Microsoft KB Archive/324383

= Troubleshooting SCECLI 1202 Events =

Article ID: 324383

Article Last Modified on 2/28/2007

-

APPLIES TO


 * Microsoft Windows 2000 Datacenter Server
 * Microsoft Windows 2000 Server
 * Microsoft Windows 2000 Advanced Server

-



This article was previously published under Q324383



SUMMARY
This article describes ways to troubleshoot and to resolve SCECLI 1202 events.



MORE INFORMATION
The first step in troubleshooting these events is to identify the Win32 error code. This error code distinguishes the type of failure that causes the SCECLI 1202 event. The following is an example of a SCECLI 1202 event. The error code is shown in the Description field. In this example, the error code is 0x534. The text after the error code is the error description. Event Type: Warning

Event Source: SceCli

Event Category: None

Event ID: 1202

Date:

Time:

User: N/A

Computer: % %

Description: Security policies are propagated with warning. 0x534: No mapping between account names and security IDs was done. Please look for more details in TroubleShooting section in Security Help.

After you determine the error code, find that error code section in this article, and then follow the troubleshooting steps in that section. ==== 0x534: No mapping between account names and security IDs was done.

-or-

0x6fc: The trust relationship between the primary domain and the trusted domain failed. ====

These error codes mean that there was a failure to resolve a security account to a security identifier (SID). This typically occurs either because an account name was mistyped or because the account was deleted after it was added to the security policy setting. This typically occurs in the User Rights section or the Restricted Groups section of the security policy setting. It may also occur if the account exists across a trust and then the trust relationship is broken.

To troubleshoot this issue, follow these steps:  Determine the account that is causing the failure. To do this, enable debug logging for the Security Configuration client-side extension. To do this:  Start Registry Editor. Locate and then click the following registry subkey:

 

 On the Edit menu, click Add Value, and then add the following registry value:

Value name: ExtensionDebugLevel

Data type: DWORD

Value data: 2

 Quit Registry Editor.  Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following at the command prompt, and then press ENTER:

secedit /refreshpolicy machine_policy /enforce

This creates a file that is named Winlogon.log in the %SYSTEMROOT%\Security\Logs folder.</li> Find the problem account. To do this, type the following at the command prompt, and then press ENTER:

find /i &quot;cannot find&quot; %SYSTEMROOT%\security\logs\winlogon.log

The Find output identifies the problem account names--for example, &quot;Cannot find MichaelAlexander.&quot; In this example, the user account MichaelAlexander does not exist in the domain, or it has a different spelling--for example, MichelleAlexander.

Determine why this account cannot be resolved. For example, look for typographical errors, a deleted account, the wrong policy applying to this computer, or a trust problem.</li>  If you determine that the account has to be removed from the policy, find the problem policy and the problem setting. To determine which setting contains the unresolved account, type the following at the command prompt on the computer that is producing the SCECLI 1202 event, and then press ENTER:

c:\>find /i “ ” %SYSTEMROOT%\security\templates\policies\gpt*.*

For this example, the syntax and the results are: <pre class="fixed_text">c:\>find /i &quot;MichaelAlexander&quot; %SYSTEMROOT%\security\templates\policies\gpt*.* -- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-550,MichaelAlexander,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM This identifies GPT00002.inf as the cached security template from the problem Group Policy object (GPO) that contains the problem setting. It also identifies the problem setting as SeInteractiveLogonRight. The display name for SeInteractiveLogonRight is “Logon locally.”

For a map of the constants (for example, SeInteractiveLogonRight) to their display names (for example, Logon locally), see the Microsoft Windows 2000 Server Resource Kit, &quot;Distributed Systems Guide.&quot; The map is in the &quot;User Rights&quot; section of the Appendix. </li> Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text &quot;GPOPath=.&quot; In this example, you would see the following:

GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE

Between &quot;GPOPath=&quot; and &quot;\MACHINE&quot; is the GUID of the GPO.</li>  To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following at the command prompt, and then press ENTER:

gpotool /verbose

Search the output for the GUID that you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:

<pre class="fixed_text">Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details:

DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy </li></ol>

You have now identified the problem account, the problem setting, and the problem GPO. To resolve the problem, remove or replace the problem entry.

0x2: The system cannot find the file specified.
This error is similar to 0x534 and to 0x6fc in that it is caused by an irresoluble account name. When the 0x2 error occurs, it typically indicates that the irresoluble account name is specified in a Restricted Groups policy setting.

To troubleshoot this issue, follow these steps:  Determine which service or which object is having the failure. To do this, enable debug logging for the Security Configuration client-side extension. To do this:  Start Registry Editor.</li> Locate and then click the following registry subkey:

 

</li> On the Edit menu, click Add Value, and then add the following registry value:

Value name: ExtensionDebugLevel

Data type: DWORD

Value data: 2

</li> Quit Registry Editor.</li></ol> </li> Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following at the command prompt, and then press ENTER:

secedit /refreshpolicy machine_policy /enforce

This creates a file that is named Winlogon.log in the %SYSTEMROOT%\Security\Logs folder.</li> At the command prompt, type the following, and then press ENTER:

find /i &quot;cannot find&quot; %SYSTEMROOT%\security\logs\winlogon.log

The Find output identifies the problem account names--for example, &quot;Cannot find MichaelAlexander.&quot; In this example, the user account MichaelAlexander does not exist in the domain, or it has a different spelling--for example, MichelleAlexander.

