dunayev
asked on
windows cannot obtain the domain controller name for your computer network: Event ID 1054
I get this error when I join a workstation to the domain and put it in an OU. Policy does NOT get applied to this workstation.
I ran the "DCDIAG /V /C /D /E /s:yourdcname " command and have posted the code bellow.
I ran the "DCDIAG /V /C /D /E /s:yourdcname " command and have posted the code bellow.
Command Line: "dcdiag.exe
/V /C /D /E /s:rchs-tmpdc"
Directory Server Diagnosis
Performing initial setup:
* Connecting to directory service on server rchs-tmpdc.
rchs-tmpdc.currentTime = 20090127170248.0Z
rchs-tmpdc.highestCommittedUSN = 840952
rchs-tmpdc.isSynchronized = 1
rchs-tmpdc.isGlobalCatalogReady = 1
* Identified AD Forest.
Collecting AD specific global data
* Collecting site info.
Calling ldap_search_init_page(hld,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us,LDAP_SCOPE_SUBTREE,(objectCategory=ntDSSiteSettings),.......
The previous call succeeded
Iterating through the sites
Looking at base site object: CN=NTDS Site Settings,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=RiverCity,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
Looking at base site object: CN=NTDS Site Settings,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Getting ISTG and options for the site
* Identifying all servers.
Calling ldap_search_init_page(hld,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us,LDAP_SCOPE_SUBTREE,(objectClass=ntDSDsa),.......
The previous call succeeded....
The previous call succeeded
Iterating through the list of servers
Getting information for the server CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
Getting information for the server CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
objectGuid obtained
InvocationID obtained
dnsHostname obtained
site info obtained
All the info for the server collected
RCHS-TMPDC.currentTime = 20090127170248.0Z
RCHS-TMPDC.highestCommittedUSN = 840952
RCHS-TMPDC.isSynchronized = 1
RCHS-TMPDC.isGlobalCatalogReady = 1
* Identifying all NC cross-refs.
* Found 19 DC(s). Testing 19 of them.
Done gathering initial info.
===============================================Printing out pDsInfo
GLOBAL:
ulNumServers=19
pszRootDomain=wusd.k12.ca.us
pszNC=
pszRootDomainFQDN=DC=wusd,DC=k12,DC=ca,DC=us
pszConfigNc=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pszPartitionsDn=CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
fAdam=0
iSiteOptions=0
dwTombstoneLifeTimeDays=60
dwForestBehaviorVersion=2
HomeServer=18, RCHS-TMPDC
SERVER: pServer[0].pszName=WUSD-DC1
pServer[0].pszGuidDNSName (binding str)=726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
pServer[0].pszDNSName=wusd-dc1.wusd.k12.ca.us
pServer[0].pszLdapPort=(null)
pServer[0].pszSslPort=(null)
pServer[0].pszDn=CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[0].pszComputerAccountDn=CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[0].uuidObjectGuid=726e2d0a-8354-4b0e-a51c-3d22421421f1
pServer[0].uuidInvocationId=d0a7ba99-e29e-4fc7-98e6-a722ef4cea63
pServer[0].iSite=9 (DistrictOffice)
pServer[0].iOptions=0
pServer[0].ftLocalAcquireTime=00000000 00000000
pServer[0].ftRemoteConnectTime=00000000 00000000
pServer[0].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[1].pszName=AN-ADMIN
pServer[1].pszGuidDNSName (binding str)=02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
pServer[1].pszDNSName=AN-ADMIN.wusd.k12.ca.us
pServer[1].pszLdapPort=(null)
pServer[1].pszSslPort=(null)
pServer[1].pszDn=CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[1].pszComputerAccountDn=CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[1].uuidObjectGuid=02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2
pServer[1].uuidInvocationId=1d49781b-263a-4a5e-8b55-d4f75d545e3f
pServer[1].iSite=5 (AlyceNorman)
pServer[1].iOptions=1
pServer[1].ftLocalAcquireTime=00000000 00000000
pServer[1].ftRemoteConnectTime=00000000 00000000
pServer[1].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[1].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[2].pszName=BI-ADMIN
pServer[2].pszGuidDNSName (binding str)=0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
pServer[2].pszDNSName=bi-admin.wusd.k12.ca.us
pServer[2].pszLdapPort=(null)
pServer[2].pszSslPort=(null)
pServer[2].pszDn=CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[2].pszComputerAccountDn=CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[2].uuidObjectGuid=0f5fe312-24c7-4f6e-bc2f-f002f664f5f0
pServer[2].uuidInvocationId=4765b064-09fe-402f-9597-9489a4cec65b
pServer[2].iSite=2 (BridgewayIsland)
pServer[2].iOptions=1
pServer[2].ftLocalAcquireTime=00000000 00000000
pServer[2].ftRemoteConnectTime=00000000 00000000
pServer[2].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[2].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[3].pszName=BT-ADMIN
pServer[3].pszGuidDNSName (binding str)=abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
pServer[3].pszDNSName=BT-ADMIN.wusd.k12.ca.us
pServer[3].pszLdapPort=(null)
pServer[3].pszSslPort=(null)
pServer[3].pszDn=CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[3].pszComputerAccountDn=CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[3].uuidObjectGuid=abe39041-dee2-4e2a-906c-06c0beda2372
pServer[3].uuidInvocationId=713a270e-6535-4ba7-bdf1-c0253cac9f83
pServer[3].iSite=4 (Bryte)
pServer[3].iOptions=1
pServer[3].ftLocalAcquireTime=00000000 00000000
pServer[3].ftRemoteConnectTime=00000000 00000000
pServer[3].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[3].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[4].pszName=ELK-ADMIN
pServer[4].pszGuidDNSName (binding str)=13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
pServer[4].pszDNSName=ELK-ADMIN.wusd.k12.ca.us
pServer[4].pszLdapPort=(null)
pServer[4].pszSslPort=(null)
pServer[4].pszDn=CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[4].pszComputerAccountDn=CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[4].uuidObjectGuid=13050545-307f-4a3b-b17b-0a1f0ebd6265
pServer[4].uuidInvocationId=e608a407-6ca9-45b2-a81b-d1fdcab3bbab
pServer[4].iSite=3 (Elkhorn)
pServer[4].iOptions=1
pServer[4].ftLocalAcquireTime=00000000 00000000
pServer[4].ftRemoteConnectTime=00000000 00000000
pServer[4].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[4].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[5].pszName=EV-ADMIN
pServer[5].pszGuidDNSName (binding str)=3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
pServer[5].pszDNSName=EV-ADMIN.wusd.k12.ca.us
pServer[5].pszLdapPort=(null)
pServer[5].pszSslPort=(null)
pServer[5].pszDn=CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[5].pszComputerAccountDn=CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[5].uuidObjectGuid=3f349957-da42-43bb-b8c1-ac5e984bd02c
pServer[5].uuidInvocationId=7d367aa6-314a-4b57-9bca-0a080e510b4d
pServer[5].iSite=1 (Evergreen)
pServer[5].iOptions=1
pServer[5].ftLocalAcquireTime=00000000 00000000
pServer[5].ftRemoteConnectTime=00000000 00000000
pServer[5].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[5].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[6].pszName=WF-ADMIN
pServer[6].pszGuidDNSName (binding str)=2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
pServer[6].pszDNSName=WF-ADMIN.wusd.k12.ca.us
pServer[6].pszLdapPort=(null)
pServer[6].pszSslPort=(null)
pServer[6].pszDn=CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[6].pszComputerAccountDn=CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[6].uuidObjectGuid=2f5849a9-7eb5-403e-85fc-22b7f325b93a
pServer[6].uuidInvocationId=1b15be02-a5f7-4d60-a3eb-7787c6f39406
pServer[6].iSite=0 (Westfield)
pServer[6].iOptions=1
pServer[6].ftLocalAcquireTime=00000000 00000000
pServer[6].ftRemoteConnectTime=00000000 00000000
pServer[6].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[6].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[7].pszName=SP-ADMIN
pServer[7].pszGuidDNSName (binding str)=5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
pServer[7].pszDNSName=SP-ADMIN.wusd.k12.ca.us
pServer[7].pszLdapPort=(null)
pServer[7].pszSslPort=(null)
pServer[7].pszDn=CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[7].pszComputerAccountDn=CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[7].uuidObjectGuid=5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94
pServer[7].uuidInvocationId=b32d66ec-d488-41f7-bf52-99ffec47e78c
pServer[7].iSite=6 (SouthPort)
pServer[7].iOptions=1
pServer[7].ftLocalAcquireTime=00000000 00000000
pServer[7].ftRemoteConnectTime=00000000 00000000
pServer[7].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[7].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[8].pszName=WM-CAMPUS
pServer[8].pszGuidDNSName (binding str)=a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
pServer[8].pszDNSName=wm-campus.wusd.k12.ca.us
pServer[8].pszLdapPort=(null)
pServer[8].pszSslPort=(null)
pServer[8].pszDn=CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[8].pszComputerAccountDn=CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[8].uuidObjectGuid=a86aa50f-8b4e-4eac-87b7-503614be8e34
pServer[8].uuidInvocationId=0d96ef97-9b79-462f-a8ce-cddfe225f9bf
pServer[8].iSite=7 (Westmore)
pServer[8].iOptions=1
pServer[8].ftLocalAcquireTime=00000000 00000000
pServer[8].ftRemoteConnectTime=00000000 00000000
pServer[8].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[8].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[9].pszName=RCHS-CAMPUS
pServer[9].pszGuidDNSName (binding str)=1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
pServer[9].pszDNSName=rchs-campus.rchs.wusd.k12.ca.us
pServer[9].pszLdapPort=(null)
pServer[9].pszSslPort=(null)
pServer[9].pszDn=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[9].pszComputerAccountDn=CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
pServer[9].uuidObjectGuid=1ade07c1-fd1d-4af7-827d-325a59a6e1e6
pServer[9].uuidInvocationId=610e5578-127c-4350-8481-31ffe5fd9cd8
pServer[9].iSite=12 (NewHighSchool)
pServer[9].iOptions=1
pServer[9].ftLocalAcquireTime=00000000 00000000
pServer[9].ftRemoteConnectTime=00000000 00000000
pServer[9].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[9].ppszPartialNCs:
ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[10].pszName=RCHS-DC02
pServer[10].pszGuidDNSName (binding str)=02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
pServer[10].pszDNSName=RCHS-DC02.rchs.wusd.k12.ca.us
pServer[10].pszLdapPort=(null)
pServer[10].pszSslPort=(null)
pServer[10].pszDn=CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[10].pszComputerAccountDn=CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
pServer[10].uuidObjectGuid=02329cde-05de-4208-9935-0ec4743e6fba
pServer[10].uuidInvocationId=9f65a741-7459-47b0-a537-27a95056ad45
pServer[10].iSite=9 (DistrictOffice)
pServer[10].iOptions=1
pServer[10].ftLocalAcquireTime=00000000 00000000
pServer[10].ftRemoteConnectTime=00000000 00000000
pServer[10].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[10].ppszPartialNCs:
ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[11].pszName=WUSD-DC01
pServer[11].pszGuidDNSName (binding str)=37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
pServer[11].pszDNSName=wusd-dc01.wusd.k12.ca.us
pServer[11].pszLdapPort=(null)
pServer[11].pszSslPort=(null)
pServer[11].pszDn=CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[11].pszComputerAccountDn=CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[11].uuidObjectGuid=37beb541-54e8-4189-b0ae-0d56719fafa3
pServer[11].uuidInvocationId=37beb541-54e8-4189-b0ae-0d56719fafa3
pServer[11].iSite=9 (DistrictOffice)
pServer[11].iOptions=1
pServer[11].ftLocalAcquireTime=00000000 00000000
pServer[11].ftRemoteConnectTime=00000000 00000000
pServer[11].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[11].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[12].pszName=WUSD-DC02
pServer[12].pszGuidDNSName (binding str)=c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
pServer[12].pszDNSName=wusd-dc02.wusd.k12.ca.us
pServer[12].pszLdapPort=(null)
pServer[12].pszSslPort=(null)
pServer[12].pszDn=CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[12].pszComputerAccountDn=CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[12].uuidObjectGuid=c5105bc1-2b24-4573-8711-8622336e982e
pServer[12].uuidInvocationId=7aba393a-833f-4761-a5e0-4776dcdfab94
pServer[12].iSite=9 (DistrictOffice)
pServer[12].iOptions=1
pServer[12].ftLocalAcquireTime=00000000 00000000
pServer[12].ftRemoteConnectTime=00000000 00000000
pServer[12].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[12].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[13].pszName=RCHS-ADMIN
pServer[13].pszGuidDNSName (binding str)=ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
pServer[13].pszDNSName=RCHS-ADMIN.wusd.k12.ca.us
pServer[13].pszLdapPort=(null)
pServer[13].pszSslPort=(null)
pServer[13].pszDn=CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[13].pszComputerAccountDn=CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[13].uuidObjectGuid=ee694a22-0e78-4716-82c2-81c32084b26a
pServer[13].uuidInvocationId=313beef3-049b-4264-9e78-4259e9ae5391
pServer[13].iSite=12 (NewHighSchool)
pServer[13].iOptions=0
pServer[13].ftLocalAcquireTime=00000000 00000000
pServer[13].ftRemoteConnectTime=00000000 00000000
pServer[13].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[13].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[14].pszName=SG-CAMPUS
