372] ProcessGPO: ==============================
00000441 0.23759189 [372]
00000442 0.23864587 [372] USERENV(174.d0) 13:03:58:940
00000443 0.23868881 [372] ProcessGPO: ==============================
00000444 0.23872811 [372]
00000445 0.23979935 [372] USERENV(174.d0) 13:03:58:940
00000446 0.23984951 [372] ProcessGPO: Searching <CN>
00000447 0.23989031 [372]
00000448 0.24107800 [372] USERENV(174.d0) 13:03:58:956
00000449 0.24112369 [372] ProcessGPO: User has access to this GPO.
00000450 0.24116327 [372]
00000451 0.24225150 [372] USERENV(174.d0) 13:03:58:956
00000452 0.24229378 [372] ProcessGPO: GPO passes the filter check.
00000453 0.24233311 [372]
00000454 0.24343012 [372] USERENV(174.d0) 13:03:58:956
00000455 0.24347347 [372] ProcessGPO: Found functionality version of: 2
00000456 0.24351282 [372]
00000457 0.24456970 [372] USERENV(174.d0) 13:03:58:956
00000458 0.24461876 [372] ProcessGPO: Found file system path of: <Corp>
00000459 0.24466026 [372]
00000460 0.26209962 [372] USERENV(174.d0) 13:03:58:971
00000461 0.26214278 [372] ProcessGPO: Found common name of: <21AE63F3>
00000462 0.26218227 [372]
00000463 0.26325214 [372] USERENV(174.d0) 13:03:58:971
00000464 0.26329523 [372] ProcessGPO: Found display name of: <XP>
00000465 0.26333436 [372]
00000466 0.26438546 [372] USERENV(174.d0) 13:03:58:971
00000467 0.26442930 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000468 0.26446894 [372]
00000469 0.26553017 [372] USERENV(174.d0) 13:03:58:971
00000470 0.26557305 [372] ProcessGPO: Found flags of: 0
00000471 0.26561251 [372]
00000472 0.26668423 [372] USERENV(174.d0) 13:03:58:971
00000473 0.26672700 [372] ProcessGPO: No client-side extensions for this object.
00000474 0.26676625 [372]
00000475 0.26782799 [372] USERENV(174.d0) 13:03:58:971
00000476 0.26787302 [372] ProcessGPO: GPO XP Firewall doesn't contain any data since the version number is 0. It will be skipped.
00000477 0.26791382 [372]
00000478 0.26896355 [372] USERENV(174.d0) 13:03:58:971
00000479 0.26900658 [372] ProcessGPO: ==============================
00000480 0.26904625 [372]
00000481 0.27009812 [372] USERENV(174.d0) 13:03:58:971
00000482 0.27014059 [372] ProcessGPO: ==============================
00000483 0.27017957 [372]
00000484 0.27123672 [372] USERENV(174.d0) 13:03:58:971
00000485 0.27128041 [372] ProcessGPO: Searching <cn>
00000486 0.27131942 [372]
00000487 0.29431218 [372] USERENV(174.d0) 13:03:58:987
00000488 0.29436761 [372] ProcessGPO: User has access to this GPO.
00000489 0.29451346 [372]
00000490 0.29544932 [372] USERENV(174.d0) 13:03:59:002
00000491 0.29549196 [372] ProcessGPO: GPO passes the filter check.
00000492 0.29553163 [372]
00000493 0.29659879 [372] USERENV(174.d0) 13:03:59:002
00000494 0.29664242 [372] ProcessGPO: Found functionality version of: 2
00000495 0.29668191 [372]
00000496 0.29774237 [372] USERENV(174.d0) 13:03:59:002
00000497 0.29778695 [372] ProcessGPO: Found file system path of: <Corp>
00000498 0.29782638 [372]
00000499 0.30853012 [372] USERENV(174.d0) 13:03:59:018
00000500 0.30857351 [372] ProcessGPO: Found common name of: <0F9971EC>
00000501 0.30861256 [372]
00000502 0.30968237 [372] USERENV(174.d0) 13:03:59:018
00000503 0.30972487 [372] ProcessGPO: Found display name of: <ScreenSaver>
00000504 0.30976456 [372]
00000505 0.31083819 [372] USERENV(174.d0) 13:03:59:018
00000506 0.31088153 [372] ProcessGPO: Found user version of: GPC is 3, GPT is 3
00000507 0.31092095 [372]
00000508 0.31197536 [372] USERENV(174.d0) 13:03:59:018
00000509 0.31201872 [372] ProcessGPO: Found flags of: 0
00000510 0.31205806 [372]
00000511 0.31312466 [372] USERENV(174.d0) 13:03:59:018
00000512 0.31316867 [372] ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}]
00000513 0.31320795 [372]
00000514 0.31426680 [372] USERENV(174.d0) 13:03:59:018
00000515 0.31430957 [372] ProcessGPO: ==============================
00000516 0.31434980 [372]
00000517 0.31545427 [372] USERENV(174.d0) 13:03:59:018
00000518 0.31549725 [372] ProcessGPO: ==============================
00000519 0.31553665 [372]
00000520 0.31658071 [372] USERENV(174.d0) 13:03:59:018
00000521 0.31662488 [372] ProcessGPO: Searching <cn>
00000522 0.31666434 [372]
00000523 0.31774250 [372] USERENV(174.d0) 13:03:59:018
00000524 0.31778523 [372] ProcessGPO: User has access to this GPO.
00000525 0.31782469 [372]
00000526 0.31889269 [372] USERENV(174.d0) 13:03:59:018
00000527 0.31893465 [372] ProcessGPO: GPO passes the filter check.
00000528 0.31897375 [372]
00000529 0.32003891 [372] USERENV(174.d0) 13:03:59:034
00000530 0.32008213 [372] ProcessGPO: Found functionality version of: 2
00000531 0.32012165 [372]
00000532 0.32118005 [372] USERENV(174.d0) 13:03:59:034
00000533 0.32122391 [372] ProcessGPO: Found file system path of: <Corp>
00000534 0.32126340 [372]
00000535 0.32961318 [372] USERENV(174.d0) 13:03:59:034
00000536 0.32965651 [372] ProcessGPO: Found common name of: <5D5E363C>
00000537 0.32969630 [372]
00000538 0.33076242 [372] USERENV(174.d0) 13:03:59:034
00000539 0.33080578 [372] ProcessGPO: Found display name of: <Qakbot>
00000540 0.33084530 [372]
00000541 0.33190963 [372] USERENV(174.d0) 13:03:59:034
00000542 0.33195317 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000543 0.33199224 [372]
00000544 0.33304530 [372] USERENV(174.d0) 13:03:59:034
00000545 0.33308864 [372] ProcessGPO: Found flags of: 0
00000546 0.33312887 [372]
00000547 0.33418956 [372] USERENV(174.d0) 13:03:59:034
00000548 0.33423206 [372] ProcessGPO: No client-side extensions for this object.
00000549 0.33427116 [372]
00000550 0.33535641 [372] USERENV(174.d0) 13:03:59:049
00000551 0.33540091 [372] ProcessGPO: GPO Qakbot Virus - Disable AutoRun doesn't contain any data since the version number is 0. It will be skipped.
00000552 0.33544031 [372]
00000553 0.33649620 [372] USERENV(174.d0) 13:03:59:049
00000554 0.33653906 [372] ProcessGPO: ==============================
00000555 0.33657816 [372]
00000556 0.33763188 [372] USERENV(174.d0) 13:03:59:049
00000557 0.33767441 [372] ProcessGPO: ==============================
00000558 0.33771348 [372]
00000559 0.33877888 [372] USERENV(174.d0) 13:03:59:049
00000560 0.33882314 [372] ProcessGPO: Searching <cn>
00000561 0.33886266 [372]
00000562 0.33994550 [372] USERENV(174.d0) 13:03:59:049
00000563 0.33998820 [372] ProcessGPO: User has access to this GPO.
00000564 0.34002787 [372]
00000565 0.34107020 [372] USERENV(174.d0) 13:03:59:049
00000566 0.34111297 [372] ProcessGPO: GPO passes the filter check.