Determine why this account cannot be resolved. For example, look for typographical errors, a deleted account, the wrong policy applying to this computer, or a trust problem.</li>  If you determine that the account has to be removed from the policy, find the problem policy and the problem setting. To find what setting contains the unresolved account, type the following at the command prompt on the computer that is producing the SCECLI 1202 event, and then press ENTER:

c:\>find /i “ ” %SYSTEMROOT%\security\templates\policies\gpt*.*

For this example, the syntax and the results are: <pre class="fixed_text">c:\>find /i &quot;MichaelAlexander&quot; %SYSTEMROOT%\security\templates\policies\gpt*.* -- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-550,JohnDough,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM This identifies GPT00002.inf as the cached security template from the problem GPO that contains the problem setting. It also identifies the problem setting as SeInteractiveLogonRight. The display name for SeInteractiveLogonRight is “Logon locally.”

For a map of the constants (for example, SeInteractiveLogonRight) to their display names (for example, Logon locally), see the Microsoft Windows 2000 Server Resource Kit, &quot;Distributed Systems Guide.&quot; The map is in the &quot;User Rights&quot; section of the Appendix. </li> Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text &quot;GPOPath=.&quot; In this example, you would see the following:

GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE

Between &quot;GPOPath=&quot; and &quot;\MACHINE&quot; is the GUID of the GPO.</li> <li> To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following at the command prompt, and then press ENTER:

gpotool /verbose

Search the output for the GUID you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:

<pre class="fixed_text">Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details:

DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy </li></ol>

You have now identified the problem account, the problem setting, and the problem GPO. To resolve the problem, search the Restricted Groups section of the security policy for instances of the problem account (in this example, &quot;MichaelAlexander&quot;), and then remove or replace the problem entry.

0x5: Access denied.
This error typically occurs when the system has not been granted the correct permissions to update the access control list of a service. This may occur if the Administrator defines permissions for a service in a policy but does not grant the System account Full Control permissions.

To troubleshoot this issue, follow these steps: <ol> <li>Determine which service or which object is having the failure. To do this, enable debug logging for the Security Configuration client-side extension. To do this: <ol style="list-style-type: lower-alpha;"> <li>Start Registry Editor.</li> <li>Locate and then click the following registry subkey:

 

</li> <li>On the Edit menu, click Add Value, and then add the following registry value:

Value name: ExtensionDebugLevel

Data type: DWORD

Value data: 2

</li> <li>Quit Registry Editor.</li></ol> </li> <li>Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following at the command prompt, and then press ENTER:

secedit /refreshpolicy machine_policy /enforce

This creates a file that is named Winlogon.log in the %SYSTEMROOT%\Security\Logs folder.</li> <li>At the command prompt, type the following, and then press ENTER:

find /i &quot;error opening&quot; %SYSTEMROOT%\security\logs\winlogon.log

The Find output identifies the service with the misconfigured permissions--for example, &quot;Error opening Dnscache.&quot; Dnscache is the short name for the DNS Client service.</li> <li> Find out which policy or which policies are trying to modify the service permissions. To do this, type the following at the command prompt, and then press ENTER:

find /i &quot; &quot; %SYSTEMROOT%\security\templates\policies\gpt*.*&quot;.

The following is a sample command and its output:

<pre class="fixed_text">d:\>find /i &quot;dnscache&quot; %windir%\security\templates\policies\gpt*.*

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF Dnscache,3,&quot;D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;LA)&quot;

-- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM </li> <li>Determine which GPO contains the problem setting. Search the cached security template that you identified in step 4 for the text &quot;GPOPath=.&quot; In this example, you would see the following:

GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE

Between &quot;GPOPath=&quot; and &quot;\MACHINE&quot; is the GUID of the GPO.</li> <li> To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type the following at the command prompt, and then press ENTER:

gpotool /verbose

Search the output for the GUID that you identified in step 5. The four lines that follow the GUID contain the friendly name of the policy. For example:

<pre class="fixed_text">Policy {6AC1786C-016F-11D2-945F-00C04FB984F9} Policy OK Details:

DC: domcntlr1.wingtiptoys.com Friendly name: Default Domain Controllers Policy </li></ol>

Now you have identified the service with the misconfigured permissions and the problem GPO. To resolve the problem, search the System Services section of the security policy for instances of the service with the misconfigured permissions, and then take corrective action to grant the System account Full Control permissions to the service.

0x4b8: An extended error has occurred.
The 0x4b8 error is generic and can be caused by a number of different problems. To troubleshoot these errors, follow these steps: <ol> <li>Enable debug logging for the Security Configuration client-side extension. To do this: <ol style="list-style-type: lower-alpha;"> <li>Start Registry Editor.</li> <li>Locate and then click the following registry subkey:

 

</li> <li>On the Edit menu, click Add Value, and then add the following registry value:

Value name: ExtensionDebugLevel

Data type: DWORD

Value data: 2

</li> <li>Quit Registry Editor.</li></ol> </li> <li>Refresh the policy settings to reproduce the failure. To refresh the policy settings, type the following at the command prompt, and then press ENTER:

secedit /refreshpolicy machine_policy /enforce

This creates a file that is named Winlogon.log in the %SYSTEMROOT%\Security\Logs folder.</li> <li>See the following Microsoft Knowledge Base articles. These articles describe known issues that cause the 0x4b8 error. Click the following article numbers to view the articles in the Microsoft Knowledge Base:

260715 Event ID 1000 and 1202 After Configuring Policies

278316 ESENT Event IDs 1000, 1202, 412, and 454 Are Logged Repeatedly in the Application Event Log

</li></ol>

Keywords: kbhotfixserver kbqfe kbhowto KB324383

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.