pServer[14].pszGuidDNSName (binding str)=c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
pServer[14].pszDNSName=SG-CAMPUS.wusd.k12.ca.us
pServer[14].pszLdapPort=(null)
pServer[14].pszSslPort=(null)
pServer[14].pszDn=CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[14].pszComputerAccountDn=CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[14].uuidObjectGuid=c983e27e-0a85-4f89-baed-549df9475f34
pServer[14].uuidInvocationId=0cfe7922-3cc9-40e7-9fc4-da9460df7652
pServer[14].iSite=8 (StoneGate)
pServer[14].iOptions=1
pServer[14].ftLocalAcquireTime=00000000 00000000
pServer[14].ftRemoteConnectTime=00000000 00000000
pServer[14].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[14].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[15].pszName=RB-CAMPUS
pServer[15].pszGuidDNSName (binding str)=8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
pServer[15].pszDNSName=RB-Campus.wusd.k12.ca.us
pServer[15].pszLdapPort=(null)
pServer[15].pszSslPort=(null)
pServer[15].pszDn=CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[15].pszComputerAccountDn=CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[15].uuidObjectGuid=8e7bcbe2-8749-4d26-bf07-25b31106f55c
pServer[15].uuidInvocationId=28403cd0-ea07-4b74-a122-707b0f409728
pServer[15].iSite=10 (RiverBank)
pServer[15].iOptions=1
pServer[15].ftLocalAcquireTime=00000000 00000000
pServer[15].ftRemoteConnectTime=00000000 00000000
pServer[15].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[15].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[16].pszName=WUSD-DC2
pServer[16].pszGuidDNSName (binding str)=2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
pServer[16].pszDNSName=WUSD-DC2.wusd.k12.ca.us
pServer[16].pszLdapPort=(null)
pServer[16].pszSslPort=(null)
pServer[16].pszDn=CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[16].pszComputerAccountDn=CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[16].uuidObjectGuid=2cb154d1-ce95-4c62-a2f9-ea3cb9f15003
pServer[16].uuidInvocationId=3017153b-7ac0-4d35-b99f-5cd7744bd72c
pServer[16].iSite=9 (DistrictOffice)
pServer[16].iOptions=1
pServer[16].ftLocalAcquireTime=00000000 00000000
pServer[16].ftRemoteConnectTime=00000000 00000000
pServer[16].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[16].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[17].pszName=WUSD-TMPDC
pServer[17].pszGuidDNSName (binding str)=b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
pServer[17].pszDNSName=wusd-tmpdc.wusd.k12.ca.us
pServer[17].pszLdapPort=(null)
pServer[17].pszSslPort=(null)
pServer[17].pszDn=CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[17].pszComputerAccountDn=CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
pServer[17].uuidObjectGuid=b294c123-5db0-4086-80ce-a99f61b9923d
pServer[17].uuidInvocationId=88655d07-b693-4789-955a-0000f0672d21
pServer[17].iSite=12 (NewHighSchool)
pServer[17].iOptions=1
pServer[17].ftLocalAcquireTime=00000000 00000000
pServer[17].ftRemoteConnectTime=00000000 00000000
pServer[17].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
pServer[17].ppszPartialNCs:
ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SERVER: pServer[18].pszName=RCHS-TMPDC
pServer[18].pszGuidDNSName (binding str)=b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
pServer[18].pszDNSName=RCHS-TMPDC.rchs.wusd.k12.ca.us
pServer[18].pszLdapPort=(null)
pServer[18].pszSslPort=(null)
pServer[18].pszDn=CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[18].pszComputerAccountDn=CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
pServer[18].uuidObjectGuid=b1b9edc1-55cc-403f-8477-57f46100bcb5
pServer[18].uuidInvocationId=5a44985b-70fe-4991-aab1-a57f14b9dd56
pServer[18].iSite=12 (NewHighSchool)
pServer[18].iOptions=1
pServer[18].ftLocalAcquireTime=14f5e8c0 01c980a1
pServer[18].ftRemoteConnectTime=14926c00 01c980a1
pServer[18].ppszMaster/FullReplicaNCs:
ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pServer[18].ppszPartialNCs:
ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
SITES: pSites[0].pszName=Westfield
pSites[0].pszSiteSettings=CN=NTDS Site Settings,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[0].pszISTG=CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[0].iSiteOption=0
pSites[0].cServers=1
SITES: pSites[1].pszName=Evergreen
pSites[1].pszSiteSettings=CN=NTDS Site Settings,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[1].pszISTG=CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[1].iSiteOption=0
pSites[1].cServers=1
SITES: pSites[2].pszName=BridgewayIsland
pSites[2].pszSiteSettings=CN=NTDS Site Settings,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[2].pszISTG=CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[2].iSiteOption=0
pSites[2].cServers=1
SITES: pSites[3].pszName=Elkhorn
pSites[3].pszSiteSettings=CN=NTDS Site Settings,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[3].pszISTG=CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[3].iSiteOption=0
pSites[3].cServers=1
SITES: pSites[4].pszName=Bryte
pSites[4].pszSiteSettings=CN=NTDS Site Settings,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[4].pszISTG=CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[4].iSiteOption=0
pSites[4].cServers=1
SITES: pSites[5].pszName=AlyceNorman
pSites[5].pszSiteSettings=CN=NTDS Site Settings,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[5].pszISTG=CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[5].iSiteOption=0
pSites[5].cServers=1
SITES: pSites[6].pszName=SouthPort
pSites[6].pszSiteSettings=CN=NTDS Site Settings,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[6].pszISTG=CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[6].iSiteOption=0
pSites[6].cServers=1
SITES: pSites[7].pszName=Westmore
pSites[7].pszSiteSettings=CN=NTDS Site Settings,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[7].pszISTG=CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[7].iSiteOption=0
pSites[7].cServers=1
SITES: pSites[8].pszName=StoneGate
pSites[8].pszSiteSettings=CN=NTDS Site Settings,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[8].pszISTG=CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[8].iSiteOption=0
pSites[8].cServers=1
SITES: pSites[9].pszName=DistrictOffice
pSites[9].pszSiteSettings=CN=NTDS Site Settings,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[9].pszISTG=CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[9].iSiteOption=0
pSites[9].cServers=5
SITES: pSites[10].pszName=RiverBank
pSites[10].pszSiteSettings=CN=NTDS Site Settings,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[10].pszISTG=CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[10].iSiteOption=0
pSites[10].cServers=1
SITES: pSites[11].pszName=RiverCity
pSites[11].pszSiteSettings=CN=NTDS Site Settings,CN=RiverCity,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[11].pszISTG=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[11].iSiteOption=0
pSites[11].cServers=0
SITES: pSites[12].pszName=NewHighSchool
pSites[12].pszSiteSettings=CN=NTDS Site Settings,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[12].pszISTG=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pSites[12].iSiteOption=0
pSites[12].cServers=4
NC: pNCs[0].pszName=DomainDnsZones
pNCs[0].pszDn=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[0].aCrInfo[0].dwFlags=0x00000201
pNCs[0].aCrInfo[0].pszDn=CN=c3450136-b047-4425-b15b-781c7e606f40,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[0].aCrInfo[0].pszDnsRoot=DomainDnsZones.wusd.k12.ca.us
pNCs[0].aCrInfo[0].iSourceServer=18
pNCs[0].aCrInfo[0].pszSourceServer=(null)
pNCs[0].aCrInfo[0].ulSystemFlags=0x00000005
pNCs[0].aCrInfo[0].bEnabled=TRUE
pNCs[0].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[0].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[0].aCrInfo[0].pszNetBiosName=(null)
pNCs[0].aCrInfo[0].cReplicas=-1
pNCs[0].aCrInfo[0].aszReplicas=
NC: pNCs[1].pszName=ForestDnsZones
pNCs[1].pszDn=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[1].aCrInfo[0].dwFlags=0x00000201
pNCs[1].aCrInfo[0].pszDn=CN=b455cdeb-2730-4b13-a298-458d836a5190,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[1].aCrInfo[0].pszDnsRoot=ForestDnsZones.wusd.k12.ca.us
pNCs[1].aCrInfo[0].iSourceServer=18
pNCs[1].aCrInfo[0].pszSourceServer=(null)
pNCs[1].aCrInfo[0].ulSystemFlags=0x00000005
pNCs[1].aCrInfo[0].bEnabled=TRUE
pNCs[1].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[1].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[1].aCrInfo[0].pszNetBiosName=(null)
pNCs[1].aCrInfo[0].cReplicas=-1
pNCs[1].aCrInfo[0].aszReplicas=
NC: pNCs[2].pszName=Schema
pNCs[2].pszDn=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[2].aCrInfo[0].dwFlags=0x00000201
pNCs[2].aCrInfo[0].pszDn=CN=Enterprise Schema,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[2].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
pNCs[2].aCrInfo[0].iSourceServer=18
pNCs[2].aCrInfo[0].pszSourceServer=(null)
pNCs[2].aCrInfo[0].ulSystemFlags=0x00000001
pNCs[2].aCrInfo[0].bEnabled=TRUE
pNCs[2].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[2].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[2].aCrInfo[0].pszNetBiosName=(null)
pNCs[2].aCrInfo[0].cReplicas=-1
pNCs[2].aCrInfo[0].aszReplicas=
NC: pNCs[3].pszName=Configuration
pNCs[3].pszDn=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[3].aCrInfo[0].dwFlags=0x00000201
pNCs[3].aCrInfo[0].pszDn=CN=Enterprise Configuration,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[3].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
pNCs[3].aCrInfo[0].iSourceServer=18
pNCs[3].aCrInfo[0].pszSourceServer=(null)
pNCs[3].aCrInfo[0].ulSystemFlags=0x00000001
pNCs[3].aCrInfo[0].bEnabled=TRUE
pNCs[3].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[3].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[3].aCrInfo[0].pszNetBiosName=(null)
pNCs[3].aCrInfo[0].cReplicas=-1
pNCs[3].aCrInfo[0].aszReplicas=
NC: pNCs[4].pszName=wusd
pNCs[4].pszDn=DC=wusd,DC=k12,DC=ca,DC=us
pNCs[4].aCrInfo[0].dwFlags=0x00000201
pNCs[4].aCrInfo[0].pszDn=CN=WUSD,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[4].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
pNCs[4].aCrInfo[0].iSourceServer=18
pNCs[4].aCrInfo[0].pszSourceServer=(null)
pNCs[4].aCrInfo[0].ulSystemFlags=0x00000003
pNCs[4].aCrInfo[0].bEnabled=TRUE
pNCs[4].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[4].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[4].aCrInfo[0].pszNetBiosName=(null)
pNCs[4].aCrInfo[0].cReplicas=-1
pNCs[4].aCrInfo[0].aszReplicas=
NC: pNCs[5].pszName=DomainDnsZones
pNCs[5].pszDn=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[5].aCrInfo[0].dwFlags=0x00000201
pNCs[5].aCrInfo[0].pszDn=CN=82d3fb70-7d87-458d-8656-9ec3177fb867,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[5].aCrInfo[0].pszDnsRoot=DomainDnsZones.rchs.wusd.k12.ca.us
pNCs[5].aCrInfo[0].iSourceServer=18
pNCs[5].aCrInfo[0].pszSourceServer=(null)
pNCs[5].aCrInfo[0].ulSystemFlags=0x00000005
pNCs[5].aCrInfo[0].bEnabled=TRUE
pNCs[5].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[5].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[5].aCrInfo[0].pszNetBiosName=(null)
pNCs[5].aCrInfo[0].cReplicas=-1
pNCs[5].aCrInfo[0].aszReplicas=
NC: pNCs[6].pszName=rchs
pNCs[6].pszDn=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[6].aCrInfo[0].dwFlags=0x00000201
pNCs[6].aCrInfo[0].pszDn=CN=RCHS,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
pNCs[6].aCrInfo[0].pszDnsRoot=rchs.wusd.k12.ca.us
pNCs[6].aCrInfo[0].iSourceServer=18
pNCs[6].aCrInfo[0].pszSourceServer=(null)
pNCs[6].aCrInfo[0].ulSystemFlags=0x00000003
pNCs[6].aCrInfo[0].bEnabled=TRUE
pNCs[6].aCrInfo[0].ftWhenCreated=00000000 00000000 pNCs[6].aCrInfo[0].pszSDReferenceDomain=(null)
pNCs[6].aCrInfo[0].pszNetBiosName=(null)
pNCs[6].aCrInfo[0].cReplicas=-1
pNCs[6].aCrInfo[0].aszReplicas=
7 NC TARGETS: DomainDnsZones, ForestDnsZones, Schema, Configuration, wusd, DomainDnsZones, rchs,
19 TARGETS: WUSD-DC1, AN-ADMIN, BI-ADMIN, BT-ADMIN, ELK-ADMIN, EV-ADMIN, WF-ADMIN, SP-ADMIN, WM-CAMPUS, RCHS-CAMPUS, RCHS-DC02, WUSD-DC01, WUSD-DC02, RCHS-ADMIN, SG-CAMPUS, RB-CAMPUS, WUSD-DC2, WUSD-TMPDC, RCHS-TMPDC,
=============================================Done Printing pDsInfo
Doing initial required tests
Testing server: DistrictOffice\WUSD-DC1
Starting test: Connectivity
* Active Directory LDAP Services Check
WUSD-DC1.currentTime = 20090127170248.0Z
WUSD-DC1.highestCommittedUSN = 1848526
WUSD-DC1.isSynchronized = 1
WUSD-DC1.isGlobalCatalogReady = 0
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WUSD-DC1 ... OK.
* Active Directory RPC Services Check
......................... WUSD-DC1 passed test Connectivity
Testing server: AlyceNorman\AN-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
AN-ADMIN.currentTime = 20090127170248.0Z
AN-ADMIN.highestCommittedUSN = 4390623
AN-ADMIN.isSynchronized = 1
AN-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: AN-ADMIN ... OK.
* Active Directory RPC Services Check
......................... AN-ADMIN passed test Connectivity
Testing server: BridgewayIsland\BI-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
BI-ADMIN.currentTime = 20090127170248.0Z
BI-ADMIN.highestCommittedUSN = 5274681
BI-ADMIN.isSynchronized = 1
BI-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: BI-ADMIN ... OK.