00000567 0.34115240 [372]
00000568 0.34222475 [372] USERENV(174.d0) 13:03:59:049
00000569 0.34226838 [372] ProcessGPO: Found functionality version of: 2
00000570 0.34230798 [372]
00000571 0.34337237 [372] USERENV(174.d0) 13:03:59:049
00000572 0.34341639 [372] ProcessGPO: Found file system path of: <Corp>
00000573 0.34345585 [372]
00000574 0.35139918 [372] USERENV(174.d0) 13:03:59:065
00000575 0.35144275 [372] ProcessGPO: Found common name of: <D9346214>
00000576 0.35148185 [372]
00000577 0.35255796 [372] USERENV(174.d0) 13:03:59:065
00000578 0.35260069 [372] ProcessGPO: Found display name of: <Wireless>
00000579 0.35264036 [372]
00000580 0.35375771 [372] USERENV(174.d0) 13:03:59:065
00000581 0.35380194 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000582 0.35384238 [372]
00000583 0.35489237 [372] USERENV(174.d0) 13:03:59:065
00000584 0.35493541 [372] ProcessGPO: Found flags of: 0
00000585 0.35497510 [372]
00000586 0.35603061 [372] USERENV(174.d0) 13:03:59:065
00000587 0.35607335 [372] ProcessGPO: No client-side extensions for this object.
00000588 0.35611248 [372]
00000589 0.35716665 [372] USERENV(174.d0) 13:03:59:065
00000590 0.35721073 [372] ProcessGPO: GPO Wireless Security Policy doesn't contain any data since the version number is 0. It will be skipped.
00000591 0.35725006 [372]
00000592 0.35831293 [372] USERENV(174.d0) 13:03:59:065
00000593 0.35835531 [372] ProcessGPO: ==============================
00000594 0.35839444 [372]
00000595 0.35944661 [372] USERENV(174.d0) 13:03:59:065
00000596 0.35948932 [372] ProcessGPO: ==============================
00000597 0.35952899 [372]
00000598 0.36059237 [372] USERENV(174.d0) 13:03:59:065
00000599 0.36063609 [372] ProcessGPO: Searching <cn>
00000600 0.36067548 [372]
00000601 0.36175299 [372] USERENV(174.d0) 13:03:59:065
00000602 0.36179593 [372] ProcessGPO: User has access to this GPO.
00000603 0.36184093 [372]
00000604 0.36290279 [372] USERENV(174.d0) 13:03:59:065
00000605 0.36294505 [372] ProcessGPO: GPO passes the filter check.
00000606 0.36298504 [372]
00000607 0.36403340 [372] USERENV(174.d0) 13:03:59:065
00000608 0.36407697 [372] ProcessGPO: Found functionality version of: 2
00000609 0.36411655 [372]
00000610 0.36517847 [372] USERENV(174.d0) 13:03:59:065
00000611 0.36522254 [372] ProcessGPO: Found file system path of: <Corp>
00000612 0.36526197 [372]
00000613 0.37261999 [372] USERENV(174.d0) 13:03:59:081
00000614 0.37266356 [372] ProcessGPO: Found common name of: <8100E18E>
00000615 0.37270293 [372]
00000616 0.37375611 [372] USERENV(174.d0) 13:03:59:081
00000617 0.37379923 [372] ProcessGPO: Found display name of: <ACX>
00000618 0.37383854 [372]
00000619 0.37490782 [372] USERENV(174.d0) 13:03:59:081
00000620 0.37495151 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000621 0.37499118 [372]
00000622 0.37606353 [372] USERENV(174.d0) 13:03:59:081
00000623 0.37610662 [372] ProcessGPO: Found flags of: 0
00000624 0.37614587 [372]
00000625 0.37719446 [372] USERENV(174.d0) 13:03:59:081
00000626 0.37723765 [372] ProcessGPO: No client-side extensions for this object.
00000627 0.37727767 [372]
00000628 0.37831894 [372] USERENV(174.d0) 13:03:59:081
00000629 0.37836334 [372] ProcessGPO: GPO ACX Trusted Root Certificate Authorities doesn't contain any data since the version number is 0. It will be skipped.
00000630 0.37840253 [372]
00000631 0.37945876 [372] USERENV(174.d0) 13:03:59:081
00000632 0.37950194 [372] ProcessGPO: ==============================
00000633 0.37954065 [372]
00000634 0.38061294 [372] USERENV(174.d0) 13:03:59:081
00000635 0.38065717 [372] EvalList: Object <cn> cannot be accessed
00000636 0.38069648 [372]
00000637 0.38174435 [372] USERENV(174.d0) 13:03:59:096
00000638 0.38178697 [372] ProcessGPO: ==============================
00000639 0.38183114 [372]
00000640 0.38289356 [372] USERENV(174.d0) 13:03:59:096
00000641 0.38293794 [372] ProcessGPO: Searching <cn>
00000642 0.38297725 [372]
00000643 0.38409281 [372] USERENV(174.d0) 13:03:59:096
00000644 0.38413566 [372] ProcessGPO: User has access to this GPO.
00000645 0.38417539 [372]
00000646 0.38526735 [372] USERENV(174.d0) 13:03:59:096
00000647 0.38530940 [372] ProcessGPO: GPO passes the filter check.
00000648 0.38534868 [372]
00000649 0.38639760 [372] USERENV(174.d0) 13:03:59:096
00000650 0.38644126 [372] ProcessGPO: Found functionality version of: 2
00000651 0.38648012 [372]
00000652 0.38754448 [372] USERENV(174.d0) 13:03:59:096
00000653 0.38758793 [372] ProcessGPO: Found file system path of: <Corp>
00000654 0.38762730 [372]
00000655 0.39670286 [372] USERENV(174.d0) 13:03:59:096
00000656 0.39674661 [372] ProcessGPO: Found common name of: <74692FFF>
00000657 0.39678618 [372]
00000658 0.39787537 [372] USERENV(174.d0) 13:03:59:112
00000659 0.39791957 [372] ProcessGPO: Found display name of: <Offie2003>
00000660 0.39795959 [372]
00000661 0.39901969 [372] USERENV(174.d0) 13:03:59:112
00000662 0.39906311 [372] ProcessGPO: Found user version of: GPC is 3, GPT is 3
00000663 0.39910358 [372]
00000664 0.40016258 [372] USERENV(174.d0) 13:03:59:112
00000665 0.40020546 [372] ProcessGPO: Found flags of: 0
00000666 0.40024465 [372]
00000667 0.40130821 [372] USERENV(174.d0) 13:03:59:112
00000668 0.40135226 [372] ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}]
00000669 0.40139171 [372]
00000670 0.40244839 [372] USERENV(174.d0) 13:03:59:112
00000671 0.40249059 [372] ProcessGPO: ==============================
00000672 0.40253526 [372]
00000673 0.40358257 [372] USERENV(174.d0) 13:03:59:112
00000674 0.40362531 [372] ProcessGPO: ==============================
00000675 0.40366489 [372]
00000676 0.40471652 [372] USERENV(174.d0) 13:03:59:112
00000677 0.40476057 [372] ProcessGPO: Searching <cn>
00000678 0.40480003 [372]
00000679 0.40590215 [372] USERENV(174.d0) 13:03:59:112
00000680 0.40594539 [372] ProcessGPO: User does not have access to the GPO and so will not be applied.
00000681 0.40598512 [372]
00000682 0.40704250 [372] USERENV(174.d0) 13:03:59:112
00000683 0.40708601 [372] ProcessGPO: Found functionality version of: 2
00000684 0.40712568 [372]
00000685 0.40818012 [372] USERENV(174.d0) 13:03:59:112
00000686 0.40822440 [372] ProcessGPO: Found file system path of: <Corp>
00000687 0.40826333 [372]
00000688 0.40933084 [372] USERENV(174.d0) 13:03:59:112
00000689 0.40937367 [372] ProcessGPO: Sysvol access skipped because GPO is not getting applied.
00000690 0.40941381 [372]
00000691 0.41047040 [372] USERENV(174.d0) 13:03:59:112
00000692 0.41051379 [372] ProcessGPO: Found common name of: <D3C2DEF4>
00000693 0.41055381 [372]
00000694 0.41160327 [372] USERENV(174.d0) 13:03:59:112
00000695 0.41164735 [372] ProcessGPO: Found display name of: <ScreenSaver>
00000696 0.41168654 [372]
00000697 0.41275132 [372] USERENV(174.d0) 13:03:59:112
00000698 0.41281939 [372] ProcessGPO: Found user version of: GPC is 3, GPT is 65535
00000699 0.41286021 [372]
00000700 0.41392154 [372] USERENV(174.d0) 13:03:59:127
00000701 0.41396454 [372] ProcessGPO: Found flags of: 0
00000702 0.41400364 [372]
00000703 0.41509289 [372] USERENV(174.d0) 13:03:59:127
00000704 0.41513702 [372] ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}]
00000705 0.41517675 [372]
00000706 0.41624308 [372] USERENV(174.d0) 13:03:59:127
00000707 0.41628572 [372] ProcessGPO: ==============================
00000708 0.41632524 [372]
00000709 0.41738790 [372] USERENV(174.d0) 13:03:59:127
00000710 0.41743082 [372] ProcessGPO: ==============================
00000711 0.41747060 [372]
00000712 0.41871011 [372] USERENV(174.d0) 13:03:59:127
00000713 0.41875401 [372] ProcessGPO: Searching <CN>
00000714 0.41879341 [372]
00000715 0.41986459 [372] USERENV(174.d0) 13:03:59:127
00000716 0.41990778 [372] ProcessGPO: User does not have access to the GPO and so will not be applied.
