Link to home
Start Free TrialLog in
Avatar of dunayev
dunayevFlag for United States of America

asked on

windows cannot obtain the domain controller name for your computer network: Event ID 1054

I get this error when I join a workstation to the domain and put it in an OU. Policy does NOT get applied to this workstation.

I ran the "DCDIAG /V /C /D /E /s:yourdcname " command and have posted the code bellow.


Command Line: "dcdiag.exe 
/V /C /D /E /s:rchs-tmpdc"
 
Directory Server Diagnosis
 
 
Performing initial setup:
 
   * Connecting to directory service on server rchs-tmpdc.
 
   rchs-tmpdc.currentTime = 20090127170248.0Z
 
   rchs-tmpdc.highestCommittedUSN = 840952
 
   rchs-tmpdc.isSynchronized = 1
 
   rchs-tmpdc.isGlobalCatalogReady = 1
 
   * Identified AD Forest. 
   Collecting AD specific global data 
   * Collecting site info.
 
   Calling ldap_search_init_page(hld,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us,LDAP_SCOPE_SUBTREE,(objectCategory=ntDSSiteSettings),.......
   The previous call succeeded 
   Iterating through the sites 
   Looking at base site object: CN=NTDS Site Settings,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=RiverCity,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   Looking at base site object: CN=NTDS Site Settings,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
   Getting ISTG and options for the site
   * Identifying all servers.
 
   Calling ldap_search_init_page(hld,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us,LDAP_SCOPE_SUBTREE,(objectClass=ntDSDsa),.......
   The previous call succeeded....
   The previous call succeeded
   Iterating through the list of servers 
   Getting information for the server CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   Getting information for the server CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us 
   objectGuid obtained
   InvocationID obtained
   dnsHostname obtained
   site info obtained
   All the info for the server collected
   RCHS-TMPDC.currentTime = 20090127170248.0Z
 
   RCHS-TMPDC.highestCommittedUSN = 840952
 
   RCHS-TMPDC.isSynchronized = 1
 
   RCHS-TMPDC.isGlobalCatalogReady = 1
 
   * Identifying all NC cross-refs.
 
   * Found 19 DC(s). Testing 19 of them.
 
   Done gathering initial info.
 
 
 
===============================================Printing out pDsInfo
 
GLOBAL:
	ulNumServers=19
	pszRootDomain=wusd.k12.ca.us
	pszNC=
	pszRootDomainFQDN=DC=wusd,DC=k12,DC=ca,DC=us
	pszConfigNc=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
	pszPartitionsDn=CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
	fAdam=0
	iSiteOptions=0
	dwTombstoneLifeTimeDays=60
 
	dwForestBehaviorVersion=2
 
	HomeServer=18, RCHS-TMPDC
 
	SERVER: pServer[0].pszName=WUSD-DC1
		pServer[0].pszGuidDNSName (binding str)=726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
		pServer[0].pszDNSName=wusd-dc1.wusd.k12.ca.us
		pServer[0].pszLdapPort=(null)
		pServer[0].pszSslPort=(null)
		pServer[0].pszDn=CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[0].pszComputerAccountDn=CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[0].uuidObjectGuid=726e2d0a-8354-4b0e-a51c-3d22421421f1
		pServer[0].uuidInvocationId=d0a7ba99-e29e-4fc7-98e6-a722ef4cea63
		pServer[0].iSite=9 (DistrictOffice)
		pServer[0].iOptions=0
		pServer[0].ftLocalAcquireTime=00000000 00000000 
 
		pServer[0].ftRemoteConnectTime=00000000 00000000 
 
		pServer[0].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[1].pszName=AN-ADMIN
		pServer[1].pszGuidDNSName (binding str)=02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
		pServer[1].pszDNSName=AN-ADMIN.wusd.k12.ca.us
		pServer[1].pszLdapPort=(null)
		pServer[1].pszSslPort=(null)
		pServer[1].pszDn=CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[1].pszComputerAccountDn=CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[1].uuidObjectGuid=02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2
		pServer[1].uuidInvocationId=1d49781b-263a-4a5e-8b55-d4f75d545e3f
		pServer[1].iSite=5 (AlyceNorman)
		pServer[1].iOptions=1
		pServer[1].ftLocalAcquireTime=00000000 00000000 
 