* Active Directory RPC Services Check
......................... BI-ADMIN passed test Connectivity
Testing server: Bryte\BT-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
BT-ADMIN.currentTime = 20090127170249.0Z
BT-ADMIN.highestCommittedUSN = 4689843
BT-ADMIN.isSynchronized = 1
BT-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: BT-ADMIN ... OK.
* Active Directory RPC Services Check
......................... BT-ADMIN passed test Connectivity
Testing server: Elkhorn\ELK-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
ELK-ADMIN.currentTime = 20090127170249.0Z
ELK-ADMIN.highestCommittedUSN = 4570569
ELK-ADMIN.isSynchronized = 1
ELK-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: ELK-ADMIN ... OK.
* Active Directory RPC Services Check
......................... ELK-ADMIN passed test Connectivity
Testing server: Evergreen\EV-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
EV-ADMIN.currentTime = 20090127170249.0Z
EV-ADMIN.highestCommittedUSN = 6618908
EV-ADMIN.isSynchronized = 1
EV-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: EV-ADMIN ... OK.
* Active Directory RPC Services Check
......................... EV-ADMIN passed test Connectivity
Testing server: Westfield\WF-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
WF-ADMIN.currentTime = 20090127170250.0Z
WF-ADMIN.highestCommittedUSN = 3986599
WF-ADMIN.isSynchronized = 1
WF-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WF-ADMIN ... OK.
* Active Directory RPC Services Check
......................... WF-ADMIN passed test Connectivity
Testing server: SouthPort\SP-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
SP-ADMIN.currentTime = 20090127170250.0Z
SP-ADMIN.highestCommittedUSN = 3601894
SP-ADMIN.isSynchronized = 1
SP-ADMIN.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: SP-ADMIN ... OK.
* Active Directory RPC Services Check
......................... SP-ADMIN passed test Connectivity
Testing server: Westmore\WM-CAMPUS
Starting test: Connectivity
* Active Directory LDAP Services Check
WM-CAMPUS.currentTime = 20090127170250.0Z
WM-CAMPUS.highestCommittedUSN = 2804317
WM-CAMPUS.isSynchronized = 1
WM-CAMPUS.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WM-CAMPUS ... OK.
* Active Directory RPC Services Check
......................... WM-CAMPUS passed test Connectivity
Testing server: NewHighSchool\RCHS-CAMPUS
Starting test: Connectivity
* Active Directory LDAP Services Check
RCHS-CAMPUS.currentTime = 20090127170250.0Z
RCHS-CAMPUS.highestCommittedUSN = 5702675
RCHS-CAMPUS.isSynchronized = 1
RCHS-CAMPUS.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: RCHS-CAMPUS ... OK.
* Active Directory RPC Services Check
......................... RCHS-CAMPUS passed test Connectivity
Testing server: DistrictOffice\RCHS-DC02
Starting test: Connectivity
* Active Directory LDAP Services Check
RCHS-DC02.currentTime = 20090127170250.0Z
RCHS-DC02.highestCommittedUSN = 6555347
RCHS-DC02.isSynchronized = 1
RCHS-DC02.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: RCHS-DC02 ... OK.
* Active Directory RPC Services Check
......................... RCHS-DC02 passed test Connectivity
Testing server: DistrictOffice\WUSD-DC01
Starting test: Connectivity
* Active Directory LDAP Services Check
WUSD-DC01.currentTime = 20090127170217.0Z
WUSD-DC01.highestCommittedUSN = 13128125
WUSD-DC01.isSynchronized = 1
WUSD-DC01.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WUSD-DC01 ... OK.
* Active Directory RPC Services Check
......................... WUSD-DC01 passed test Connectivity
Testing server: DistrictOffice\WUSD-DC02
Starting test: Connectivity
* Active Directory LDAP Services Check
WUSD-DC02.currentTime = 20090127170250.0Z
WUSD-DC02.highestCommittedUSN = 12836165
WUSD-DC02.isSynchronized = 1
WUSD-DC02.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WUSD-DC02 ... OK.
* Active Directory RPC Services Check
......................... WUSD-DC02 passed test Connectivity
Testing server: NewHighSchool\RCHS-ADMIN
Starting test: Connectivity
* Active Directory LDAP Services Check
RCHS-ADMIN.currentTime = 20090127170250.0Z
RCHS-ADMIN.highestCommittedUSN = 6508167
RCHS-ADMIN.isSynchronized = 1
RCHS-ADMIN.isGlobalCatalogReady = 0
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: RCHS-ADMIN ... OK.
* Active Directory RPC Services Check
......................... RCHS-ADMIN passed test Connectivity
Testing server: StoneGate\SG-CAMPUS
Starting test: Connectivity
* Active Directory LDAP Services Check
SG-CAMPUS.currentTime = 20090127170250.0Z
SG-CAMPUS.highestCommittedUSN = 2247173
SG-CAMPUS.isSynchronized = 1
SG-CAMPUS.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: SG-CAMPUS ... OK.
* Active Directory RPC Services Check
......................... SG-CAMPUS passed test Connectivity
Testing server: RiverBank\RB-CAMPUS
Starting test: Connectivity
* Active Directory LDAP Services Check
RB-CAMPUS.currentTime = 20090127170250.0Z
RB-CAMPUS.highestCommittedUSN = 957208
RB-CAMPUS.isSynchronized = 1
RB-CAMPUS.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: RB-CAMPUS ... OK.
* Active Directory RPC Services Check
......................... RB-CAMPUS passed test Connectivity
Testing server: DistrictOffice\WUSD-DC2
Starting test: Connectivity
* Active Directory LDAP Services Check
WUSD-DC2.currentTime = 20090127170450.0Z
WUSD-DC2.highestCommittedUSN = 1908386
WUSD-DC2.isSynchronized = 1
WUSD-DC2.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WUSD-DC2 ... OK.
* Active Directory RPC Services Check
The clock difference between the home server RCHS-TMPDC and target
server WUSD-DC2 is greater than one minute. This may cause Kerberos
authentication failures. Please check that the time service is working
properly. You may need to resynchonize the time between these servers.
......................... WUSD-DC2 passed test Connectivity
Testing server: NewHighSchool\WUSD-TMPDC
Starting test: Connectivity
* Active Directory LDAP Services Check
WUSD-TMPDC.currentTime = 20090127170250.0Z
WUSD-TMPDC.highestCommittedUSN = 847139
WUSD-TMPDC.isSynchronized = 1
WUSD-TMPDC.isGlobalCatalogReady = 1
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: WUSD-TMPDC ... OK.
* Active Directory RPC Services Check
......................... WUSD-TMPDC passed test Connectivity
Testing server: NewHighSchool\RCHS-TMPDC
Starting test: Connectivity
* Active Directory LDAP Services Check
Determining IP4 connectivity
Determining IP6 connectivity
Failure Analysis: RCHS-TMPDC ... OK.
* Active Directory RPC Services Check
......................... RCHS-TMPDC passed test Connectivity
Doing primary tests
Testing server: DistrictOffice\WUSD-DC1
Starting test: Advertising
The DC WUSD-DC1 is advertising itself as a DC and having a DS.
The DC WUSD-DC1 is advertising as an LDAP server
The DC WUSD-DC1 is advertising as having a writeable directory
The DC WUSD-DC1 is advertising as a Key Distribution Center
The DC WUSD-DC1 is advertising as a time server
......................... WUSD-DC1 passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC1
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/WUSD
* SPN found :LDAP/726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/726e2d0a-8354-4b0e-a51c-3d22421421f1/wusd.k12.ca.us
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC1
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
[WUSD-DC1] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WUSD-DC1] Unable to query the list of KCC connection failures.
Continuing...
[WUSD-DC1] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WUSD-DC1 passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC1 passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
The event log File Replication Service on server
wusd-dc1.wusd.k12.ca.us could not be queried, error 0x5
"Access is denied."
......................... WUSD-DC1 failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
The event log DFS Replication on server wusd-dc1.wusd.k12.ca.us could
not be queried, error 0x5 "Access is denied."
......................... WUSD-DC1 failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC1 failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC1 failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
The event log Directory Service on server wusd-dc1.wusd.k12.ca.us
could not be queried, error 0x5 "Access is denied."
......................... WUSD-DC1 failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WUSD-DC1 passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC1
* SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/WUSD
* SPN found :LDAP/726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/726e2d0a-8354-4b0e-a51c-3d22421421f1/wusd.k12.ca.us
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC1
* SPN found :HOST/wusd-dc1.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
......................... WUSD-DC1 passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WUSD-DC1.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
......................... WUSD-DC1 passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WUSD-DC1\netlogon
Verified share \\WUSD-DC1\sysvol
[WUSD-DC1] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WUSD-DC1 failed test NetLogons
Starting test: ObjectsReplicated
WUSD-DC1 is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WUSD-DC1 passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WUSD-DC1 passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
[Replications Check,WUSD-DC1] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WUSD-DC1 failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 14107 to 14606
* rIDPreviousAllocationPool is 14107 to 14606
* rIDNextRID: 14187
......................... WUSD-DC1 passed test RidManager
Starting test: Services
Could not open Service Control Manager on wusd-dc1.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WUSD-DC1 failed test Services
Starting test: SystemLog
* The System Event log test
The event log System on server wusd-dc1.wusd.k12.ca.us could not be
queried, error 0x5 "Access is denied."
......................... WUSD-DC1 failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC1 passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WUSD-DC1 passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WUSD-DC1,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WUSD-DC1 passed test VerifyReferences
Starting test: VerifyReplicas
......................... WUSD-DC1 passed test VerifyReplicas
Testing server: AlyceNorman\AN-ADMIN
Starting test: Advertising
The DC AN-ADMIN is advertising itself as a DC and having a DS.
The DC AN-ADMIN is advertising as an LDAP server
The DC AN-ADMIN is advertising as having a writeable directory
The DC AN-ADMIN is advertising as a Key Distribution Center
The DC AN-ADMIN is advertising as a time server
The DS AN-ADMIN is advertising as a GC.
......................... AN-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC AN-ADMIN for domain wusd.k12.ca.us in site AlyceNorman
Checking machine account for DC AN-ADMIN on DC AN-ADMIN.
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/AN-ADMIN
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2/wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[AN-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[AN-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[AN-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... AN-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... AN-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\AN-ADMIN:File Replication Service:
Access is denied.
......................... AN-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\AN-ADMIN:DFS Replication:
Access is denied.
......................... AN-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... AN-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... AN-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\AN-ADMIN:Directory Service:
Access is denied.
......................... AN-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... AN-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC AN-ADMIN on DC AN-ADMIN.
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/AN-ADMIN
* SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2/wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us
* SPN found :HOST/AN-ADMIN
* SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... AN-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC AN-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
AN-ADMIN.currentTime = 20090127170321.0Z
AN-ADMIN.highestCommittedUSN = 4390691
AN-ADMIN.isSynchronized = 1
AN-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... AN-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\AN-ADMIN\netlogon
Verified share \\AN-ADMIN\sysvol
[AN-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... AN-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
AN-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... AN-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... AN-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,AN-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... AN-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 6107 to 6606
* rIDPreviousAllocationPool is 6107 to 6606
* rIDNextRID: 6260
......................... AN-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on AN-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... AN-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\AN-ADMIN:System:
Access is denied.
......................... AN-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... AN-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... AN-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=AN-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... AN-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... AN-ADMIN passed test VerifyReplicas
Testing server: BridgewayIsland\BI-ADMIN
Starting test: Advertising
The DC BI-ADMIN is advertising itself as a DC and having a DS.
The DC BI-ADMIN is advertising as an LDAP server
The DC BI-ADMIN is advertising as having a writeable directory
The DC BI-ADMIN is advertising as a Key Distribution Center
The DC BI-ADMIN is advertising as a time server
The DS BI-ADMIN is advertising as a GC.
......................... BI-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC BI-ADMIN for domain wusd.k12.ca.us in site BridgewayIsland
Checking machine account for DC BI-ADMIN on DC BI-ADMIN.
* SPN found :LDAP/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/bi-admin.wusd.k12.ca.us
* SPN found :LDAP/BI-ADMIN
* SPN found :LDAP/bi-admin.wusd.k12.ca.us/WUSD
* SPN found :LDAP/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0/wusd.k12.ca.us
* SPN found :HOST/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/bi-admin.wusd.k12.ca.us
* SPN found :HOST/BI-ADMIN
* SPN found :HOST/bi-admin.wusd.k12.ca.us/WUSD
* SPN found :GC/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
[BI-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[BI-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[BI-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... BI-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... BI-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\BI-ADMIN:File Replication Service:
Access is denied.
......................... BI-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\BI-ADMIN:DFS Replication:
Access is denied.
......................... BI-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... BI-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... BI-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\BI-ADMIN:Directory Service:
Access is denied.
......................... BI-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... BI-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC BI-ADMIN on DC BI-ADMIN.
* SPN found :LDAP/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/bi-admin.wusd.k12.ca.us
* SPN found :LDAP/BI-ADMIN
* SPN found :LDAP/bi-admin.wusd.k12.ca.us/WUSD
* SPN found :LDAP/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0/wusd.k12.ca.us
* SPN found :HOST/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/bi-admin.wusd.k12.ca.us
* SPN found :HOST/BI-ADMIN
* SPN found :HOST/bi-admin.wusd.k12.ca.us/WUSD
* SPN found :GC/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
......................... BI-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC BI-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
BI-ADMIN.currentTime = 20090127170345.0Z
BI-ADMIN.highestCommittedUSN = 5274771
BI-ADMIN.isSynchronized = 1
BI-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... BI-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\BI-ADMIN\netlogon
Verified share \\BI-ADMIN\sysvol
[BI-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... BI-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
BI-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... BI-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... BI-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,BI-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... BI-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 4607 to 5106
* rIDPreviousAllocationPool is 4607 to 5106
* rIDNextRID: 4760
......................... BI-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on bi-admin.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... BI-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\BI-ADMIN:System:
Access is denied.