00000717 0.41994816 [372]
00000718 0.42101762 [372] USERENV(174.d0) 13:03:59:127
00000719 0.42106110 [372] ProcessGPO: Found functionality version of: 2
00000720 0.42110085 [372]
00000721 0.42216504 [372] USERENV(174.d0) 13:03:59:127
00000722 0.42220926 [372] ProcessGPO: Found file system path of: <Corp>
00000723 0.42225221 [372]
00000724 0.42331699 [372] USERENV(174.d0) 13:03:59:127
00000725 0.42336065 [372] ProcessGPO: Sysvol access skipped because GPO is not getting applied.
00000726 0.42340043 [372]
00000727 0.42446354 [372] USERENV(174.d0) 13:03:59:127
00000728 0.42450714 [372] ProcessGPO: Found common name of: <2098B5A8>
00000729 0.42454737 [372]
00000730 0.42561010 [372] USERENV(174.d0) 13:03:59:127
00000731 0.42565337 [372] ProcessGPO: Found display name of: <Laptop>
00000732 0.42569259 [372]
00000733 0.42675412 [372] USERENV(174.d0) 13:03:59:127
00000734 0.42679560 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 65535
00000735 0.42683494 [372]
00000736 0.42787606 [372] USERENV(174.d0) 13:03:59:127
00000737 0.42791936 [372] ProcessGPO: Found flags of: 0
00000738 0.42795873 [372]
00000739 0.42904440 [372] USERENV(174.d0) 13:03:59:143
00000740 0.42908758 [372] ProcessGPO: No client-side extensions for this object.
00000741 0.42912692 [372]
00000742 0.43024078 [372] USERENV(174.d0) 13:03:59:143
00000743 0.43028334 [372] ProcessGPO: ==============================
00000744 0.43032295 [372]
00000745 0.43137679 [372] USERENV(174.d0) 13:03:59:143
00000746 0.43141931 [372] ProcessGPO: ==============================
00000747 0.43146011 [372]
00000748 0.43252265 [372] USERENV(174.d0) 13:03:59:143
00000749 0.43256578 [372] ProcessGPO: Searching <CN>
00000750 0.43260524 [372]
00000751 0.43368596 [372] USERENV(174.d0) 13:03:59:143
00000752 0.43373007 [372] ProcessGPO: User does not have access to the GPO and so will not be applied.
00000753 0.43376964 [372]
00000754 0.43483344 [372] USERENV(174.d0) 13:03:59:143
00000755 0.43487695 [372] ProcessGPO: Found functionality version of: 2
00000756 0.43491668 [372]
00000757 0.43596369 [372] USERENV(174.d0) 13:03:59:143
00000758 0.43600821 [372] ProcessGPO: Found file system path of: <Corp>
00000759 0.43604761 [372]
00000760 0.43711063 [372] USERENV(174.d0) 13:03:59:143
00000761 0.43715429 [372] ProcessGPO: Sysvol access skipped because GPO is not getting applied.
00000762 0.43719390 [372]
00000763 0.43830442 [372] USERENV(174.d0) 13:03:59:143
00000764 0.43834820 [372] ProcessGPO: Found common name of: <68DF9853>
00000765 0.43839118 [372]
00000766 0.43944412 [372] USERENV(174.d0) 13:03:59:143
00000767 0.43948844 [372] ProcessGPO: Found display name of: <Help>
00000768 0.43952811 [372]
00000769 0.44059357 [372] USERENV(174.d0) 13:03:59:143
00000770 0.44063756 [372] ProcessGPO: Found user version of: GPC is 32, GPT is 65535
00000771 0.44067702 [372]
00000772 0.44173887 [372] USERENV(174.d0) 13:03:59:143
00000773 0.44178176 [372] ProcessGPO: Found flags of: 0
00000774 0.44182119 [372]
00000775 0.44288552 [372] USERENV(174.d0) 13:03:59:143
00000776 0.44292957 [372] ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}]
00000777 0.44296947 [372]
00000778 0.44401899 [372] USERENV(174.d0) 13:03:59:143
00000779 0.44406536 [372] ProcessGPO: ==============================
00000780 0.44410464 [372]
00000781 0.44516036 [372] USERENV(174.d0) 13:03:59:159
00000782 0.44520330 [372] ProcessGPO: ==============================
00000783 0.44524345 [372]
00000784 0.44631168 [372] USERENV(174.d0) 13:03:59:159
00000785 0.44635564 [372] ProcessGPO: Searching <CN>
00000786 0.44639522 [372]
00000787 0.44746912 [372] USERENV(174.d0) 13:03:59:159
00000788 0.44751322 [372] ProcessGPO: User has access to this GPO.
00000789 0.44755289 [372]
00000790 0.44861221 [372] USERENV(174.d0) 13:03:59:159
00000791 0.44865513 [372] ProcessGPO: GPO passes the filter check.
00000792 0.44869444 [372]
00000793 0.44977105 [372] USERENV(174.d0) 13:03:59:159
00000794 0.44982308 [372] ProcessGPO: Found functionality version of: 2
00000795 0.44986272 [372]
00000796 0.45092335 [372] USERENV(174.d0) 13:03:59:159
00000797 0.45096770 [372] ProcessGPO: Found file system path of: <Corp>
00000798 0.45100743 [372]
00000799 0.46104625 [372] USERENV(174.d0) 13:03:59:174
00000800 0.46109003 [372] ProcessGPO: Found common name of: <31B2F340>
00000801 0.46112946 [372]
00000802 0.46221143 [372] USERENV(174.d0) 13:03:59:174
00000803 0.46225458 [372] ProcessGPO: Found display name of: <Default>
00000804 0.46229419 [372]
00000805 0.46336830 [372] USERENV(174.d0) 13:03:59:174
00000806 0.46341252 [372] ProcessGPO: Found user version of: GPC is 1, GPT is 1
00000807 0.46345180 [372]
00000808 0.46450600 [372] USERENV(174.d0) 13:03:59:174
00000809 0.46454969 [372] ProcessGPO: Found flags of: 0
00000810 0.46458939 [372]
00000811 0.46565604 [372] USERENV(174.d0) 13:03:59:174
00000812 0.46570101 [372] ProcessGPO: Found extensions: [{3060E8D0-7020-11D2-842D-00C04FA372D4}{3060E8CE-7020-11D2-842D-00C04FA372D4}]
00000813 0.46574056 [372]
00000814 0.46680441 [372] USERENV(174.d0) 13:03:59:174
00000815 0.46684718 [372] ProcessGPO: ==============================
00000816 0.46688610 [372]
00000817 0.46794268 [372] USERENV(174.d0) 13:03:59:174
00000818 0.46798730 [372] EvalList: Object <cn> cannot be accessed
00000819 0.46802646 [372]
00000820 0.46906883 [372] USERENV(174.d0) 13:03:59:174
00000821 0.46911266 [372] EvalList: Object <cn> cannot be accessed
00000822 0.46915218 [372]
00000823 0.47025475 [372] USERENV(174.d0) 13:03:59:174
00000824 0.47029731 [372] ProcessGPO: ==============================
00000825 0.47033659 [372]
00000826 0.47139579 [372] USERENV(174.d0) 13:03:59:174
00000827 0.47144032 [372] ProcessGPO: Searching <CN>
00000828 0.47147864 [372]
00000829 0.47256839 [372] USERENV(174.d0) 13:03:59:174
00000830 0.47261116 [372] ProcessGPO: User has access to this GPO.
00000831 0.47265613 [372]
00000832 0.47371793 [372] USERENV(174.d0) 13:03:59:174
00000833 0.47376239 [372] ProcessGPO: GPO passes the filter check.
00000834 0.47380221 [372]
00000835 0.47486803 [372] USERENV(174.d0) 13:03:59:174
00000836 0.47491604 [372] ProcessGPO: Found functionality version of: 2
00000837 0.47495574 [372]
00000838 0.47603527 [372] USERENV(174.d0) 13:03:59:190
00000839 0.47607931 [372] ProcessGPO: Found file system path of: <Corp>
00000840 0.47611862 [372]
00000841 0.49932781 [372] USERENV(174.d0) 13:03:59:205
00000842 0.49937153 [372] ProcessGPO: Found common name of: <2D8F2332>
00000843 0.49941126 [372]
00000844 0.50048470 [372] USERENV(174.d0) 13:03:59:205
00000845 0.50052756 [372] ProcessGPO: Found display name of: <Policy>
00000846 0.50056720 [372]
00000847 0.50163162 [372] USERENV(174.d0) 13:03:59:205
00000848 0.50167537 [372] ProcessGPO: Found user version of: GPC is 0, GPT is 0
00000849 0.50171489 [372]
00000850 0.50276667 [372] USERENV(174.d0) 13:03:59:205
00000851 0.50281036 [372] ProcessGPO: Found flags of: 0
00000852 0.50284928 [372]
00000853 0.50391150 [372] USERENV(174.d0) 13:03:59:205
00000854 0.50395459 [372] ProcessGPO: No client-side extensions for this object.