		pServer[1].ftRemoteConnectTime=00000000 00000000 
 
		pServer[1].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[1].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[2].pszName=BI-ADMIN
		pServer[2].pszGuidDNSName (binding str)=0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
		pServer[2].pszDNSName=bi-admin.wusd.k12.ca.us
		pServer[2].pszLdapPort=(null)
		pServer[2].pszSslPort=(null)
		pServer[2].pszDn=CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[2].pszComputerAccountDn=CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[2].uuidObjectGuid=0f5fe312-24c7-4f6e-bc2f-f002f664f5f0
		pServer[2].uuidInvocationId=4765b064-09fe-402f-9597-9489a4cec65b
		pServer[2].iSite=2 (BridgewayIsland)
		pServer[2].iOptions=1
		pServer[2].ftLocalAcquireTime=00000000 00000000 
 
		pServer[2].ftRemoteConnectTime=00000000 00000000 
 
		pServer[2].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[2].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[3].pszName=BT-ADMIN
		pServer[3].pszGuidDNSName (binding str)=abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
		pServer[3].pszDNSName=BT-ADMIN.wusd.k12.ca.us
		pServer[3].pszLdapPort=(null)
		pServer[3].pszSslPort=(null)
		pServer[3].pszDn=CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[3].pszComputerAccountDn=CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[3].uuidObjectGuid=abe39041-dee2-4e2a-906c-06c0beda2372
		pServer[3].uuidInvocationId=713a270e-6535-4ba7-bdf1-c0253cac9f83
		pServer[3].iSite=4 (Bryte)
		pServer[3].iOptions=1
		pServer[3].ftLocalAcquireTime=00000000 00000000 
 
		pServer[3].ftRemoteConnectTime=00000000 00000000 
 
		pServer[3].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[3].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[4].pszName=ELK-ADMIN
		pServer[4].pszGuidDNSName (binding str)=13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
		pServer[4].pszDNSName=ELK-ADMIN.wusd.k12.ca.us
		pServer[4].pszLdapPort=(null)
		pServer[4].pszSslPort=(null)
		pServer[4].pszDn=CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[4].pszComputerAccountDn=CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[4].uuidObjectGuid=13050545-307f-4a3b-b17b-0a1f0ebd6265
		pServer[4].uuidInvocationId=e608a407-6ca9-45b2-a81b-d1fdcab3bbab
		pServer[4].iSite=3 (Elkhorn)
		pServer[4].iOptions=1
		pServer[4].ftLocalAcquireTime=00000000 00000000 
 
		pServer[4].ftRemoteConnectTime=00000000 00000000 
 
		pServer[4].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[4].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[5].pszName=EV-ADMIN
		pServer[5].pszGuidDNSName (binding str)=3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
		pServer[5].pszDNSName=EV-ADMIN.wusd.k12.ca.us
		pServer[5].pszLdapPort=(null)
		pServer[5].pszSslPort=(null)
		pServer[5].pszDn=CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[5].pszComputerAccountDn=CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[5].uuidObjectGuid=3f349957-da42-43bb-b8c1-ac5e984bd02c
		pServer[5].uuidInvocationId=7d367aa6-314a-4b57-9bca-0a080e510b4d
		pServer[5].iSite=1 (Evergreen)
		pServer[5].iOptions=1
		pServer[5].ftLocalAcquireTime=00000000 00000000 
 