......................... BI-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... BI-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... BI-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=BI-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... BI-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... BI-ADMIN passed test VerifyReplicas
Testing server: Bryte\BT-ADMIN
Starting test: Advertising
The DC BT-ADMIN is advertising itself as a DC and having a DS.
The DC BT-ADMIN is advertising as an LDAP server
The DC BT-ADMIN is advertising as having a writeable directory
The DC BT-ADMIN is advertising as a Key Distribution Center
The DC BT-ADMIN is advertising as a time server
The DS BT-ADMIN is advertising as a GC.
......................... BT-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC BT-ADMIN for domain wusd.k12.ca.us in site Bryte
Checking machine account for DC BT-ADMIN on DC BT-ADMIN.
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/BT-ADMIN
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/abe39041-dee2-4e2a-906c-06c0beda2372/wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[BT-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[BT-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[BT-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... BT-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... BT-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\BT-ADMIN:File Replication Service:
Access is denied.
......................... BT-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\BT-ADMIN:DFS Replication:
Access is denied.
......................... BT-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... BT-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... BT-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\BT-ADMIN:Directory Service:
Access is denied.
......................... BT-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... BT-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC BT-ADMIN on DC BT-ADMIN.
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/BT-ADMIN
* SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/abe39041-dee2-4e2a-906c-06c0beda2372/wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us
* SPN found :HOST/BT-ADMIN
* SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... BT-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC BT-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
BT-ADMIN.currentTime = 20090127170410.0Z
BT-ADMIN.highestCommittedUSN = 4689909
BT-ADMIN.isSynchronized = 1
BT-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... BT-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\BT-ADMIN\netlogon
Verified share \\BT-ADMIN\sysvol
[BT-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... BT-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
BT-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... BT-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... BT-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,BT-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... BT-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 6607 to 7106
* rIDPreviousAllocationPool is 6607 to 7106
* rIDNextRID: 6734
......................... BT-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on BT-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... BT-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\BT-ADMIN:System:
Access is denied.
......................... BT-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... BT-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... BT-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=BT-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... BT-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... BT-ADMIN passed test VerifyReplicas
Testing server: Elkhorn\ELK-ADMIN
Starting test: Advertising
The DC ELK-ADMIN is advertising itself as a DC and having a DS.
The DC ELK-ADMIN is advertising as an LDAP server
The DC ELK-ADMIN is advertising as having a writeable directory
The DC ELK-ADMIN is advertising as a Key Distribution Center
The DC ELK-ADMIN is advertising as a time server
The DS ELK-ADMIN is advertising as a GC.
......................... ELK-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC ELK-ADMIN for domain wusd.k12.ca.us in site Elkhorn
Checking machine account for DC ELK-ADMIN on DC ELK-ADMIN.
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/ELK-ADMIN
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/13050545-307f-4a3b-b17b-0a1f0ebd6265/wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[ELK-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[ELK-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[ELK-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... ELK-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... ELK-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\ELK-ADMIN:File Replication Service:
Access is denied.
......................... ELK-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\ELK-ADMIN:DFS Replication:
Access is denied.
......................... ELK-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... ELK-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... ELK-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\ELK-ADMIN:Directory Service:
Access is denied.
......................... ELK-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... ELK-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC ELK-ADMIN on DC ELK-ADMIN.
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/ELK-ADMIN
* SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/13050545-307f-4a3b-b17b-0a1f0ebd6265/wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us
* SPN found :HOST/ELK-ADMIN
* SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... ELK-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC ELK-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
ELK-ADMIN.currentTime = 20090127170431.0Z
ELK-ADMIN.highestCommittedUSN = 4570627
ELK-ADMIN.isSynchronized = 1
ELK-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... ELK-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\ELK-ADMIN\netlogon
Verified share \\ELK-ADMIN\sysvol
[ELK-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... ELK-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
ELK-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... ELK-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... ELK-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,ELK-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... ELK-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 7607 to 8106
* rIDPreviousAllocationPool is 7607 to 8106
* rIDNextRID: 7787
......................... ELK-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on ELK-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... ELK-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\ELK-ADMIN:System:
Access is denied.
......................... ELK-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... ELK-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... ELK-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=ELK-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... ELK-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... ELK-ADMIN passed test VerifyReplicas
Testing server: Evergreen\EV-ADMIN
Starting test: Advertising
The DC EV-ADMIN is advertising itself as a DC and having a DS.
The DC EV-ADMIN is advertising as an LDAP server
The DC EV-ADMIN is advertising as having a writeable directory
The DC EV-ADMIN is advertising as a Key Distribution Center
The DC EV-ADMIN is advertising as a time server
The DS EV-ADMIN is advertising as a GC.
......................... EV-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC EV-ADMIN for domain wusd.k12.ca.us in site Evergreen
Checking machine account for DC EV-ADMIN on DC EV-ADMIN.
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/EV-ADMIN
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/3f349957-da42-43bb-b8c1-ac5e984bd02c/wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[EV-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[EV-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[EV-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... EV-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... EV-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\EV-ADMIN:File Replication Service:
Access is denied.
......................... EV-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\EV-ADMIN:DFS Replication:
Access is denied.
......................... EV-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... EV-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... EV-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\EV-ADMIN:Directory Service:
Access is denied.
......................... EV-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... EV-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC EV-ADMIN on DC EV-ADMIN.
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/EV-ADMIN
* SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/3f349957-da42-43bb-b8c1-ac5e984bd02c/wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us
* SPN found :HOST/EV-ADMIN
* SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... EV-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC EV-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
EV-ADMIN.currentTime = 20090127170449.0Z
EV-ADMIN.highestCommittedUSN = 6618960
EV-ADMIN.isSynchronized = 1
EV-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... EV-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\EV-ADMIN\netlogon
Verified share \\EV-ADMIN\sysvol
[EV-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... EV-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
EV-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... EV-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... EV-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,EV-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... EV-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 3607 to 4106
* rIDPreviousAllocationPool is 3607 to 4106
* rIDNextRID: 3736
......................... EV-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on EV-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... EV-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\EV-ADMIN:System:
Access is denied.
......................... EV-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... EV-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... EV-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=EV-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... EV-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... EV-ADMIN passed test VerifyReplicas
Testing server: Westfield\WF-ADMIN
Starting test: Advertising
The DC WF-ADMIN is advertising itself as a DC and having a DS.
The DC WF-ADMIN is advertising as an LDAP server
The DC WF-ADMIN is advertising as having a writeable directory
The DC WF-ADMIN is advertising as a Key Distribution Center
The DC WF-ADMIN is advertising as a time server
The DS WF-ADMIN is advertising as a GC.
......................... WF-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WF-ADMIN for domain wusd.k12.ca.us in site Westfield
Checking machine account for DC WF-ADMIN on DC WF-ADMIN.
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/WF-ADMIN
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2f5849a9-7eb5-403e-85fc-22b7f325b93a/wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[WF-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WF-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[WF-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WF-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WF-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\WF-ADMIN:File Replication Service:
Access is denied.
......................... WF-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\WF-ADMIN:DFS Replication:
Access is denied.
......................... WF-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WF-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WF-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\WF-ADMIN:Directory Service:
Access is denied.
......................... WF-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WF-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WF-ADMIN on DC WF-ADMIN.
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/WF-ADMIN
* SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2f5849a9-7eb5-403e-85fc-22b7f325b93a/wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us
* SPN found :HOST/WF-ADMIN
* SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... WF-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WF-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WF-ADMIN.currentTime = 20090127170515.0Z
WF-ADMIN.highestCommittedUSN = 3986651
WF-ADMIN.isSynchronized = 1
WF-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WF-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WF-ADMIN\netlogon
Verified share \\WF-ADMIN\sysvol
[WF-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WF-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
WF-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WF-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WF-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,WF-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WF-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 7107 to 7606
* rIDPreviousAllocationPool is 7107 to 7606
* rIDNextRID: 7232
......................... WF-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on WF-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WF-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\WF-ADMIN:System:
Access is denied.
......................... WF-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WF-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WF-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WF-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WF-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... WF-ADMIN passed test VerifyReplicas
Testing server: SouthPort\SP-ADMIN
Starting test: Advertising
The DC SP-ADMIN is advertising itself as a DC and having a DS.
The DC SP-ADMIN is advertising as an LDAP server
The DC SP-ADMIN is advertising as having a writeable directory
The DC SP-ADMIN is advertising as a Key Distribution Center
The DC SP-ADMIN is advertising as a time server
The DS SP-ADMIN is advertising as a GC.
......................... SP-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC SP-ADMIN for domain wusd.k12.ca.us in site SouthPort
Checking machine account for DC SP-ADMIN on DC SP-ADMIN.
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/SP-ADMIN
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94/wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[SP-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[SP-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[SP-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... SP-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... SP-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\SP-ADMIN:File Replication Service:
Access is denied.
......................... SP-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\SP-ADMIN:DFS Replication:
Access is denied.
......................... SP-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... SP-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... SP-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\SP-ADMIN:Directory Service:
Access is denied.
......................... SP-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... SP-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC SP-ADMIN on DC SP-ADMIN.
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/SP-ADMIN
* SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94/wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us
* SPN found :HOST/SP-ADMIN
* SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... SP-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC SP-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SP-ADMIN.currentTime = 20090127170540.0Z
SP-ADMIN.highestCommittedUSN = 3601966
SP-ADMIN.isSynchronized = 1
SP-ADMIN.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... SP-ADMIN passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\SP-ADMIN\netlogon
Verified share \\SP-ADMIN\sysvol
[SP-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... SP-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
SP-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... SP-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... SP-ADMIN passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,SP-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... SP-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 9107 to 9606
* rIDPreviousAllocationPool is 9107 to 9606
* rIDNextRID: 9186
......................... SP-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on SP-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... SP-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\SP-ADMIN:System:
Access is denied.
......................... SP-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... SP-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... SP-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=SP-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... SP-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... SP-ADMIN passed test VerifyReplicas
Testing server: Westmore\WM-CAMPUS
Starting test: Advertising
The DC WM-CAMPUS is advertising itself as a DC and having a DS.
The DC WM-CAMPUS is advertising as an LDAP server
The DC WM-CAMPUS is advertising as having a writeable directory
The DC WM-CAMPUS is advertising as a Key Distribution Center
The DC WM-CAMPUS is advertising as a time server
The DS WM-CAMPUS is advertising as a GC.
......................... WM-CAMPUS passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WM-CAMPUS for domain wusd.k12.ca.us in site Westmore
Checking machine account for DC WM-CAMPUS on DC WM-CAMPUS.
* SPN found :LDAP/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wm-campus.wusd.k12.ca.us
* SPN found :LDAP/WM-CAMPUS
* SPN found :LDAP/wm-campus.wusd.k12.ca.us/WUSD
* SPN found :LDAP/a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/a86aa50f-8b4e-4eac-87b7-503614be8e34/wusd.k12.ca.us
* SPN found :HOST/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wm-campus.wusd.k12.ca.us
* SPN found :HOST/WM-CAMPUS
* SPN found :HOST/wm-campus.wusd.k12.ca.us/WUSD
* SPN found :GC/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
[WM-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WM-CAMPUS] Unable to query the list of KCC connection failures.
Continuing...
[WM-CAMPUS] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WM-CAMPUS passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WM-CAMPUS passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\WM-CAMPUS:File Replication Service:
Access is denied.
......................... WM-CAMPUS failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\WM-CAMPUS:DFS Replication:
Access is denied.
......................... WM-CAMPUS failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WM-CAMPUS failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WM-CAMPUS failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\WM-CAMPUS:Directory Service:
Access is denied.
......................... WM-CAMPUS failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WM-CAMPUS passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WM-CAMPUS on DC WM-CAMPUS.
* SPN found :LDAP/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wm-campus.wusd.k12.ca.us
* SPN found :LDAP/WM-CAMPUS
* SPN found :LDAP/wm-campus.wusd.k12.ca.us/WUSD
* SPN found :LDAP/a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/a86aa50f-8b4e-4eac-87b7-503614be8e34/wusd.k12.ca.us
* SPN found :HOST/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wm-campus.wusd.k12.ca.us
* SPN found :HOST/WM-CAMPUS
* SPN found :HOST/wm-campus.wusd.k12.ca.us/WUSD
* SPN found :GC/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
......................... WM-CAMPUS passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WM-CAMPUS.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WM-CAMPUS.currentTime = 20090127170604.0Z
WM-CAMPUS.highestCommittedUSN = 2804369
WM-CAMPUS.isSynchronized = 1
WM-CAMPUS.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WM-CAMPUS passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WM-CAMPUS\netlogon
Verified share \\WM-CAMPUS\sysvol
[WM-CAMPUS] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WM-CAMPUS failed test NetLogons
Starting test: ObjectsReplicated
WM-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WM-CAMPUS passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WM-CAMPUS passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,WM-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WM-CAMPUS failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 10107 to 10606
* rIDPreviousAllocationPool is 10107 to 10606
* rIDNextRID: 10131
......................... WM-CAMPUS passed test RidManager
Starting test: Services
Could not open Service Control Manager on wm-campus.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WM-CAMPUS failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\WM-CAMPUS:System:
Access is denied.
......................... WM-CAMPUS failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WM-CAMPUS passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WM-CAMPUS passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WM-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WM-CAMPUS passed test VerifyReferences
Starting test: VerifyReplicas
......................... WM-CAMPUS passed test VerifyReplicas
Testing server: NewHighSchool\RCHS-CAMPUS
Starting test: Advertising
The DC RCHS-CAMPUS is advertising itself as a DC and having a DS.