00000855 0.50399405 [372]
00000856 0.50505191 [372] USERENV(174.d0) 13:03:59:205
00000857 0.50509596 [372] ProcessGPO: GPO Policy Updates doesn't contain any data since the version number is 0. It will be skipped.
00000858 0.50513512 [372]
00000859 0.50619447 [372] USERENV(174.d0) 13:03:59:205
00000860 0.50623757 [372] ProcessGPO: ==============================
00000861 0.50627768 [372]
00000862 0.50760812 [372] USERENV(174.d0) 13:03:59:221
00000863 0.50765294 [372] GetGPOInfo: GPO Local Group Policy doesn't contain any data since the version number is 0. It will be skipped.
00000864 0.50769269 [372]
00000865 0.50913012 [372] USERENV(174.d0) 13:03:59:221
00000866 0.50917488 [372] GetGPOInfo: Leaving with 1
00000867 0.50921482 [372]
00000868 0.51028186 [372] USERENV(174.d0) 13:03:59:221
00000869 0.51032460 [372] GetGPOInfo: ********************************
00000870 0.51036429 [372]
00000871 0.51147985 [372] USERENV(174.d0) 13:03:59:221
00000872 0.51152849 [372] ReadMembershipList: Old count 62 is different from current count 61
00000873 0.51157111 [372]
00000874 0.51428574 [372] USERENV(174.d0) 13:03:59:221
00000875 0.51433349 [372] ReadMembershipList: Old count 62 is different from current count 61
00000876 0.51437610 [372]
00000877 0.53641152 [372] USERENV(174.d0) 13:03:59:237
00000878 0.53645569 [372] ProcessGPOs: Logging Data for Target <qcadmin>.
00000879 0.53649759 [372]
00000880 0.53915399 [372] USERENV(174.d0) 13:03:59:252
00000881 0.53920215 [372] GetWbemServices: CoCreateInstance succeeded
00000882 0.53924459 [372]
00000883 0.54823208 [372] USERENV(174.d0) 13:03:59:252
00000884 0.54827505 [372] ConnectToNameSpace: ConnectServer returned 0x0
00000885 0.54831713 [372]
00000886 0.55057591 [372] USERENV(174.d0) 13:03:59:252
00000887 0.55062973 [372] CSessionLogger::Log: logging new security grps
00000888 0.55067301 [372]
00000889 0.55294681 [372] USERENV(174.d0) 13:03:59:252
00000890 0.55299187 [372] ProcessGPOs: Logged Rsop Session successfully.
00000891 0.55303371 [372]
00000892 0.55413407 [372] USERENV(174.d0) 13:03:59:268
00000893 0.55418116 [372] ProcessGPOs: OpenThreadToken failed with error 1008, assuming thread is not impersonating
00000894 0.55422366 [372]
00000895 0.55530387 [372] USERENV(174.d0) 13:03:59:268
00000896 0.55535644 [372] ProcessGPOs: -----------------------
00000897 0.55539900 [372]
00000898 0.55643392 [372] USERENV(174.d0) 13:03:59:268
00000899 0.55648005 [372] ProcessGPOs: Processing extension Registry
00000900 0.55652243 [372]
00000901 0.55757344 [372] USERENV(174.d0) 13:03:59:268
00000902 0.55762035 [372] ReadStatus: Read Extension's Previous status successfully.
00000903 0.55766284 [372]
00000904 0.55877334 [372] USERENV(174.d0) 13:03:59:268
00000905 0.55881977 [372] CompareGPOLists: The lists are the same.
00000906 0.55886257 [372]
00000907 0.55991191 [372] USERENV(174.d0) 13:03:59:268
00000908 0.55995852 [372] ProcessGPOList: Entering for extension Registry
00000909 0.56000078 [372]
00000910 0.56102622 [372] USERENV(174.d0) 13:03:59:268
00000911 0.56107289 [372] UserPolicyCallback: Setting status UI to Applying Registry policy...
00000912 0.56111532 [372]
00000913 0.56914455 [372] USERENV(174.d0) 13:03:59:284
00000914 0.56918859 [372] LogExtSessionStatus: Successfully logged Extension Session data
00000915 0.56923068 [372]
00000916 0.57029021 [372] USERENV(174.d0) 13:03:59:284
00000917 0.57033730 [372] EnterCriticalPolicySectionEx: Entering with timeout 60000 and flags 0x2
00000918 0.57037950 [372]
00000919 0.57142240 [372] USERENV(174.d0) 13:03:59:284
00000920 0.57146925 [372] EnterCriticalPolicySectionEx: User critical section has been claimed. Handle = 0x908
00000921 0.57151103 [372]
00000922 0.57254320 [372] USERENV(174.d0) 13:03:59:284
00000923 0.57258904 [372] EnterCriticalPolicySectionEx: Leaving successfully.
00000924 0.57263142 [372]
00000925 0.57369339 [372] USERENV(174.d0) 13:03:59:284
00000926 0.57374007 [372] ResetPolicies: Entering.
00000927 0.57378268 [372]
00000928 0.57484871 [372] USERENV(174.d0) 13:03:59:284
00000929 0.57490140 [372] SetRegPermissionsOnPoliciesKey: Resetting permission on the policy key
00000930 0.57494408 [372]
00000931 0.57601428 [372] USERENV(174.d0) 13:03:59:284
00000932 0.57606041 [372] SetRegPermissionsOnPoliciesKey: Resetting permission on the policy key
00000933 0.57610261 [372]
00000934 0.57718581 [372] USERENV(174.d0) 13:03:59:284
00000935 0.57723254 [372] ParseRegistryFile: Entering with <C>.
00000936 0.57727504 [372]
00000937 0.57868677 [372] USERENV(174.d0) 13:03:59:284
00000938 0.57873541 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Display Types\TimetoShowRPCMessageHighBandwidth
00000939 0.57878470 [372]
00000940 0.57992172 [372] USERENV(174.d0) 13:03:59:284
00000941 0.57996857 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Display Types\TimetoShowRPCMessageLowBandwidth
00000942 0.58001196 [372]
00000943 0.58112478 [372] USERENV(174.d0) 13:03:59:284
00000944 0.58117247 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Display Types\TimeToUpdateTrayIconHighBandwidth
00000945 0.58121485 [372]
00000946 0.58239484 [372] USERENV(174.d0) 13:03:59:284
00000947 0.58244205 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Display Types\TimeToUpdateTrayIconLowBandwidth
00000948 0.58248419 [372]
00000949 0.58372539 [372] USERENV(174.d0) 13:03:59:284
00000950 0.58377421 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Options\Calendar\Internet Free/Busy\Lock FB Range
00000951 0.58381617 [372]
00000952 0.58502781 [372] USERENV(174.d0) 13:03:59:299
00000953 0.58507496 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Preferences\FBPublishRange
00000954 0.58511752 [372]
00000955 0.58632302 [372] USERENV(174.d0) 13:03:59:299
00000956 0.58637071 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Office\11.0\Outlook\Preferences\FBUpdateSecs
00000957 0.58641326 [372]
00000958 0.58763236 [372] USERENV(174.d0) 13:03:59:299
00000959 0.58768004 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaveActive
00000960 0.58772266 [372]
00000961 0.58884859 [372] USERENV(174.d0) 13:03:59:299
00000962 0.58889580 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaveTimeOut
00000963 0.58893812 [372]
00000964 0.59005159 [372] USERENV(174.d0) 13:03:59:299
00000965 0.59009892 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaverIsSecure
00000966 0.59014148 [372]
00000967 0.59131712 [372] USERENV(174.d0) 13:03:59:299
00000968 0.59136468 [372] DeleteRegistryValue: Deleted Software\Policies\Microsoft\Windows\Control Panel\Desktop\SCRNSAVE.EXE
00000969 0.59140724 [372]
00000970 0.59246510 [372] USERENV(174.d0) 13:03:59:299
00000971 0.59251022 [372] ParseRegistryFile: Leaving.