		pServer[5].ftRemoteConnectTime=00000000 00000000 
 
		pServer[5].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[5].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[6].pszName=WF-ADMIN
		pServer[6].pszGuidDNSName (binding str)=2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
		pServer[6].pszDNSName=WF-ADMIN.wusd.k12.ca.us
		pServer[6].pszLdapPort=(null)
		pServer[6].pszSslPort=(null)
		pServer[6].pszDn=CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[6].pszComputerAccountDn=CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[6].uuidObjectGuid=2f5849a9-7eb5-403e-85fc-22b7f325b93a
		pServer[6].uuidInvocationId=1b15be02-a5f7-4d60-a3eb-7787c6f39406
		pServer[6].iSite=0 (Westfield)
		pServer[6].iOptions=1
		pServer[6].ftLocalAcquireTime=00000000 00000000 
 
		pServer[6].ftRemoteConnectTime=00000000 00000000 
 
		pServer[6].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[6].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[7].pszName=SP-ADMIN
		pServer[7].pszGuidDNSName (binding str)=5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
		pServer[7].pszDNSName=SP-ADMIN.wusd.k12.ca.us
		pServer[7].pszLdapPort=(null)
		pServer[7].pszSslPort=(null)
		pServer[7].pszDn=CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[7].pszComputerAccountDn=CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[7].uuidObjectGuid=5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94
		pServer[7].uuidInvocationId=b32d66ec-d488-41f7-bf52-99ffec47e78c
		pServer[7].iSite=6 (SouthPort)
		pServer[7].iOptions=1
		pServer[7].ftLocalAcquireTime=00000000 00000000 
 
		pServer[7].ftRemoteConnectTime=00000000 00000000 
 
		pServer[7].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[7].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[8].pszName=WM-CAMPUS
		pServer[8].pszGuidDNSName (binding str)=a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
		pServer[8].pszDNSName=wm-campus.wusd.k12.ca.us
		pServer[8].pszLdapPort=(null)
		pServer[8].pszSslPort=(null)
		pServer[8].pszDn=CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[8].pszComputerAccountDn=CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[8].uuidObjectGuid=a86aa50f-8b4e-4eac-87b7-503614be8e34
		pServer[8].uuidInvocationId=0d96ef97-9b79-462f-a8ce-cddfe225f9bf
		pServer[8].iSite=7 (Westmore)
		pServer[8].iOptions=1
		pServer[8].ftLocalAcquireTime=00000000 00000000 
 
		pServer[8].ftRemoteConnectTime=00000000 00000000 
 
		pServer[8].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[8].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[9].pszName=RCHS-CAMPUS
		pServer[9].pszGuidDNSName (binding str)=1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
		pServer[9].pszDNSName=rchs-campus.rchs.wusd.k12.ca.us
		pServer[9].pszLdapPort=(null)
		pServer[9].pszSslPort=(null)
		pServer[9].pszDn=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[9].pszComputerAccountDn=CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[9].uuidObjectGuid=1ade07c1-fd1d-4af7-827d-325a59a6e1e6
		pServer[9].uuidInvocationId=610e5578-127c-4350-8481-31ffe5fd9cd8
		pServer[9].iSite=12 (NewHighSchool)
		pServer[9].iOptions=1
		pServer[9].ftLocalAcquireTime=00000000 00000000 
 
		pServer[9].ftRemoteConnectTime=00000000 00000000 
 
		pServer[9].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[9].ppszPartialNCs:
			ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[10].pszName=RCHS-DC02
		pServer[10].pszGuidDNSName (binding str)=02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
		pServer[10].pszDNSName=RCHS-DC02.rchs.wusd.k12.ca.us
		pServer[10].pszLdapPort=(null)
		pServer[10].pszSslPort=(null)
		pServer[10].pszDn=CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[10].pszComputerAccountDn=CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[10].uuidObjectGuid=02329cde-05de-4208-9935-0ec4743e6fba
		pServer[10].uuidInvocationId=9f65a741-7459-47b0-a537-27a95056ad45
		pServer[10].iSite=9 (DistrictOffice)
		pServer[10].iOptions=1
		pServer[10].ftLocalAcquireTime=00000000 00000000 
 