The DC RCHS-CAMPUS is advertising as an LDAP server
The DC RCHS-CAMPUS is advertising as having a writeable directory
The DC RCHS-CAMPUS is advertising as a Key Distribution Center
The DC RCHS-CAMPUS is advertising as a time server
The DS RCHS-CAMPUS is advertising as a GC.
......................... RCHS-CAMPUS passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RCHS-TMPDC for domain rchs.wusd.k12.ca.us in site NewHighSchool
Checking machine account for DC RCHS-CAMPUS on DC RCHS-TMPDC.
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-CAMPUS
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/1ade07c1-fd1d-4af7-827d-325a59a6e1e6/rchs.wusd.k12.ca.us
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-CAMPUS
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/rchs-campus.rchs.wusd.k12.ca.us/wusd.k12.ca.us
Checking for CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
Object is up-to-date on all servers.
[RCHS-CAMPUS] No security related replication errors were found on
this DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... RCHS-CAMPUS passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-CAMPUS passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
......................... RCHS-CAMPUS passed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
There are warning or error events within the last 24 hours after the
SYSVOL has been shared. Failing SYSVOL replication problems may cause
Group Policy problems.
An Warning Event occurred. EventID: 0x800005F4
Time Generated: 01/26/2009 22:47:29
(Event String (event log = DFS Replication) could not be retrieved,
error 0x13d)
......................... RCHS-CAMPUS passed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-CAMPUS passed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-CAMPUS passed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
......................... RCHS-CAMPUS passed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... RCHS-CAMPUS passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC RCHS-CAMPUS on DC RCHS-CAMPUS.
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-CAMPUS
* SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/1ade07c1-fd1d-4af7-827d-325a59a6e1e6/rchs.wusd.k12.ca.us
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-CAMPUS
* SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/rchs-campus.rchs.wusd.k12.ca.us/wusd.k12.ca.us
......................... RCHS-CAMPUS passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC RCHS-CAMPUS.
* Security Permissions Check for
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
RCHS-CAMPUS.currentTime = 20090127170622.0Z
RCHS-CAMPUS.highestCommittedUSN = 5703079
RCHS-CAMPUS.isSynchronized = 1
RCHS-CAMPUS.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... RCHS-CAMPUS passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\RCHS-CAMPUS\netlogon
Verified share \\RCHS-CAMPUS\sysvol
......................... RCHS-CAMPUS passed test NetLogons
Starting test: ObjectsReplicated
RCHS-CAMPUS is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... RCHS-CAMPUS passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... RCHS-CAMPUS passed test
OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
* Replication Latency Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
11 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
9 were retired Invocations. 2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
......................... RCHS-CAMPUS passed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 10104 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 9104 to 9603
* rIDPreviousAllocationPool is 9104 to 9603
* rIDNextRID: 9341
......................... RCHS-CAMPUS passed test RidManager
Starting test: Services
* Checking Service: EventSystem
* Checking Service: RpcSs
* Checking Service: DnsCache
* Checking Service: NtFrs
* Checking Service: IsmServ
* Checking Service: kdc
* Checking Service: SamSs
* Checking Service: LanmanServer
* Checking Service: LanmanWorkstation
* Checking Service: w32time
* Checking Service: NETLOGON
......................... RCHS-CAMPUS passed test Services
Starting test: SystemLog
* The System Event log test
An Error Event occurred. EventID: 0x00000457
Time Generated: 01/27/2009 08:27:51
(Event String (event log = System) could not be retrieved, error
0x13d)
An Warning Event occurred. EventID: 0x8000000E
Time Generated: 01/27/2009 08:28:56
Event String:
There were password errors using the Credential
Manager. To remedy, launch the Stored User Names
and Passwords control panel applet, and reenter
the password for the credential WUSD.
An Warning Event occurred. EventID: 0x8000A000
Time Generated: 01/27/2009 08:28:56
Event String:
The Security System detected an authentication
error for the server cifs/wusd-dc01. The failure
code from authentication protocol Kerberos was
"The attempted logon is invalid. This is either due to a bad username or authentication information.
(0xc000006d)".
An Warning Event occurred. EventID: 0x8000A000
Time Generated: 01/27/2009 08:28:56
Event String:
The Security System detected an authentication
error for the server
cifs/wusd-dc01.wusd.k12.ca.us. The failure code
from authentication protocol Kerberos was
"The attempted logon is invalid. This is either due to a bad username or authentication information.
(0xc000006d)".
An Error Event occurred. EventID: 0x00000457
Time Generated: 01/27/2009 08:30:05
(Event String (event log = System) could not be retrieved, error
0x13d)
......................... RCHS-CAMPUS failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-CAMPUS passed test Topology
Starting test: VerifyEnterpriseReferences
......................... RCHS-CAMPUS passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=RCHS-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... RCHS-CAMPUS passed test VerifyReferences
Starting test: VerifyReplicas
......................... RCHS-CAMPUS passed test VerifyReplicas
Testing server: DistrictOffice\RCHS-DC02
Starting test: Advertising
The DC RCHS-DC02 is advertising itself as a DC and having a DS.
The DC RCHS-DC02 is advertising as an LDAP server
The DC RCHS-DC02 is advertising as having a writeable directory
The DC RCHS-DC02 is advertising as a Key Distribution Center
The DC RCHS-DC02 is advertising as a time server
The DS RCHS-DC02 is advertising as a GC.
......................... RCHS-DC02 passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RCHS-DC02 for domain rchs.wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC RCHS-DC02 on DC RCHS-DC02.
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-DC02
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02329cde-05de-4208-9935-0ec4743e6fba/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/RCHS-DC02.rchs.wusd.k12.ca.us/wusd.k12.ca.us
[RCHS-DC02] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... RCHS-DC02 passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-DC02 passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
......................... RCHS-DC02 passed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
......................... RCHS-DC02 passed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-DC02 passed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-DC02 passed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
......................... RCHS-DC02 passed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... RCHS-DC02 passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC RCHS-DC02 on DC RCHS-DC02.
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-DC02
* SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02329cde-05de-4208-9935-0ec4743e6fba/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-DC02
* SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/RCHS-DC02.rchs.wusd.k12.ca.us/wusd.k12.ca.us
......................... RCHS-DC02 passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC RCHS-DC02.
* Security Permissions Check for
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
RCHS-DC02.currentTime = 20090127170636.0Z
RCHS-DC02.highestCommittedUSN = 6556414
RCHS-DC02.isSynchronized = 1
RCHS-DC02.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... RCHS-DC02 passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\RCHS-DC02\netlogon
Verified share \\RCHS-DC02\sysvol
......................... RCHS-DC02 passed test NetLogons
Starting test: ObjectsReplicated
RCHS-DC02 is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... RCHS-DC02 passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... RCHS-DC02 passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
* Replication Latency Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
11 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
9 were retired Invocations. 2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
......................... RCHS-DC02 passed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 10104 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 3104 to 3603
* rIDPreviousAllocationPool is 3104 to 3603
* rIDNextRID: 3304
......................... RCHS-DC02 passed test RidManager
Starting test: Services
* Checking Service: EventSystem
* Checking Service: RpcSs
* Checking Service: DnsCache
* Checking Service: NtFrs
* Checking Service: IsmServ
* Checking Service: kdc
* Checking Service: SamSs
* Checking Service: LanmanServer
* Checking Service: LanmanWorkstation
* Checking Service: w32time
* Checking Service: NETLOGON
......................... RCHS-DC02 passed test Services
Starting test: SystemLog
* The System Event log test
Found no errors in "System" Event log in the last 60 minutes.
......................... RCHS-DC02 passed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-DC02 passed test Topology
Starting test: VerifyEnterpriseReferences
......................... RCHS-DC02 passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=RCHS-DC02,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... RCHS-DC02 passed test VerifyReferences
Starting test: VerifyReplicas
......................... RCHS-DC02 passed test VerifyReplicas
Testing server: DistrictOffice\WUSD-DC01
Starting test: Advertising
The DC WUSD-DC01 is advertising itself as a DC and having a DS.
The DC WUSD-DC01 is advertising as an LDAP server
The DC WUSD-DC01 is advertising as having a writeable directory
The DC WUSD-DC01 is advertising as a Key Distribution Center
The DC WUSD-DC01 is advertising as a time server
The DS WUSD-DC01 is advertising as a GC.
......................... WUSD-DC01 passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC01 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC01
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/WUSD
* SPN found :LDAP/37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/37beb541-54e8-4189-b0ae-0d56719fafa3/wusd.k12.ca.us
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC01
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
Checking for CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
Object is up-to-date on all servers.
[WUSD-DC01] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WUSD-DC01] Unable to query the list of KCC connection failures.
Continuing...
[WUSD-DC01] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WUSD-DC01 passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC01 passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\WUSD-DC01:File Replication Service:
Access is denied.
......................... WUSD-DC01 failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\WUSD-DC01:DFS Replication:
Access is denied.
......................... WUSD-DC01 failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC01 failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC01 failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\WUSD-DC01:Directory Service:
Access is denied.
......................... WUSD-DC01 failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WUSD-DC01 passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WUSD-DC01 on DC WUSD-DC01.
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC01
* SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/WUSD
* SPN found :LDAP/37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/37beb541-54e8-4189-b0ae-0d56719fafa3/wusd.k12.ca.us
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC01
* SPN found :HOST/wusd-dc01.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
......................... WUSD-DC01 passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WUSD-DC01.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WUSD-DC01.currentTime = 20090127170619.0Z
WUSD-DC01.highestCommittedUSN = 13128420
WUSD-DC01.isSynchronized = 1
WUSD-DC01.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WUSD-DC01 passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WUSD-DC01\netlogon
Verified share \\WUSD-DC01\sysvol
[WUSD-DC01] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WUSD-DC01 failed test NetLogons
Starting test: ObjectsReplicated
WUSD-DC01 is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WUSD-DC01 passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WUSD-DC01 passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,WUSD-DC01] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WUSD-DC01 failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 12107 to 12606
* rIDPreviousAllocationPool is 11607 to 12106
* rIDNextRID: 12086
* Warning :There is less than 5% available RIDs in the current pool
......................... WUSD-DC01 passed test RidManager
Starting test: Services
Could not open Service Control Manager on wusd-dc01.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WUSD-DC01 failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\WUSD-DC01:System:
Access is denied.
......................... WUSD-DC01 failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC01 passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WUSD-DC01 passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WUSD-DC01,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WUSD-DC01 passed test VerifyReferences
Starting test: VerifyReplicas
......................... WUSD-DC01 passed test VerifyReplicas
Testing server: DistrictOffice\WUSD-DC02
Starting test: Advertising
The DC WUSD-DC02 is advertising itself as a DC and having a DS.
The DC WUSD-DC02 is advertising as an LDAP server
The DC WUSD-DC02 is advertising as having a writeable directory
The DC WUSD-DC02 is advertising as a Key Distribution Center
The DC WUSD-DC02 is advertising as a time server
The DS WUSD-DC02 is advertising as a GC.
......................... WUSD-DC02 passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC02 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC02
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/WUSD
* SPN found :LDAP/c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c5105bc1-2b24-4573-8711-8622336e982e/wusd.k12.ca.us
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC02
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
Checking for CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
Object is up-to-date on all servers.
[WUSD-DC02] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WUSD-DC02] Unable to query the list of KCC connection failures.
Continuing...
[WUSD-DC02] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WUSD-DC02 passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC02 passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\WUSD-DC02:File Replication Service:
Access is denied.
......................... WUSD-DC02 failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\WUSD-DC02:DFS Replication:
Access is denied.
......................... WUSD-DC02 failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC02 failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC02 failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\WUSD-DC02:Directory Service:
Access is denied.
......................... WUSD-DC02 failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WUSD-DC02 passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WUSD-DC02 on DC WUSD-DC02.
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC02
* SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/WUSD
* SPN found :LDAP/c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c5105bc1-2b24-4573-8711-8622336e982e/wusd.k12.ca.us
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC02
* SPN found :HOST/wusd-dc02.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
......................... WUSD-DC02 passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WUSD-DC02.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WUSD-DC02.currentTime = 20090127170710.0Z
WUSD-DC02.highestCommittedUSN = 12836447
WUSD-DC02.isSynchronized = 1
WUSD-DC02.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WUSD-DC02 passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WUSD-DC02\netlogon
Verified share \\WUSD-DC02\sysvol
[WUSD-DC02] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WUSD-DC02 failed test NetLogons
Starting test: ObjectsReplicated
WUSD-DC02 is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WUSD-DC02 passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WUSD-DC02 passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,WUSD-DC02] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WUSD-DC02 failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 15607 to 16106
* rIDPreviousAllocationPool is 15607 to 16106
* rIDNextRID: 15840
......................... WUSD-DC02 passed test RidManager
Starting test: Services
Could not open Service Control Manager on wusd-dc02.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WUSD-DC02 failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\WUSD-DC02:System:
Access is denied.
......................... WUSD-DC02 failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC02 passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WUSD-DC02 passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WUSD-DC02,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WUSD-DC02 passed test VerifyReferences
Starting test: VerifyReplicas
......................... WUSD-DC02 passed test VerifyReplicas
Testing server: NewHighSchool\RCHS-ADMIN
Starting test: Advertising
The DC RCHS-ADMIN is advertising itself as a DC and having a DS.