00000972 0.59255230 [372]
00000973 0.59444278 [372] USERENV(174.d0) 13:03:59:299
00000974 0.59448904 [372] ResetPolicies: resetting shell autorun value for server.
00000975 0.59453517 [372]
00000976 0.59559280 [372] USERENV(174.d0) 13:03:59:299
00000977 0.59563816 [372] ResetPolicies: Leaving.
00000978 0.59568048 [372]
00000979 0.59705532 [372] USERENV(174.d0) 13:03:59:299
00000980 0.59710270 [372] ParseRegistryFile: Entering with <Corp>.
00000981 0.59714526 [372]
00000982 0.60065264 [372] USERENV(174.d0) 13:03:59:315
00000983 0.60069865 [372] SetRegistryValue: TimetoShowRPCMessageHighBandwidth => 60000 [OK]
00000984 0.60074794 [372]
00000985 0.60199344 [372] USERENV(174.d0) 13:03:59:315
00000986 0.60204154 [372] SetRegistryValue: TimetoShowRPCMessageLowBandwidth => 120000 [OK]
00000987 0.60208446 [372]
00000988 0.60332614 [372] USERENV(174.d0) 13:03:59:315
00000989 0.60337335 [372] SetRegistryValue: TimeToUpdateTrayIconHighBandwidth => 15000 [OK]
00000990 0.60341614 [372]
00000991 0.60466450 [372] USERENV(174.d0) 13:03:59:315
00000992 0.60471320 [372] SetRegistryValue: TimeToUpdateTrayIconLowBandwidth => 30000 [OK]
00000993 0.60475641 [372]
00000994 0.60605770 [372] USERENV(174.d0) 13:03:59:315
00000995 0.60610455 [372] SetRegistryValue: Lock FB Range => 0 [OK]
00000996 0.60615385 [372]
00000997 0.60737467 [372] USERENV(174.d0) 13:03:59:315
00000998 0.60742241 [372] SetRegistryValue: FBPublishRange => 8 [OK]
00000999 0.60747099 [372]
00001000 0.60870159 [372] USERENV(174.d0) 13:03:59:315
00001001 0.60874975 [372] SetRegistryValue: FBUpdateSecs => 900 [OK]
00001002 0.60879230 [372]
00001003 0.60986698 [372] USERENV(174.d0) 13:03:59:315
00001004 0.60991484 [372] ParseRegistryFile: Leaving.
00001005 0.60995781 [372]
00001006 0.61851329 [372] USERENV(174.d0) 13:03:59:330
00001007 0.61856180 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001008 0.61867177 [372]
00001009 0.62153977 [372] USERENV(174.d0) 13:03:59:330
00001010 0.62158728 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001011 0.62162954 [372]
00001012 0.62479997 [372] USERENV(174.d0) 13:03:59:330
00001013 0.62485081 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001014 0.62489361 [372]
00001015 0.62789106 [372] USERENV(174.d0) 13:03:59:330
00001016 0.62794131 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001017 0.62798059 [372]
00001018 0.63116550 [372] USERENV(174.d0) 13:03:59:330
00001019 0.63121301 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001020 0.63125515 [372]
00001021 0.63425308 [372] USERENV(174.d0) 13:03:59:346
00001022 0.63430011 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001023 0.63434184 [372]
00001024 0.63546920 [372] USERENV(174.d0) 13:03:59:346
00001025 0.63551676 [372] ParseRegistryFile: Entering with <Corp>.
00001026 0.63555896 [372]
00001027 0.63870329 [372] USERENV(174.d0) 13:03:59:346
00001028 0.63875020 [372] SetRegistryValue: ScreenSaveActive => 1 [OK]
00001029 0.63879424 [372]
00001030 0.63998532 [372] USERENV(174.d0) 13:03:59:346
00001031 0.64003247 [372] SetRegistryValue: ScreenSaveTimeOut => 600 [OK]
00001032 0.64007527 [372]
00001033 0.64126778 [372] USERENV(174.d0) 13:03:59:346
00001034 0.64131415 [372] SetRegistryValue: ScreenSaverIsSecure => 1 [OK]
00001035 0.64136231 [372]
00001036 0.64255983 [372] USERENV(174.d0) 13:03:59:346
00001037 0.64260674 [372] SetRegistryValue: SCRNSAVE.EXE => %SYSTEMROOT%\system32\logon.scr [OK]
00001038 0.64265585 [372]
00001039 0.64375108 [372] USERENV(174.d0) 13:03:59:346
00001040 0.64379668 [372] ParseRegistryFile: Leaving.
00001041 0.64383948 [372]
00001042 0.65228546 [372] USERENV(174.d0) 13:03:59:362
00001043 0.65233272 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001044 0.65237498 [372]
00001045 0.65534884 [372] USERENV(174.d0) 13:03:59:362
00001046 0.65539622 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001047 0.65544015 [372]
00001048 0.65885758 [372] USERENV(174.d0) 13:03:59:362
00001049 0.65890610 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001050 0.65894818 [372]
00001051 0.66201776 [372] USERENV(174.d0) 13:03:59:362
00001052 0.66206527 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001053 0.66210783 [372]
00001054 0.66504920 [372] USERENV(174.d0) 13:03:59:377
00001055 0.66509658 [372] AllocAdmFileInfo: Adding File name <Corp> to the Adm list.
00001056 0.66513932 [372]
00001057 0.69984251 [372] USERENV(174.d0) 13:03:59:409
00001058 0.69988710 [372] LogRegistry RsopData: Successfully logged registry Rsop data
00001059 0.69992882 [372]
00001060 0.71106941 [372] USERENV(174.d0) 13:03:59:424
00001061 0.71111679 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\sysvol\Corp.company.net\Policies\{0F9971EC-6E33-43BE-92E4-21A621B5AEF2}\Adm\wuau.adm
00001062 0.71116126 [372]
00001063 0.71287841 [372] USERENV(174.d0) 13:03:59:424
00001064 0.71292394 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\sysvol\Corp.company.net\Policies\{0F9971EC-6E33-43BE-92E4-21A621B5AEF2}\Adm\wmplayer.adm
00001065 0.71296525 [372]
00001066 0.71469641 [372] USERENV(174.d0) 13:03:59:424
00001067 0.71474129 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\sysvol\Corp.company.net\Policies\{0F9971EC-6E33-43BE-92E4-21A621B5AEF2}\Adm\system.adm
00001068 0.71479338 [372]
00001069 0.71652395 [372] USERENV(174.d0) 13:03:59:424
00001070 0.71656901 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\sysvol\Corp.company.net\Policies\{0F9971EC-6E33-43BE-92E4-21A621B5AEF2}\Adm\inetres.adm
00001071 0.71661103 [372]
00001072 0.71863669 [372] USERENV(174.d0) 13:03:59:424
00001073 0.71868539 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\sysvol\Corp.company.net\Policies\{0F9971EC-6E33-43BE-92E4-21A621B5AEF2}\Adm\conf.adm
00001074 0.72031647 [372]
00001075 0.72038442 [372] USERENV(174.d0) 13:03:59:424
00001076 0.72043830 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\wuau.adm
00001077 0.72207165 [372]
00001078 0.72213238 [372] USERENV(174.d0) 13:03:59:424
00001079 0.72218406 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\wmplayer.adm
00001080 0.72320837 [372]
00001081 0.72402477 [372] USERENV(174.d0) 13:03:59:424
00001082 0.72407812 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\system.adm
00001083 0.72579414 [372]
00001084 0.72585541 [372] USERENV(174.d0) 13:03:59:440
00001085 0.72590744 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\OUTLK11.ADM
00001086 0.72694957 [372]
00001087 0.72768742 [372] USERENV(174.d0) 13:03:59:440
00001088 0.72773260 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\inetres.adm
00001089 0.72777957 [372]
00001090 0.72950780 [372] USERENV(174.d0) 13:03:59:440
00001091 0.72955352 [372] CAdmFileLogger::Log: Logging \\Corp.company.net\SysVol\Corp.company.net\Policies\{74692FFF-D0A0-43D8-895F-E5B5A73E7D98}\Adm\conf.adm
00001092 0.72959507 [372]
00001093 0.73132449 [372] USERENV(174.d0) 13:03:59:440
00001094 0.73136747 [372] LogAdmRsopData: Successfully logged Adm data
00001095 0.73140949 [372]
00001096 0.73346323 [372] USERENV(174.d0) 13:03:59:440
00001097 0.73350948 [372] LeaveCriticalPolicySection: Critical section 0x908 has been released.