		pServer[10].ftRemoteConnectTime=00000000 00000000 
 
		pServer[10].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[10].ppszPartialNCs:
			ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[11].pszName=WUSD-DC01
		pServer[11].pszGuidDNSName (binding str)=37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
		pServer[11].pszDNSName=wusd-dc01.wusd.k12.ca.us
		pServer[11].pszLdapPort=(null)
		pServer[11].pszSslPort=(null)
		pServer[11].pszDn=CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[11].pszComputerAccountDn=CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[11].uuidObjectGuid=37beb541-54e8-4189-b0ae-0d56719fafa3
		pServer[11].uuidInvocationId=37beb541-54e8-4189-b0ae-0d56719fafa3
		pServer[11].iSite=9 (DistrictOffice)
		pServer[11].iOptions=1
		pServer[11].ftLocalAcquireTime=00000000 00000000 
 
		pServer[11].ftRemoteConnectTime=00000000 00000000 
 
		pServer[11].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[11].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[12].pszName=WUSD-DC02
		pServer[12].pszGuidDNSName (binding str)=c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
		pServer[12].pszDNSName=wusd-dc02.wusd.k12.ca.us
		pServer[12].pszLdapPort=(null)
		pServer[12].pszSslPort=(null)
		pServer[12].pszDn=CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[12].pszComputerAccountDn=CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[12].uuidObjectGuid=c5105bc1-2b24-4573-8711-8622336e982e
		pServer[12].uuidInvocationId=7aba393a-833f-4761-a5e0-4776dcdfab94
		pServer[12].iSite=9 (DistrictOffice)
		pServer[12].iOptions=1
		pServer[12].ftLocalAcquireTime=00000000 00000000 
 
		pServer[12].ftRemoteConnectTime=00000000 00000000 
 
		pServer[12].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[12].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[13].pszName=RCHS-ADMIN
		pServer[13].pszGuidDNSName (binding str)=ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
		pServer[13].pszDNSName=RCHS-ADMIN.wusd.k12.ca.us
		pServer[13].pszLdapPort=(null)
		pServer[13].pszSslPort=(null)
		pServer[13].pszDn=CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[13].pszComputerAccountDn=CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[13].uuidObjectGuid=ee694a22-0e78-4716-82c2-81c32084b26a
		pServer[13].uuidInvocationId=313beef3-049b-4264-9e78-4259e9ae5391
		pServer[13].iSite=12 (NewHighSchool)
		pServer[13].iOptions=0
		pServer[13].ftLocalAcquireTime=00000000 00000000 
 
		pServer[13].ftRemoteConnectTime=00000000 00000000 
 
		pServer[13].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[13].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[14].pszName=SG-CAMPUS
		pServer[14].pszGuidDNSName (binding str)=c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
		pServer[14].pszDNSName=SG-CAMPUS.wusd.k12.ca.us
		pServer[14].pszLdapPort=(null)
		pServer[14].pszSslPort=(null)
		pServer[14].pszDn=CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[14].pszComputerAccountDn=CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[14].uuidObjectGuid=c983e27e-0a85-4f89-baed-549df9475f34
		pServer[14].uuidInvocationId=0cfe7922-3cc9-40e7-9fc4-da9460df7652
		pServer[14].iSite=8 (StoneGate)
		pServer[14].iOptions=1
		pServer[14].ftLocalAcquireTime=00000000 00000000 
 
		pServer[14].ftRemoteConnectTime=00000000 00000000 
 
		pServer[14].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[14].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[15].pszName=RB-CAMPUS
		pServer[15].pszGuidDNSName (binding str)=8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
		pServer[15].pszDNSName=RB-Campus.wusd.k12.ca.us
		pServer[15].pszLdapPort=(null)
		pServer[15].pszSslPort=(null)
		pServer[15].pszDn=CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[15].pszComputerAccountDn=CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[15].uuidObjectGuid=8e7bcbe2-8749-4d26-bf07-25b31106f55c
		pServer[15].uuidInvocationId=28403cd0-ea07-4b74-a122-707b0f409728
		pServer[15].iSite=10 (RiverBank)
		pServer[15].iOptions=1
		pServer[15].ftLocalAcquireTime=00000000 00000000 
 