The DC RCHS-ADMIN is advertising as an LDAP server
The DC RCHS-ADMIN is advertising as having a writeable directory
The DC RCHS-ADMIN is advertising as a Key Distribution Center
The DC RCHS-ADMIN is advertising as a time server
......................... RCHS-ADMIN passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RCHS-ADMIN for domain wusd.k12.ca.us in site NewHighSchool
Checking machine account for DC RCHS-ADMIN on DC RCHS-ADMIN.
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/RCHS-ADMIN
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/ee694a22-0e78-4716-82c2-81c32084b26a/wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
[RCHS-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[RCHS-ADMIN] Unable to query the list of KCC connection failures.
Continuing...
[RCHS-ADMIN] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... RCHS-ADMIN passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-ADMIN passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\RCHS-ADMIN:File Replication Service:
Access is denied.
......................... RCHS-ADMIN failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\RCHS-ADMIN:DFS Replication:
Access is denied.
......................... RCHS-ADMIN failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... RCHS-ADMIN failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... RCHS-ADMIN failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\RCHS-ADMIN:Directory Service:
Access is denied.
......................... RCHS-ADMIN failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... RCHS-ADMIN passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC RCHS-ADMIN on DC RCHS-ADMIN.
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us
* SPN found :LDAP/RCHS-ADMIN
* SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :LDAP/ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/ee694a22-0e78-4716-82c2-81c32084b26a/wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us
* SPN found :HOST/RCHS-ADMIN
* SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/WUSD
* SPN found :GC/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
......................... RCHS-ADMIN passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC RCHS-ADMIN.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
Ldap search capabality attribute search failed on server RCHS-ADMIN,
return value = 81
......................... RCHS-ADMIN failed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\RCHS-ADMIN\netlogon
Verified share \\RCHS-ADMIN\sysvol
[RCHS-ADMIN] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... RCHS-ADMIN failed test NetLogons
Starting test: ObjectsReplicated
RCHS-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... RCHS-ADMIN passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... RCHS-ADMIN passed test
OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 22 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
[Replications Check,RCHS-ADMIN] DsReplicaGetInfo(CURSORS,
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us) failed, error 0x20f8
"The naming context specified for this replication operation is invalid."
......................... RCHS-ADMIN failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 5607 to 6106
* rIDPreviousAllocationPool is 5607 to 6106
* rIDNextRID: 5813
......................... RCHS-ADMIN passed test RidManager
Starting test: Services
Could not open Service Control Manager on RCHS-ADMIN.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... RCHS-ADMIN failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\RCHS-ADMIN:System:
Access is denied.
......................... RCHS-ADMIN failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-ADMIN passed test Topology
Starting test: VerifyEnterpriseReferences
......................... RCHS-ADMIN passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=RCHS-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... RCHS-ADMIN passed test VerifyReferences
Starting test: VerifyReplicas
......................... RCHS-ADMIN passed test VerifyReplicas
Testing server: StoneGate\SG-CAMPUS
Starting test: Advertising
The DC SG-CAMPUS is advertising itself as a DC and having a DS.
The DC SG-CAMPUS is advertising as an LDAP server
The DC SG-CAMPUS is advertising as having a writeable directory
The DC SG-CAMPUS is advertising as a Key Distribution Center
The DC SG-CAMPUS is advertising as a time server
The DS SG-CAMPUS is advertising as a GC.
......................... SG-CAMPUS passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC SG-CAMPUS for domain wusd.k12.ca.us in site StoneGate
Checking machine account for DC SG-CAMPUS on DC SG-CAMPUS.
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us
* SPN found :LDAP/SG-CAMPUS
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/WUSD
* SPN found :LDAP/c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c983e27e-0a85-4f89-baed-549df9475f34/wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/WUSD
* SPN found :GC/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
[SG-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[SG-CAMPUS] Unable to query the list of KCC connection failures.
Continuing...
[SG-CAMPUS] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... SG-CAMPUS passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... SG-CAMPUS passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\SG-CAMPUS:File Replication Service:
Access is denied.
......................... SG-CAMPUS failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\SG-CAMPUS:DFS Replication:
Access is denied.
......................... SG-CAMPUS failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... SG-CAMPUS failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... SG-CAMPUS failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\SG-CAMPUS:Directory Service:
Access is denied.
......................... SG-CAMPUS failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... SG-CAMPUS passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC SG-CAMPUS on DC SG-CAMPUS.
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us
* SPN found :LDAP/SG-CAMPUS
* SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/WUSD
* SPN found :LDAP/c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c983e27e-0a85-4f89-baed-549df9475f34/wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us
* SPN found :HOST/SG-CAMPUS
* SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/WUSD
* SPN found :GC/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
......................... SG-CAMPUS passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC SG-CAMPUS.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
SG-CAMPUS.currentTime = 20090127170753.0Z
SG-CAMPUS.highestCommittedUSN = 2247273
SG-CAMPUS.isSynchronized = 1
SG-CAMPUS.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... SG-CAMPUS passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\SG-CAMPUS\netlogon
Verified share \\SG-CAMPUS\sysvol
[SG-CAMPUS] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... SG-CAMPUS failed test NetLogons
Starting test: ObjectsReplicated
SG-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... SG-CAMPUS passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... SG-CAMPUS passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 18 cursors.
[Replications Check,SG-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... SG-CAMPUS failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 10607 to 11106
* rIDPreviousAllocationPool is 10607 to 11106
* rIDNextRID: 10711
......................... SG-CAMPUS passed test RidManager
Starting test: Services
Could not open Service Control Manager on SG-CAMPUS.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... SG-CAMPUS failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\SG-CAMPUS:System:
Access is denied.
......................... SG-CAMPUS failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... SG-CAMPUS passed test Topology
Starting test: VerifyEnterpriseReferences
......................... SG-CAMPUS passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=SG-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... SG-CAMPUS passed test VerifyReferences
Starting test: VerifyReplicas
......................... SG-CAMPUS passed test VerifyReplicas
Testing server: RiverBank\RB-CAMPUS
Starting test: Advertising
The DC RB-CAMPUS is advertising itself as a DC and having a DS.
The DC RB-CAMPUS is advertising as an LDAP server
The DC RB-CAMPUS is advertising as having a writeable directory
The DC RB-CAMPUS is advertising as a Key Distribution Center
The DC RB-CAMPUS is advertising as a time server
The DS RB-CAMPUS is advertising as a GC.
......................... RB-CAMPUS passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RB-CAMPUS for domain wusd.k12.ca.us in site RiverBank
Checking machine account for DC RB-CAMPUS on DC RB-CAMPUS.
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us
* SPN found :LDAP/RB-CAMPUS
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us/WUSD
* SPN found :LDAP/8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/8e7bcbe2-8749-4d26-bf07-25b31106f55c/wusd.k12.ca.us
* SPN found :HOST/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/RB-Campus.wusd.k12.ca.us
* SPN found :HOST/RB-CAMPUS
* SPN found :HOST/RB-Campus.wusd.k12.ca.us/WUSD
* SPN found :GC/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
[RB-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[RB-CAMPUS] Unable to query the list of KCC connection failures.
Continuing...
[RB-CAMPUS] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... RB-CAMPUS passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RB-CAMPUS passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
Error 5 opening File Replication Service eventlog
\\RB-CAMPUS:File Replication Service:
Access is denied.
......................... RB-CAMPUS failed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
Error 5 opening DFS Replication eventlog \\RB-CAMPUS:DFS Replication:
Access is denied.
......................... RB-CAMPUS failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... RB-CAMPUS failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... RB-CAMPUS failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Error 5 opening Directory Service eventlog
\\RB-CAMPUS:Directory Service:
Access is denied.
......................... RB-CAMPUS failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... RB-CAMPUS passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC RB-CAMPUS on DC RB-CAMPUS.
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us
* SPN found :LDAP/RB-CAMPUS
* SPN found :LDAP/RB-Campus.wusd.k12.ca.us/WUSD
* SPN found :LDAP/8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/8e7bcbe2-8749-4d26-bf07-25b31106f55c/wusd.k12.ca.us
* SPN found :HOST/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/RB-Campus.wusd.k12.ca.us
* SPN found :HOST/RB-CAMPUS
* SPN found :HOST/RB-Campus.wusd.k12.ca.us/WUSD
* SPN found :GC/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
......................... RB-CAMPUS passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC RB-CAMPUS.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
RB-CAMPUS.currentTime = 20090127170817.0Z
RB-CAMPUS.highestCommittedUSN = 957307
RB-CAMPUS.isSynchronized = 1
RB-CAMPUS.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... RB-CAMPUS passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\RB-CAMPUS\netlogon
Verified share \\RB-CAMPUS\sysvol
[RB-CAMPUS] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... RB-CAMPUS failed test NetLogons
Starting test: ObjectsReplicated
RB-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... RB-CAMPUS passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... RB-CAMPUS passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,RB-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... RB-CAMPUS failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 13107 to 13606
* rIDPreviousAllocationPool is 13107 to 13606
* rIDNextRID: 13176
......................... RB-CAMPUS passed test RidManager
Starting test: Services
Could not open Service Control Manager on RB-Campus.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... RB-CAMPUS failed test Services
Starting test: SystemLog
* The System Event log test
Error 5 opening System eventlog \\RB-CAMPUS:System:
Access is denied.
......................... RB-CAMPUS failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RB-CAMPUS passed test Topology
Starting test: VerifyEnterpriseReferences
......................... RB-CAMPUS passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=RB-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... RB-CAMPUS passed test VerifyReferences
Starting test: VerifyReplicas
......................... RB-CAMPUS passed test VerifyReplicas
Testing server: DistrictOffice\WUSD-DC2
Starting test: Advertising
The DC WUSD-DC2 is advertising itself as a DC and having a DS.
The DC WUSD-DC2 is advertising as an LDAP server
The DC WUSD-DC2 is advertising as having a writeable directory
The DC WUSD-DC2 is advertising as a Key Distribution Center
The DC WUSD-DC2 is advertising as a time server
The DS WUSD-DC2 is advertising as a GC.
......................... WUSD-DC2 passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC2 on DC WUSD-DC1.
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC2
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/WUSD
* SPN found :LDAP/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003/wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/WUSD
* SPN found :GC/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
Checking for CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
Object is up-to-date on all servers.
[WUSD-DC2] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WUSD-DC2] Unable to query the list of KCC connection failures.
Continuing...
[WUSD-DC2] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WUSD-DC2 passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC2 passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
......................... WUSD-DC2 passed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
The event log DFS Replication on server WUSD-DC2.wusd.k12.ca.us could
not be queried, error 0x5 "Access is denied."
......................... WUSD-DC2 failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC2 failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-DC2 failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
The event log Directory Service on server WUSD-DC2.wusd.k12.ca.us
could not be queried, error 0x5 "Access is denied."
......................... WUSD-DC2 failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WUSD-DC2 passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WUSD-DC2 on DC WUSD-DC2.
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us
* SPN found :LDAP/WUSD-DC2
* SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/WUSD
* SPN found :LDAP/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003/wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us
* SPN found :HOST/WUSD-DC2
* SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/WUSD
* SPN found :GC/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
......................... WUSD-DC2 passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WUSD-DC2.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WUSD-DC2.currentTime = 20090127171039.0Z
WUSD-DC2.highestCommittedUSN = 1908706
WUSD-DC2.isSynchronized = 1
WUSD-DC2.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WUSD-DC2 passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WUSD-DC2\netlogon
Verified share \\WUSD-DC2\sysvol
[WUSD-DC2] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WUSD-DC2 failed test NetLogons
Starting test: ObjectsReplicated
WUSD-DC2 is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WUSD-DC2 passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WUSD-DC2 passed test OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
[Replications Check,WUSD-DC2] DsReplicaGetInfo(PENDING_OPS, NULL)
failed, error 0x2105 "Replication access was denied."
......................... WUSD-DC2 failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 15107 to 15606
* rIDPreviousAllocationPool is 15107 to 15606
* rIDNextRID: 15170
......................... WUSD-DC2 passed test RidManager
Starting test: Services
Could not open Service Control Manager on WUSD-DC2.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WUSD-DC2 failed test Services
Starting test: SystemLog
* The System Event log test
The event log System on server WUSD-DC2.wusd.k12.ca.us could not be
queried, error 0x5 "Access is denied."
......................... WUSD-DC2 failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-DC2 passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WUSD-DC2 passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WUSD-DC2,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WUSD-DC2 passed test VerifyReferences
Starting test: VerifyReplicas
......................... WUSD-DC2 passed test VerifyReplicas
Testing server: NewHighSchool\WUSD-TMPDC
Starting test: Advertising
The DC WUSD-TMPDC is advertising itself as a DC and having a DS.
The DC WUSD-TMPDC is advertising as an LDAP server
The DC WUSD-TMPDC is advertising as having a writeable directory
The DC WUSD-TMPDC is advertising as a Key Distribution Center
The DC WUSD-TMPDC is advertising as a time server
The DS WUSD-TMPDC is advertising as a GC.
......................... WUSD-TMPDC passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RCHS-ADMIN for domain wusd.k12.ca.us in site NewHighSchool
Checking machine account for DC WUSD-TMPDC on DC RCHS-ADMIN.
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us
* SPN found :LDAP/WUSD-TMPDC
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/WUSD
* SPN found :LDAP/b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b294c123-5db0-4086-80ce-a99f61b9923d/wusd.k12.ca.us
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us
* SPN found :HOST/WUSD-TMPDC
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
Checking for CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
Object is up-to-date on all servers.
[WUSD-TMPDC] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
error 8453,
Replication access was denied..
[WUSD-TMPDC] Unable to query the list of KCC connection failures.
Continuing...