00001098 0.73402536 [372]
00001099 0.73456305 [372] USERENV(174.d0) 13:03:59:440
00001100 0.73460972 [372] ProcessGPOList: Extension Registry was able to log data. RsopStatus = 0x0, dwRet = 0, Clearing the dirty bit
00001101 0.73465186 [372]
00001102 0.73748118 [372] USERENV(174.d0) 13:03:59:440
00001103 0.73752457 [372] ProcessGPOs: -----------------------
00001104 0.73756790 [372]
00001105 0.73860830 [372] USERENV(174.d0) 13:03:59:440
00001106 0.73865300 [372] ProcessGPOs: -----------------------
00001107 0.73869520 [372]
00001108 0.73975909 [372] USERENV(174.d0) 13:03:59:440
00001109 0.73980516 [372] ProcessGPOs: Processing extension Wireless Group Policy
00001110 0.73984778 [372]
00001111 0.74095994 [372] USERENV(174.d0) 13:03:59:455
00001112 0.74100447 [372] CompareGPOLists: The lists are the same.
00001113 0.74104601 [372]
00001114 0.74209428 [372] USERENV(174.d0) 13:03:59:455
00001115 0.74214232 [372] ProcessGPOs: Extension Wireless Group Policy skipped with flags 0x6.
00001116 0.74218673 [372]
00001117 0.74323213 [372] USERENV(174.d0) 13:03:59:455
00001118 0.74328250 [372] ProcessGPOs: -----------------------
00001119 0.74332458 [372]
00001120 0.74437821 [372] USERENV(174.d0) 13:03:59:455
00001121 0.74442405 [372] ProcessGPOs: Processing extension Folder Redirection
00001122 0.74446619 [372]
00001123 0.74553341 [372] USERENV(174.d0) 13:03:59:455
00001124 0.74557906 [372] CompareGPOLists: The lists are the same.
00001125 0.74562138 [372]
00001126 0.74665582 [372] USERENV(174.d0) 13:03:59:455
00001127 0.74670118 [372] CompareGPOLists: The lists are the same.
00001128 0.74674308 [372]
00001129 0.74779975 [372] USERENV(174.d0) 13:03:59:455
00001130 0.74784559 [372] ProcessGPOs: Extension Folder Redirection skipped because both deleted and changed GPO lists are empty.
00001131 0.74788767 [372]
00001132 0.74957967 [372] USERENV(174.d0) 13:03:59:455
00001133 0.74962652 [372] CExtSessionLogger::Delete: Failed to DeleteInstan
Tue Oct 25, 2011 2:26 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
I do not believe the post got everything. Is there a way to upload a zip file of the two log files?
Tue Oct 25, 2011 2:29 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 6485

Post Reply with quote
You can use 'add image to post' link to attach a file to the post, or you can use several posts to break the long message in pieces.

The output is very helpful, if only I can see the ending messages
Tue Oct 25, 2011 9:40 pm View user's profile Send private message
miande



Joined: 21 Oct 2011
Posts: 21
Country: United States

Post Reply with quote
The remaining DebugView log:

00001133 0.74962652 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001134 0.74966878 [372]
00001135 0.75072086 [372] USERENV(174.d0) 13:03:59:455
00001136 0.75076586 [372] ProcessGPOs: -----------------------
00001137 0.75080794 [372]
00001138 0.75185490 [372] USERENV(174.d0) 13:03:59:455
00001139 0.75190073 [372] ProcessGPOs: Processing extension Microsoft Disk Quota
00001140 0.75194329 [372]
00001141 0.75300205 [372] USERENV(174.d0) 13:03:59:455
00001142 0.75304770 [372] CompareGPOLists: The lists are the same.
00001143 0.75308990 [372]
00001144 0.75413144 [372] USERENV(174.d0) 13:03:59:455
00001145 0.75417823 [372] ProcessGPOs: Extension Microsoft Disk Quota skipped with flags 0x6.
00001146 0.75422031 [372]
00001147 0.75525284 [372] USERENV(174.d0) 13:03:59:455
00001148 0.75529891 [372] ProcessGPOs: -----------------------
00001149 0.75534040 [372]
00001150 0.75637287 [372] USERENV(174.d0) 13:03:59:455
00001151 0.75641859 [372] ProcessGPOs: Processing extension QoS Packet Scheduler
00001152 0.75648010 [372]
00001153 0.75757420 [372] USERENV(174.d0) 13:03:59:471
00001154 0.75762063 [372] CompareGPOLists: The lists are the same.
00001155 0.75766319 [372]
00001156 0.75869495 [372] USERENV(174.d0) 13:03:59:471
00001157 0.75874162 [372] ProcessGPOs: Extension QoS Packet Scheduler skipped with flags 0x6.
00001158 0.75878394 [372]
00001159 0.75982016 [372] USERENV(174.d0) 13:03:59:471
00001160 0.75986505 [372] ProcessGPOs: -----------------------
00001161 0.75990719 [372]
00001162 0.76094079 [372] USERENV(174.d0) 13:03:59:471
00001163 0.76098680 [372] ProcessGPOs: Processing extension Scripts
00001164 0.76102889 [372]
00001165 0.76207381 [372] USERENV(174.d0) 13:03:59:471
00001166 0.76211953 [372] CompareGPOLists: The lists are the same.
00001167 0.76216322 [372]
00001168 0.76319379 [372] USERENV(174.d0) 13:03:59:471
00001169 0.76324004 [372] ProcessGPOs: Extension Scripts skipped because both deleted and changed GPO lists are empty.
00001170 0.76328272 [372]
00001171 0.76496023 [372] USERENV(174.d0) 13:03:59:471
00001172 0.76500762 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001173 0.76505029 [372]
00001174 0.76609695 [372] USERENV(174.d0) 13:03:59:471
00001175 0.76614171 [372] ProcessGPOs: -----------------------
00001176 0.76618403 [372]
00001177 0.76720244 [372] USERENV(174.d0) 13:03:59:471
00001178 0.76725376 [372] ProcessGPOs: Processing extension Internet Explorer Zonemapping
00001179 0.76729655 [372]
00001180 0.76834291 [372] USERENV(174.d0) 13:03:59:471
00001181 0.76838893 [372] CompareGPOLists: The lists are the same.
00001182 0.76843143 [372]
00001183 0.76946604 [372] USERENV(174.d0) 13:03:59:471
00001184 0.76951277 [372] ProcessGPOs: Extension Internet Explorer Zonemapping skipped because both deleted and changed GPO lists are empty.
00001185 0.76955485 [372]
00001186 0.77118331 [372] USERENV(174.d0) 13:03:59:471
00001187 0.77123028 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001188 0.77127397 [372]
00001189 0.80158573 [372] USERENV(174.d0) 13:03:59:487
00001190 0.80178422 [372] ProcessGPOs: -----------------------
00001191 0.80211186 [372]
00001192 0.80282348 [372] USERENV(174.d0) 13:03:59:502
00001193 0.80286866 [372] ProcessGPOs: Processing extension Internet Explorer User Accelerators
00001194 0.80291069 [372]
00001195 0.80397993 [372] USERENV(174.d0) 13:03:59:518
00001196 0.80402577 [372] CompareGPOLists: The lists are the same.
00001197 0.80406934 [372]
00001198 0.80511606 [372] USERENV(174.d0) 13:03:59:518
00001199 0.80516338 [372] ProcessGPOs: Extension Internet Explorer User Accelerators skipped because both deleted and changed GPO lists are empty.
00001200 0.80520552 [372]
00001201 0.80693787 [372] USERENV(174.d0) 13:03:59:518
00001202 0.80698484 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001203 0.80702800 [372]
00001204 0.80806583 [372] USERENV(174.d0) 13:03:59:518
00001205 0.80811083 [372] ProcessGPOs: -----------------------
00001206 0.80815285 [372]
00001207 0.80918604 [372] USERENV(174.d0) 13:03:59:518
00001208 0.80923158 [372] ProcessGPOs: Processing extension Security
00001209 0.80927420 [372]
00001210 0.81035191 [372] USERENV(174.d0) 13:03:59:518
00001211 0.81039727 [372] CompareGPOLists: The lists are the same.
00001212 0.81043959 [372]
00001213 0.81148571 [372] USERENV(174.d0) 13:03:59:518
00001214 0.81153262 [372] ProcessGPOs: Extension Security skipped with flags 0x6.
00001215 0.81157517 [372]
00001216 0.81262332 [372] USERENV(174.d0) 13:03:59:518
00001217 0.81266803 [372] ProcessGPOs: -----------------------
00001218 0.81271011 [372]
00001219 0.81374151 [372] USERENV(174.d0) 13:03:59:518
00001220 0.81379169 [372] ProcessGPOs: Processing extension Internet Explorer Branding
00001221 0.81383491 [372]
00001222 0.81491011 [372] USERENV(174.d0) 13:03:59:518
00001223 0.81495571 [372] CompareGPOLists: The lists are the same.
00001224 0.81499815 [372]
00001225 0.81602621 [372] USERENV(174.d0) 13:03:59:518
00001226 0.81607276 [372] ProcessGPOs: Extension Internet Explorer Branding skipped because both deleted and changed GPO lists are empty.
00001227 0.81611508 [372]
00001228 0.81773710 [372] USERENV(174.d0) 13:03:59:518
00001229 0.81778014 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001230 0.81782013 [372]
00001231 0.81877613 [372] USERENV(174.d0) 13:03:59:518
00001232 0.81881845 [372] ProcessGPOs: -----------------------
00001233 0.81885713 [372]
00001234 0.81984860 [372] USERENV(174.d0) 13:03:59:533
00001235 0.81989211 [372] ProcessGPOs: Processing extension EFS recovery
00001236 0.81993371 [372]
00001237 0.82098514 [372] USERENV(174.d0) 13:03:59:533
00001238 0.82103056 [372] CompareGPOLists: The lists are the same.
00001239 0.82107288 [372]
00001240 0.82210314 [372] USERENV(174.d0) 13:03:59:533
00001241 0.82215011 [372] ProcessGPOs: Extension EFS recovery skipped with flags 0x6.
00001242 0.82219255 [372]
00001243 0.82322502 [372] USERENV(174.d0) 13:03:59:533
00001244 0.82327014 [372] ProcessGPOs: -----------------------
00001245 0.82331222 [372]
00001246 0.82432461 [372] USERENV(174.d0) 13:03:59:533
00001247 0.82437038 [372] ProcessGPOs: Processing extension Microsoft Offline Files
00001248 0.82441235 [372]
00001249 0.82546425 [372] USERENV(174.d0) 13:03:59:533
00001250 0.82550967 [372] CompareGPOLists: The lists are the same.
00001251 0.82555223 [372]
00001252 0.82660609 [372] USERENV(174.d0) 13:03:59:533
00001253 0.82665241 [372] ProcessGPOs: Extension Microsoft Offline Files skipped with flags 0x6.
00001254 0.82669473 [372]
00001255 0.82771492 [372] USERENV(174.d0) 13:03:59:533
00001256 0.82776535 [372] ProcessGPOs: -----------------------
00001257 0.82780695 [372]
00001258 0.82883978 [372] USERENV(174.d0) 13:03:59:533
00001259 0.82888550 [372] ProcessGPOs: Processing extension Software Installation
00001260 0.82892752 [372]
00001261 0.82998401 [372] USERENV(174.d0) 13:03:59:533
00001262 0.83002949 [372] CompareGPOLists: The lists are the same.
00001263 0.83007175 [372]
00001264 0.83110201 [372] USERENV(174.d0) 13:03:59:533
00001265 0.83114731 [372] CompareGPOLists: The lists are the same.
00001266 0.83118927 [372]
00001267 0.83221394 [372] USERENV(174.d0) 13:03:59:533
00001268 0.83226120 [372] ProcessGPOs: Extension Software Installation skipped because both deleted and changed GPO lists are empty.
00001269 0.83230335 [372]
00001270 0.83395046 [372] USERENV(174.d0) 13:03:59:533
00001271 0.83399791 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001272 0.83404016 [372]
00001273 0.83511502 [372] USERENV(174.d0) 13:03:59:549
00001274 0.83516032 [372] ProcessGPOs: -----------------------
00001275 0.83520275 [372]
00001276 0.83622295 [372] USERENV(174.d0) 13:03:59:549
00001277 0.83626950 [372] ProcessGPOs: Processing extension Internet Explorer Machine Accelerators
00001278 0.83631217 [372]
00001279 0.83738691 [372] USERENV(174.d0) 13:03:59:549
00001280 0.83743238 [372] CompareGPOLists: The lists are the same.
00001281 0.83747452 [372]
00001282 0.83852071 [372] USERENV(174.d0) 13:03:59:549
00001283 0.83856797 [372] ProcessGPOs: Extension Internet Explorer Machine Accelerators skipped because both deleted and changed GPO lists are empty.
00001284 0.83861142 [372]
00001285 0.84026361 [372] USERENV(174.d0) 13:03:59:549
00001286 0.84031087 [372] CExtSessionLogger::Delete: Failed to DeleteInstance with 0x80041002
00001287 0.84035343 [372]
00001288 0.84137857 [372] USERENV(174.d0) 13:03:59:549
00001289 0.84142411 [372] ProcessGPOs: -----------------------
00001290 0.84146637 [372]
00001291 0.84253603 [372] USERENV(174.d0) 13:03:59:549
00001292 0.84258795 [372] ProcessGPOs: Processing extension IP Security
00001293 0.84263080 [372]
00001294 0.84368533 [372] USERENV(174.d0) 13:03:59:549
00001295 0.84373188 [372] CompareGPOLists: The lists are the same.
00001296 0.84377402 [372]
00001297 0.84479600 [372] USERENV(174.d0) 13:03:59:549
00001298 0.84484375 [372] ProcessGPOs: Extension IP Security skipped with flags 0x6.
00001299 0.84488827 [372]
00001300 0.84595281 [372] USERENV(174.d0) 13:03:59:549
00001301 0.84599924 [372] SetFgRefreshInfo: Previous User Fg policy Synchronous, Reason: SKU.
00001302 0.84604204 [372]
00001303 0.84710765 [372] USERENV(174.d0) 13:03:59:549
00001304 0.84712827 [372] SetFgRefreshInfo: Next User Fg policy Synchronous, Reason: SKU.
00001305 0.84727281 [372]
00001306 0.84833658 [372] USERENV(174.d0) 13:03:59:549
00001307 0.84838510 [372] LeaveCriticalPolicySection: Critical section 0x894 has been released.
00001308 0.84842831 [372]
00001309 0.84954983 [372] USERENV(174.d0) 13:03:59:549
00001310 0.84962046 [372] USERENV(174.13c) 13:03:59:549
00001311 0.84965974 [372] ProcessGPOs: User Group Policy has been applied.
00001312 0.84970313 [372] PolicyChangedThread: Calling UpdateUser with 0.
00001313 0.84975094 [372]
00001314 0.84980249 [372]
00001315 0.85079920 [372] USERENV(174.d0) 13:03:59:565
00001316 0.85082036 [372] ProcessGPOs: Leaving with 1.
00001317 0.85087347 [372]
00001318 0.85092527 [372] USERENV(174.13c) 13:03:59:565
00001319 0.85098422 [372] PolicyChangedThread: Broadcast message for 0.
00001320 0.85103911 [372]
00001321 0.85257208 [372] USERENV(174.d0) 13:03:59:565
00001322 0.85261899 [372] USERENV(174.144) 13:03:59:565
00001323 0.85267788 [372] ApplyGroupPolicy: Leaving successfully.
00001324 0.85272336 [372] GPOThread: Next refresh will happen in 115 minutes
00001325 0.85276449 [372]
00001326 0.85280871 [372]
00001327 0.90183002 [544] USERENV(220.234) 13:03:59:612
00001328 0.90188277 [544] LibMain: Process Name: C:\WINDOWS\system32\userinit.exe
00001329 0.90193421 [544]
00001330 0.97111577 [372] SNACNP::NPGetCaps::WNNC_NET_TYPE
00001331 0.97119915 [372] SNACNP::NPGetCaps::WNNC_USER
00001332 0.97128105 [372] SNACNP::NPGetCaps::WNNC_CONNECTION
00001333 0.97136235 [372] SNACNP::NPGetCaps::WNNC_ENUMERATION
00001334 0.97144365 [372] SNACNP::NPGetCaps::WNNC_ADMIN
00001335 0.97152489 [372] SNACNP::NPGetCaps::WNNC_DIALOG
00001336 0.97516048 [372] USERENV(174.178) 13:03:59:674
00001337 0.97525173 [372] IsSyncForegroundPolicyRefresh: Synchronous, Reason: policy set to SYNC
00001338 0.97533470 [372]
00001339 0.98908091 [372] USERENV(174.13c) 13:03:59:690
00001340 0.98913294 [372] PolicyChangedThread: Leaving
00001341 0.98917854 [372]
00001342 0.98978472 [560] USERENV(230.4f0) 13:03:59:690
00001343 0.98983276 [560] LibMain: Process Name: C:\WINDOWS\system32\userinit.exe
00001344 0.98988754 [560]
00001345 0.99642557 [432] USERENV(1b0.1c4) 13:03:59:705
00001346 0.99647731 [432] ImpersonateUser: Failed to impersonate user with 5.