[WUSD-TMPDC] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... WUSD-TMPDC passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-TMPDC passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
......................... WUSD-TMPDC passed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
The event log DFS Replication on server wusd-tmpdc.wusd.k12.ca.us
could not be queried, error 0x5 "Access is denied."
......................... WUSD-TMPDC failed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-TMPDC failed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
The registry lookup failed to determine the state of the SYSVOL. The
error returned was 0x5 "Access is denied.". Check the FRS event log
to see if the SYSVOL has successfully been shared.
......................... WUSD-TMPDC failed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
The event log Directory Service on server wusd-tmpdc.wusd.k12.ca.us
could not be queried, error 0x5 "Access is denied."
......................... WUSD-TMPDC failed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... WUSD-TMPDC passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC WUSD-TMPDC on DC WUSD-TMPDC.
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us
* SPN found :LDAP/WUSD-TMPDC
* SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/WUSD
* SPN found :LDAP/b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b294c123-5db0-4086-80ce-a99f61b9923d/wusd.k12.ca.us
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us
* SPN found :HOST/WUSD-TMPDC
* SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/WUSD
* SPN found :GC/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
......................... WUSD-TMPDC passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC WUSD-TMPDC.
* Security Permissions Check for
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
WUSD-TMPDC.currentTime = 20090127170858.0Z
WUSD-TMPDC.highestCommittedUSN = 847412
WUSD-TMPDC.isSynchronized = 1
WUSD-TMPDC.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... WUSD-TMPDC passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\WUSD-TMPDC\netlogon
Verified share \\WUSD-TMPDC\sysvol
[WUSD-TMPDC] User credentials does not have permission to perform this
operation.
The account used for this test must have network logon privileges
for this machine's domain.
......................... WUSD-TMPDC failed test NetLogons
Starting test: ObjectsReplicated
WUSD-TMPDC is in domain DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... WUSD-TMPDC passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... WUSD-TMPDC passed test
OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
[Replications Check,WUSD-TMPDC] A recent replication attempt failed:
From RCHS-ADMIN to WUSD-TMPDC
Naming Context: DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
The replication generated an error (8451):
The replication operation encountered a database error.
The failure occurred at 2009-01-27 08:58:48.
The last success occurred at (never).
961 failures have occurred since the last success.
A serious error is preventing replication from continuing.
Consult the error log for further information.
If a particular object is named, it may be necessary to manually
modify or delete the object.
If the condition persists, contact Microsoft Support.
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 18 cursors.
......................... WUSD-TMPDC failed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 16607 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* wusd-dc1.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 16107 to 16606
* rIDPreviousAllocationPool is 16107 to 16606
* rIDNextRID: 16255
......................... WUSD-TMPDC passed test RidManager
Starting test: Services
Could not open Service Control Manager on wusd-tmpdc.wusd.k12.ca.us,
error 0x5 "Access is denied."
......................... WUSD-TMPDC failed test Services
Starting test: SystemLog
* The System Event log test
The event log System on server wusd-tmpdc.wusd.k12.ca.us could not be
queried, error 0x5 "Access is denied."
......................... WUSD-TMPDC failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... WUSD-TMPDC passed test Topology
Starting test: VerifyEnterpriseReferences
......................... WUSD-TMPDC passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
backlink on
CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=WUSD-TMPDC,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... WUSD-TMPDC passed test VerifyReferences
Starting test: VerifyReplicas
......................... WUSD-TMPDC passed test VerifyReplicas
Testing server: NewHighSchool\RCHS-TMPDC
Starting test: Advertising
The DC RCHS-TMPDC is advertising itself as a DC and having a DS.
The DC RCHS-TMPDC is advertising as an LDAP server
The DC RCHS-TMPDC is advertising as having a writeable directory
The DC RCHS-TMPDC is advertising as a Key Distribution Center
The DC RCHS-TMPDC is advertising as a time server
The DS RCHS-TMPDC is advertising as a GC.
......................... RCHS-TMPDC passed test Advertising
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC RCHS-TMPDC for domain rchs.wusd.k12.ca.us in site NewHighSchool
Checking machine account for DC RCHS-TMPDC on DC RCHS-TMPDC.
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-TMPDC
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b1b9edc1-55cc-403f-8477-57f46100bcb5/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/RCHS-TMPDC.rchs.wusd.k12.ca.us/wusd.k12.ca.us
[RCHS-TMPDC] No security related replication errors were found on this
DC! To target the connection to a specific source DC use
/ReplSource:<DC>.
......................... RCHS-TMPDC passed test CheckSecurityError
Starting test: CutoffServers
* Configuration Topology Aliveness Check
* Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-TMPDC passed test CutoffServers
Starting test: FrsEvent
* The File Replication Service Event log test
......................... RCHS-TMPDC passed test FrsEvent
Starting test: DFSREvent
The DFS Replication Event Log.
......................... RCHS-TMPDC passed test DFSREvent
Starting test: SysVolCheck
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-TMPDC passed test SysVolCheck
Starting test: FrsSysVol
* The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
......................... RCHS-TMPDC passed test FrsSysVol
Starting test: KccEvent
* The KCC Event log test
Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
......................... RCHS-TMPDC passed test KccEvent
Starting test: KnowsOfRoleHolders
Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
......................... RCHS-TMPDC passed test KnowsOfRoleHolders
Starting test: MachineAccount
Checking machine account for DC RCHS-TMPDC on DC RCHS-TMPDC.
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us
* SPN found :LDAP/RCHS-TMPDC
* SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
* SPN found :LDAP/b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b1b9edc1-55cc-403f-8477-57f46100bcb5/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us
* SPN found :HOST/RCHS-TMPDC
* SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
* SPN found :GC/RCHS-TMPDC.rchs.wusd.k12.ca.us/wusd.k12.ca.us
......................... RCHS-TMPDC passed test MachineAccount
Starting test: NCSecDesc
* Security Permissions check for all NC's on DC RCHS-TMPDC.
* Security Permissions Check for
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
(NDNC,Version 3)
* Security Permissions Check for
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
(Domain,Version 3)
* Security Permissions Check for
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Schema,Version 3)
* Security Permissions Check for
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
(Configuration,Version 3)
* Security Permissions Check for
DC=wusd,DC=k12,DC=ca,DC=us
RCHS-TMPDC.currentTime = 20090127170911.0Z
RCHS-TMPDC.highestCommittedUSN = 841993
RCHS-TMPDC.isSynchronized = 1
RCHS-TMPDC.isGlobalCatalogReady = 1
(Domain,Version 3)
......................... RCHS-TMPDC passed test NCSecDesc
Starting test: NetLogons
* Network Logons Privileges Check
Verified share \\RCHS-TMPDC\netlogon
Verified share \\RCHS-TMPDC\sysvol
......................... RCHS-TMPDC passed test NetLogons
Starting test: ObjectsReplicated
RCHS-TMPDC is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
Checking for CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
Failed to read object metadata on RCHS-ADMIN, error
The name does not identify an object; the name identifies a phantom.
Object is up-to-date on all servers.
Checking for CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
Object is up-to-date on all servers.
......................... RCHS-TMPDC passed test ObjectsReplicated
Starting test: OutboundSecureChannels
* The Outbound Secure Channels test
** Did not run Outbound Secure Channels test because /testdomain: was
not entered
......................... RCHS-TMPDC passed test
OutboundSecureChannels
Starting test: Replications
* Replications Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
* Replication Latency Check
DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
11 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 15 entries in the vector were ignored.
15 were retired Invocations. 0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
DC=wusd,DC=k12,DC=ca,DC=us
Latency information for 11 entries in the vector were ignored.
9 were retired Invocations. 2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc. 0 had no latency information (Win2K DC).
......................... RCHS-TMPDC passed test Replications
Starting test: RidManager
ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* Available RID Pool for the Domain is 10104 to 1073741823
fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
* RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
* DsBind with RID Master was successful
rIDSetReferences = CN=RID Set,CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
* rIDAllocationPool is 9604 to 10103
* rIDPreviousAllocationPool is 9604 to 10103
* rIDNextRID: 9742
......................... RCHS-TMPDC passed test RidManager
Starting test: Services
* Checking Service: EventSystem
* Checking Service: RpcSs
* Checking Service: NTDS
* Checking Service: DnsCache
* Checking Service: NtFrs
* Checking Service: IsmServ
* Checking Service: kdc
* Checking Service: SamSs
* Checking Service: LanmanServer
* Checking Service: LanmanWorkstation
* Checking Service: w32time
* Checking Service: NETLOGON
......................... RCHS-TMPDC passed test Services
Starting test: SystemLog
* The System Event log test
An Error Event occurred. EventID: 0x00000457
Time Generated: 01/27/2009 08:24:16
Event String:
Driver HP LaserJet P1500 Series PCL 5e required for printer HP LaserJet P1500 Series PCL 5e is unknown. Contact the administrator to install the driver before you log in again.
An Error Event occurred. EventID: 0x00000457
Time Generated: 01/27/2009 08:34:21
Event String:
Driver HP LaserJet P1500 Series PCL 5e required for printer HP LaserJet P1500 Series PCL 5e is unknown. Contact the administrator to install the driver before you log in again.
An Error Event occurred. EventID: 0x00000457
Time Generated: 01/27/2009 08:34:26
Event String:
Driver RICOH Aficio MP C4500 RPCS required for printer !!nmc-dc1!RICOH Aficio C4500 is unknown. Contact the administrator to install the driver before you log in again.
......................... RCHS-TMPDC failed test SystemLog
Starting test: Topology
* Configuration Topology Integrity Check
* Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
* Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
* Performing upstream (of target) analysis.
* Performing downstream (of target) analysis.
......................... RCHS-TMPDC passed test Topology
Starting test: VerifyEnterpriseReferences
......................... RCHS-TMPDC passed test
VerifyEnterpriseReferences
Starting test: VerifyReferences
The system object reference (serverReference)
CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
The system object reference (serverReferenceBL)
CN=RCHS-TMPDC,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
and backlink on
CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
are correct.
......................... RCHS-TMPDC passed test VerifyReferences
Starting test: VerifyReplicas
......................... RCHS-TMPDC passed test VerifyReplicas
Starting test: DNS
DNS Tests are running and not hung. Please wait a few minutes...
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting
test: DNS
St
ar
ti
ng
te
st
:
DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
Starting test: DNS
See DNS test in enterprise tests section for results
......................... EV-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... BT-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... WUSD-DC01 failed test DNS
See DNS test in enterprise tests section for results
......................... SP-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... WF-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... AN-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... SG-CAMPUS failed test DNS
See DNS test in enterprise tests section for results
......................... WUSD-TMPDC failed test DNS
See DNS test in enterprise tests section for results
......................... WUSD-DC02 failed test DNS
See DNS test in enterprise tests section for results
......................... RCHS-ADMIN failed test DNS
See DNS test in enterprise tests section for results
......................... RB-CAMPUS failed test DNS
See DNS test in enterprise tests section for results
........
........
........
.
WUSD-DC1
failed
test
DNS
See DNS test in enterprise tests section for results
.................
........
WUSD-DC2 failed
test DNS
See DNS test in enterprise tests section for results
.........................
ELK-ADMIN failed test DNS
See DNS test in enterprise tests section for results
.........................