00001347 0.99651951 [432]
00001348 0.99747199 [432] USERENV(1b0.1c4) 13:03:59:705
00001349 0.99752289 [432] GetUserNameAndDomain Failed to impersonate user
00001350 0.99756533 [432]
00001351 0.99897122 [432] USERENV(1b0.1c4) 13:03:59:705
00001352 0.99902683 [432] ImpersonateUser: Failed to impersonate user with 5.
00001353 0.99907047 [432]
00001354 0.99999869 [432] USERENV(1b0.1c4) 13:03:59:705
00001355 1.00004578 [432] GetUserDNSDomainName: Failed to impersonate user
00001356 1.00008941 [432]
00001357 1.00195384 [432] USERENV(1b0.1c4) 13:03:59:705
00001358 1.00199723 [432] ImpersonateUser: Failed to impersonate user with 5.
00001359 1.00215459 [432]
00001360 1.00298107 [432] USERENV(1b0.1c4) 13:03:59:705
00001361 1.00302768 [432] GetUserNameAndDomain Failed to impersonate user
00001362 1.00306904 [432]
00001363 1.00444508 [432] USERENV(1b0.1c4) 13:03:59:705
00001364 1.00449276 [432] ImpersonateUser: Failed to impersonate user with 5.
00001365 1.00453472 [432]
00001366 1.00546503 [432] USERENV(1b0.1c4) 13:03:59:705
00001367 1.00551212 [432] GetUserDNSDomainName: Failed to impersonate user
00001368 1.00555348 [432]
00001369 1.01463103 [432] USERENV(1b0.1c4) 13:03:59:721
00001370 1.01467347 [432] ImpersonateUser: Failed to impersonate user with 5.
00001371 1.01472127 [432]
00001372 1.01574743 [432] USERENV(1b0.1c4) 13:03:59:721
00001373 1.01578987 [432] GetUserNameAndDomain Failed to impersonate user
00001374 1.01582897 [432]
00001375 1.01750004 [432] USERENV(1b0.1c4) 13:03:59:721
00001376 1.01754379 [432] ImpersonateUser: Failed to impersonate user with 5.
00001377 1.01758361 [432]
00001378 1.01861310 [432] USERENV(1b0.1c4) 13:03:59:721
00001379 1.01865590 [432] GetUserDNSDomainName: Failed to impersonate user
00001380 1.01869512 [432]
00001381 1.38399637 [1288] USERENV(508.5f0) 13:04:00:096
00001382 1.38404310 [1288] LibMain: Process Name: C:\WINDOWS\Explorer.EXE
00001383 1.38408780 [1288]
00001384 1.40457582 [1288] USERENV(508.5f0) 13:04:00:111
00001385 1.40462351 [1288] GetProfileType: Profile already loaded.
00001386 1.40466702 [1288]
00001387 1.40577936 [1288] USERENV(508.5f0) 13:04:00:111
00001388 1.40583086 [1288] GetProfileType: ProfileFlags is 0
00001389 1.40587461 [1288]
00001390 1.40746570 [1288] USERENV(508.5f0) 13:04:00:111
00001391 1.40751922 [1288] GetProfileType: Profile already loaded.
00001392 1.40857029 [1288]
00001393 1.40858877 [1288] USERENV(508.5f0) 13:04:00:111
00001394 1.40869021 [1288] GetProfileType: ProfileFlags is 0
00001395 1.40923202 [1288]
00001396 1.40930784 [1288] USERENV(508.598) 13:04:00:111
00001397 1.40937281 [1288] GetProfileType: Profile already loaded.
00001398 1.40949690 [1288]
00001399 1.40956175 [1288] USERENV(508.598) 13:04:00:111
00001400 1.40962231 [1288] GetProfileType: ProfileFlags is 0
00001401 1.41064489 [1288]
00001402 1.58105230 [2104] USERENV(838.7dc) 13:04:00:283
00001403 1.58111417 [2104] LibMain: Process Name: C:\Program Files\VMware\VMware Tools\VMwareUser.exe
00001404 1.58116663 [2104]
00001405 1.58827519 [1436] USERENV(59c.678) 13:04:00:299
00001406 1.58833385 [1436] LibMain: Process Name: C:\WINDOWS\system32\ctfmon.exe
00001407 1.58838058 [1436]
00001408 1.59002697 [1436] USERENV(59c.678) 13:04:00:299
00001409 1.59007871 [1436] GetProfileType: Profile already loaded.
00001410 1.59012496 [1436]
00001411 1.59107983 [1436] USERENV(59c.678) 13:04:00:299
00001412 1.59113109 [1436] GetProfileType: ProfileFlags is 0
00001413 1.59117723 [1436]
00001414 1.59851527 [1436] USERENV(59c.678) 13:04:00:299
00001415 1.59856212 [1436] GetProfileType: Profile already loaded.
00001416 1.59886384 [1436]
00001417 1.59957695 [1436] USERENV(59c.678) 13:04:00:299
00001418 1.59962893 [1436] GetProfileType: ProfileFlags is 0
00001419 1.59967387 [1436]
00001420 1.60936332 [1448] SymNetDrvHelper: Unexpected error returned from RegQueryValueEx()
00001421 1.64589584 [1448] USERENV(5a8.5b4) 13:04:00:346
00001422 1.64593112 [1448] LibMain: Process Name: C:\Program Files\Common Files\Symantec Shared\ccApp.exe
00001423 1.64600480 [1448]
00001424 1.92488849 [2376] USERENV(948.558) 13:04:00:627
00001425 1.92493141 [2376] LibMain: Process Name: C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
00001426 1.92497194 [2376]
00001427 2.74090338 [2104] USERENV(838.7dc) 13:04:01:454
00001428 2.74094701 [2104] GetProfileType: Profile already loaded.
00001429 2.74098730 [2104]
00001430 2.74212575 [2104] USERENV(838.7dc) 13:04:01:454
00001431 2.74217415 [2104] GetProfileType: ProfileFlags is 0
00001432 2.74362588 [2104]
00001433 2.74367785 [2104] USERENV(838.7dc) 13:04:01:454
00001434 2.74372387 [2104] GetProfileType: Profile already loaded.
00001435 2.74467206 [2104]
00001436 2.74472380 [2104] USERENV(838.7dc) 13:04:01:454
00001437 2.74477720 [2104] GetProfileType: ProfileFlags is 0
00001438 2.74652553 [2104]
00001439 15.85371876 [2920] USERENV(b68.b6c) 13:04:14:558
00001440 15.85377502 [2920] LibMain: Process Name: C:\WINDOWS\system32\userinit.exe
00001441 15.85382557 [2920]
00001442 24.69286156 [2932] USERENV(b74.88c) 13:04:23:397
00001443 24.69290733 [2932] LibMain: Process Name: C:\Program Files\Symantec\Symantec Endpoint Protection\SescLU.exe
00001444 24.69294548 [2932]
00001445 61.38526154 [1288] SNACNP::NPGetCaps::WNNC_NET_TYPE
00001446 61.38531113 [1288] SNACNP::NPGetCaps::WNNC_USER
00001447 61.38536072 [1288] SNACNP::NPGetCaps::WNNC_CONNECTION
00001448 61.38541794 [1288] SNACNP::NPGetCaps::WNNC_ENUMERATION
00001449 61.38545990 [1288] SNACNP::NPGetCaps::WNNC_ADMIN
00001450 61.38550186 [1288] SNACNP::NPGetCaps::WNNC_DIALOG
00001451 61.38676071 [1288] SNACNP::NPGetCaps::WNNC_START
00001452 348.43466187 [804] LUMan: Client has a LU schedule
00001453 348.43490601 [804] LUMan: Client has a LU schedule
00001454 349.43435669 [804] LUMan: Client has a LU schedule
00001455 506.20474243 [3924] USERENV(f54.f58) 13:11:04:585
00001456 508.66699219 [3228] SNACNP::NPGetCaps::WNNC_NET_TYPE
00001457 508.66717529 [3228] SNACNP::NPGetCaps::WNNC_USER
00001458 508.66729736 [3228] SNACNP::NPGetCaps::WNNC_CONNECTION
00001459 508.66741943 [3228] SNACNP::NPGetCaps::WNNC_ENUMERATION
00001460 508.66757202 [3228] SNACNP::NPGetCaps::WNNC_ADMIN
00001461 508.66766357 [3228] SNACNP::NPGetCaps::WNNC_DIALOG
Wed Oct 26, 2011 9:24 am View user's profile Send private message
Display posts from previous:    
Reply to topic    SoftTree Technologies Forum Index » 24x7 Scheduler, Event Server, Automation Suite All times are GMT - 4 Hours
Goto page 1, 2, 3  Next
Page 1 of 3

 
Jump to: 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


 

 

Powered by phpBB © 2001, 2005 phpBB Group
Design by Freestyle XL / Flowers Online.