WM-CAMPUS failed test DNS
See DNS test in enterprise tests section for results
......................... BI-ADMIN failed
test DNS
ERROR: NO DNS servers for IPV6 stack was found
ERROR: NO DNS servers for IPV6 stack was found
See DNS test in enterprise tests section for results
......................... RCHS-TMPDC passed test DNS
See DNS test in enterprise tests section for results
......................... RCHS-CAMPUS passed test DNS
ERROR: NO DNS servers for IPV6 stack was found
See DNS test in enterprise tests section for results
......................... RCHS-DC02 passed test DNS
Running partition tests on : DomainDnsZones
Starting test: CheckSDRefDom
......................... DomainDnsZones passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... DomainDnsZones passed test
CrossRefValidation
Running partition tests on : ForestDnsZones
Starting test: CheckSDRefDom
......................... ForestDnsZones passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... ForestDnsZones passed test
CrossRefValidation
Running partition tests on : Schema
Starting test: CheckSDRefDom
......................... Schema passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... Schema passed test CrossRefValidation
Running partition tests on : Configuration
Starting test: CheckSDRefDom
......................... Configuration passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... Configuration passed test CrossRefValidation
Running partition tests on : wusd
Starting test: CheckSDRefDom
......................... wusd passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... wusd passed test CrossRefValidation
Running partition tests on : DomainDnsZones
Starting test: CheckSDRefDom
......................... DomainDnsZones passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... DomainDnsZones passed test
CrossRefValidation
Running partition tests on : rchs
Starting test: CheckSDRefDom
......................... rchs passed test CheckSDRefDom
Starting test: CrossRefValidation
......................... rchs passed test CrossRefValidation
Running enterprise tests on : wusd.k12.ca.us
Starting test: DNS
Test results for domain controllers:
DC: WUSD-DC2.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: RB-Campus.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: SG-CAMPUS.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: RCHS-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: wusd-dc02.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: wusd-tmpdc.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: wusd-dc1.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: wusd-dc01.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: wm-campus.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: SP-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: WF-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: EV-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: ELK-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: BT-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: bi-admin.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: AN-ADMIN.wusd.k12.ca.us
Domain: wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Error: No WMI connectivity
[Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
No host records (A or AAAA) were found for this DC
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: RCHS-TMPDC.rchs.wusd.k12.ca.us
Domain: rchs.wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Microsoftr Windows Serverr 2008 Standard (Service Pack level: 1.0)
is supported
NETLOGON service is running
kdc service is running
DNSCACHE service is running
DNS service is running
DC is a DNS server
Network adapters information:
Adapter [00000006] Intel(R) PRO/1000 MT Network Connection:
MAC address is 00:50:56:AA:06:A3
IP Address is static
IP address: 10.1.226.3
DNS servers:
10.1.226.3 (RCHS-TMPDC) [Valid]
10.1.3.22 (<name unavailable>) [Valid]
The A host record(s) for this DC was found
Warning: The AAAA record for this DC was not found
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
The SOA record for the Active Directory zone was found
The Active Directory zone on this DC/DNS server was found primary
Root zone on this DC/DNS server was not found
TEST: Forwarders/Root hints (Forw)
Recursion is enabled
Forwarders Information:
10.1.3.19 (<name unavailable>) [Valid]
10.1.3.22 (<name unavailable>) [Valid]
TEST: Delegations (Del)
No delegations were found in this zone on this DNS server
TEST: Dynamic update (Dyn)
Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
TEST: Records registration (RReg)
Network Adapter
[00000006] Intel(R) PRO/1000 MT Network Connection:
Matching CNAME record found at DNS server 10.1.226.3:
b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.226.3:
RCHS-TMPDC.rchs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.226.3:
RCHS-TMPDC.rchs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kerberos._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kerberos._udp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kpasswd._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.gc._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.226.3:
gc._msdcs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.226.3:
gc._msdcs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.226.3:
_gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.226.3:
_ldap._tcp.pdc._msdcs.rchs.wusd.k12.ca.us
Matching CNAME record found at DNS server 10.1.3.22:
b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.22:
RCHS-TMPDC.rchs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.22:
RCHS-TMPDC.rchs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kerberos._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kerberos._udp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kpasswd._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.gc._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.22:
gc._msdcs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.22:
gc._msdcs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.22:
_gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.22:
_ldap._tcp.pdc._msdcs.rchs.wusd.k12.ca.us
Warning: Record Registrations not found in some network adapters
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
DC: RCHS-DC02.rchs.wusd.k12.ca.us
Domain: rchs.wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Microsoft(R) Windows(R) Server 2003, Standard Edition (Service Pack level: 2.0)
is supported
NETLOGON service is running
kdc service is running
DNSCACHE service is running
DNS service is running
DC is a DNS server
Network adapters information:
Adapter [00000007] Intel(R) PRO/100 VE Network Connection:
MAC address is 00:02:E3:48:3A:43
IP Address is static
IP address: 10.1.3.70
DNS servers:
10.1.3.70 (RCHS-DC02) [Valid]
The A host record(s) for this DC was found
Warning: The AAAA record for this DC was not found
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
The SOA record for the Active Directory zone was found
The Active Directory zone on this DC/DNS server was found primary
Root zone on this DC/DNS server was not found
TEST: Forwarders/Root hints (Forw)
Recursion is enabled
Forwarders Information:
10.1.3.19 (<name unavailable>) [Valid]
10.1.3.22 (<name unavailable>) [Valid]
TEST: Delegations (Del)
No delegations were found in this zone on this DNS server
TEST: Dynamic update (Dyn)
Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
TEST: Records registration (RReg)
Network Adapter
[00000007] Intel(R) PRO/100 VE Network Connection:
Matching CNAME record found at DNS server 10.1.3.70:
02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.70:
RCHS-DC02.rchs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.70:
RCHS-DC02.rchs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kerberos._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kerberos._udp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kpasswd._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.DistrictOffice._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kerberos._tcp.DistrictOffice._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.DistrictOffice._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_kerberos._tcp.DistrictOffice._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.gc._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.70:
gc._msdcs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.70:
gc._msdcs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.70:
_gc._tcp.DistrictOffice._sites.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.70:
_ldap._tcp.DistrictOffice._sites.gc._msdcs.wusd.k12.ca.us
Warning: Record Registrations not found in some network adapters
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 20 sec. Total Netuse connection
time:0 min. 0 sec.
DC: rchs-campus.rchs.wusd.k12.ca.us
Domain: rchs.wusd.k12.ca.us
TEST: Authentication (Auth)
Authentication test: Successfully completed
TEST: Basic (Basc)
Microsoft(R) Windows(R) Server 2003, Enterprise Edition (Service Pack level: 2.0)
is supported
NETLOGON service is running
kdc service is running
DNSCACHE service is running
DNS service is running
DC is a DNS server
Network adapters information:
Adapter
[00000007] HP NC373i Multifunction Gigabit Server Adapter:
MAC address is 00:19:BB:35:79:B4
IP Address is static
IP address: 10.1.226.1
DNS servers:
10.1.3.10 (<name unavailable>) [Valid]
10.1.3.20 (<name unavailable>) [Valid]
The A host record(s) for this DC was found
Warning: The AAAA record for this DC was not found
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
The SOA record for the Active Directory zone was found
The Active Directory zone on this DC/DNS server was found primary
Root zone on this DC/DNS server was not found
TEST: Forwarders/Root hints (Forw)
Recursion is enabled
Forwarders Information:
10.1.226.3 (RCHS-TMPDC) [Valid]
10.1.3.22 (<name unavailable>) [Valid]
TEST: Delegations (Del)
No delegations were found in this zone on this DNS server
TEST: Dynamic update (Dyn)
Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
TEST: Records registration (RReg)
Network Adapter
[00000007] HP NC373i Multifunction Gigabit Server Adapter:
Matching CNAME record found at DNS server 10.1.3.10:
1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.10:
rchs-campus.rchs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.10:
rchs-campus.rchs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kerberos._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kerberos._udp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kpasswd._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.gc._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.10:
gc._msdcs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.10:
gc._msdcs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.10:
_gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.10:
_ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
Matching CNAME record found at DNS server 10.1.3.20:
1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.20:
rchs-campus.rchs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.20:
rchs-campus.rchs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kerberos._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kerberos._udp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kpasswd._tcp.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.gc._msdcs.wusd.k12.ca.us
Matching A record found at DNS server 10.1.3.20:
gc._msdcs.wusd.k12.ca.us
Warning:
Missing AAAA record at DNS server 10.1.3.20:
gc._msdcs.wusd.k12.ca.us
[Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
Matching SRV record found at DNS server 10.1.3.20:
_gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
Matching SRV record found at DNS server 10.1.3.20:
_ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
Warning: Record Registrations not found in some network adapters
Total query time:0 min. 0 sec.. Total RPC connection
time:0 min. 0 sec.
Total WMI connection time:0 min. 0 sec. Total Netuse connection
time:0 min. 0 sec.
Summary of test results for DNS servers used by the above domain
controllers:
DNS server: 10.1.226.3 (RCHS-TMPDC)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
DNS server: 10.1.3.10 (<name unavailable>)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
DNS server: 10.1.3.19 (<name unavailable>)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
DNS server: 10.1.3.20 (<name unavailable>)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
DNS server: 10.1.3.22 (<name unavailable>)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
DNS server: 10.1.3.70 (RCHS-DC02)
All tests passed on this DNS server
Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered
Total query time:0 min. 0 sec., Total WMI connection
time:0 min. 0 sec.
Summary of DNS test results:
Auth Basc Forw Del Dyn RReg Ext
_________________________________________________________________
Domain: wusd.k12.ca.us
WUSD-DC2 PASS FAIL n/a n/a n/a n/a n/a
RB-Campus PASS FAIL n/a n/a n/a n/a n/a
SG-CAMPUS PASS FAIL n/a n/a n/a n/a n/a
RCHS-ADMIN PASS FAIL n/a n/a n/a n/a n/a
wusd-dc02 PASS FAIL n/a n/a n/a n/a n/a
wusd-tmpdc PASS FAIL n/a n/a n/a n/a n/a
wusd-dc1 PASS FAIL n/a n/a n/a n/a n/a
wusd-dc01 PASS FAIL n/a n/a n/a n/a n/a
wm-campus PASS FAIL n/a n/a n/a n/a n/a
SP-ADMIN PASS FAIL n/a n/a n/a n/a n/a
WF-ADMIN PASS FAIL n/a n/a n/a n/a n/a
EV-ADMIN PASS FAIL n/a n/a n/a n/a n/a
ELK-ADMIN PASS FAIL n/a n/a n/a n/a n/a
BT-ADMIN PASS FAIL n/a n/a n/a n/a n/a
bi-admin PASS FAIL n/a n/a n/a n/a n/a
AN-ADMIN PASS FAIL n/a n/a n/a n/a n/a
Domain: rchs.wusd.k12.ca.us
RCHS-TMPDC PASS WARN PASS PASS PASS WARN n/a
RCHS-DC02 PASS WARN PASS PASS PASS WARN n/a
rchs-campus PASS WARN PASS PASS PASS WARN n/a
Total Time taken to test all the DCs:0 min. 28 sec.
......................... wusd.k12.ca.us failed test DNS
Starting test: LocatorCheck
GC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
PDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
Preferred Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
KDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
......................... wusd.k12.ca.us passed test LocatorCheck
Starting test: FsmoCheck
GC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
PDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
Preferred Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
KDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
Locator Flags: 0xe00011fd
......................... wusd.k12.ca.us passed test FsmoCheck
Starting test: Intersite
Doing intersite inbound replication test on site Westfield:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site Westfield is: WF-ADMIN.
***Error: On server WF-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site Evergreen:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site Evergreen is: EV-ADMIN.
***Error: On server EV-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site BridgewayIsland:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site BridgewayIsland is: BI-ADMIN.
***Error: On server BI-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site Elkhorn:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site Elkhorn is: ELK-ADMIN.
***Error: On server ELK-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site Bryte:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site Bryte is: BT-ADMIN.
***Error: On server BT-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site AlyceNorman:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site AlyceNorman is: AN-ADMIN.
***Error: On server AN-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site SouthPort:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site SouthPort is: SP-ADMIN.
***Error: On server SP-ADMIN, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site Westmore:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site Westmore is: WM-CAMPUS.
***Error: On server WM-CAMPUS, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site StoneGate:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site StoneGate is: SG-CAMPUS.
***Error: On server SG-CAMPUS, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site DistrictOffice:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site DistrictOffice is: WUSD-DC1.
***Error: On server WUSD-DC1, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Doing intersite inbound replication test on site RiverBank:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site RiverBank is: RB-CAMPUS.
***Error: On server RB-CAMPUS, DsReplicaGetInfo() failed, error:
0x2105 "Replication access was denied."
Inbound intersite replication test cannot proceed.
Skipping site RiverCity, this site is outside the scope provided by
the command line arguments provided.
Doing intersite inbound replication test on site NewHighSchool:
Locating & Contacting Intersite Topology Generator (ISTG) ...
The ISTG for site NewHighSchool is: RCHS-CAMPUS.
ISTG (RCHS-CAMPUS) Failure Parameters:
Failover Tries: 1
Failover Time: 120
Checking for down bridgeheads ...
Bridghead DistrictOffice\RCHS-DC02 is up and replicating fine.
Bridghead NewHighSchool\RCHS-CAMPUS is up and replicating fine.
Bridghead StoneGate\SG-CAMPUS is up and replicating fine.
Bridghead NewHighSchool\WUSD-TMPDC is up and replicating fine.
Bridghead DistrictOffice\WUSD-DC1 is up and replicating fine.
Bridghead NewHighSchool\RCHS-TMPDC is up and replicating fine.
Doing in depth site analysis ...
All expected sites and bridgeheads are replicating into site
NewHighSchool.
......................... wusd.k12.ca.us failed test Intersite
also
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc1.wusd.k12.ca .us/wusd.k 12.ca.us
* SPN found :LDAP/wusd-dc1.wusd.k12.ca .us
* SPN found :LDAP/WUSD-DC1
* SPN found :LDAP/wusd-dc1.wusd.k12.ca .us/WUSD
* SPN found :LDAP/726e2d0a-8354-4b0e-a 51c-3d2242 1421f1._ms dcs.wusd.k 12.ca.us
* SPN found :E3514235-4B06-11D1-AB04-0 0C04FC2DCD 2/726e2d0a -8354-4b0e -a51c-3d22 421421f1/w usd.k12.ca .us
* SPN found :HOST/wusd-dc1.wusd.k12.ca .us/wusd.k 12.ca.us
* SPN found :HOST/wusd-dc1.wusd.k12.ca .us
* SPN found :HOST/WUSD-DC1
* SPN found :HOST/wusd-dc1.wusd.k12.ca .us/WUSD
* SPN found :GC/wusd-dc1.wusd.k12.ca.u s/wusd.k12 .ca.us
[WUSD-DC1] DsReplicaGetInfo(KCC_DS_CO NNECT_FAIL URES) failed with
error 8453,
Replication access was denied..
[WUSD-DC1] Unable to query the list of KCC connection failures.
Continuing...
Starting test: CheckSecurityError
* Dr Auth: Beginning security errors check!
Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
* SPN found :LDAP/wusd-dc1.wusd.k12.ca
* SPN found :LDAP/wusd-dc1.wusd.k12.ca
* SPN found :LDAP/WUSD-DC1
* SPN found :LDAP/wusd-dc1.wusd.k12.ca
* SPN found :LDAP/726e2d0a-8354-4b0e-a
* SPN found :E3514235-4B06-11D1-AB04-0
* SPN found :HOST/wusd-dc1.wusd.k12.ca
* SPN found :HOST/wusd-dc1.wusd.k12.ca
* SPN found :HOST/WUSD-DC1
* SPN found :HOST/wusd-dc1.wusd.k12.ca
* SPN found :GC/wusd-dc1.wusd.k12.ca.u
[WUSD-DC1] DsReplicaGetInfo(KCC_DS_CO
error 8453,
Replication access was denied..
[WUSD-DC1] Unable to query the list of KCC connection failures.
Continuing...
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
The clock difference between the home server RCHS-TMPDC and target
server WUSD-DC2 is greater than one minute. This may cause Kerberos
authentication failures. Please check that the time service is working
properly. You may need to resynchonize the time between these servers.
I hope this helps !