		pServer[15].ftRemoteConnectTime=00000000 00000000 
 
		pServer[15].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[15].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[16].pszName=WUSD-DC2
		pServer[16].pszGuidDNSName (binding str)=2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
		pServer[16].pszDNSName=WUSD-DC2.wusd.k12.ca.us
		pServer[16].pszLdapPort=(null)
		pServer[16].pszSslPort=(null)
		pServer[16].pszDn=CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[16].pszComputerAccountDn=CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[16].uuidObjectGuid=2cb154d1-ce95-4c62-a2f9-ea3cb9f15003
		pServer[16].uuidInvocationId=3017153b-7ac0-4d35-b99f-5cd7744bd72c
		pServer[16].iSite=9 (DistrictOffice)
		pServer[16].iOptions=1
		pServer[16].ftLocalAcquireTime=00000000 00000000 
 
		pServer[16].ftRemoteConnectTime=00000000 00000000 
 
		pServer[16].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[16].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[17].pszName=WUSD-TMPDC
		pServer[17].pszGuidDNSName (binding str)=b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
		pServer[17].pszDNSName=wusd-tmpdc.wusd.k12.ca.us
		pServer[17].pszLdapPort=(null)
		pServer[17].pszSslPort=(null)
		pServer[17].pszDn=CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[17].pszComputerAccountDn=CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[17].uuidObjectGuid=b294c123-5db0-4086-80ce-a99f61b9923d
		pServer[17].uuidInvocationId=88655d07-b693-4789-955a-0000f0672d21
		pServer[17].iSite=12 (NewHighSchool)
		pServer[17].iOptions=1
		pServer[17].ftLocalAcquireTime=00000000 00000000 
 
		pServer[17].ftRemoteConnectTime=00000000 00000000 
 
		pServer[17].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=DC=wusd,DC=k12,DC=ca,DC=us
		pServer[17].ppszPartialNCs:
			ppszPartialNCs[0]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
	SERVER: pServer[18].pszName=RCHS-TMPDC
		pServer[18].pszGuidDNSName (binding str)=b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
		pServer[18].pszDNSName=RCHS-TMPDC.rchs.wusd.k12.ca.us
		pServer[18].pszLdapPort=(null)
		pServer[18].pszSslPort=(null)
		pServer[18].pszDn=CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[18].pszComputerAccountDn=CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[18].uuidObjectGuid=b1b9edc1-55cc-403f-8477-57f46100bcb5
		pServer[18].uuidInvocationId=5a44985b-70fe-4991-aab1-a57f14b9dd56
		pServer[18].iSite=12 (NewHighSchool)
		pServer[18].iOptions=1
 
		pServer[18].ftLocalAcquireTime=14f5e8c0 01c980a1 
 
		pServer[18].ftRemoteConnectTime=14926c00 01c980a1 
 
		pServer[18].ppszMaster/FullReplicaNCs:
			ppszMaster/FullReplicaNCs[0]=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[1]=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[2]=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[3]=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			ppszMaster/FullReplicaNCs[4]=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pServer[18].ppszPartialNCs:
			ppszPartialNCs[0]=DC=wusd,DC=k12,DC=ca,DC=us
 
	SITES:  pSites[0].pszName=Westfield
		pSites[0].pszSiteSettings=CN=NTDS Site Settings,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[0].pszISTG=CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[0].iSiteOption=0
 
		pSites[0].cServers=1
 
	SITES:  pSites[1].pszName=Evergreen
		pSites[1].pszSiteSettings=CN=NTDS Site Settings,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[1].pszISTG=CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[1].iSiteOption=0
 
		pSites[1].cServers=1
 
	SITES:  pSites[2].pszName=BridgewayIsland
		pSites[2].pszSiteSettings=CN=NTDS Site Settings,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[2].pszISTG=CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[2].iSiteOption=0
 
		pSites[2].cServers=1
 
	SITES:  pSites[3].pszName=Elkhorn
		pSites[3].pszSiteSettings=CN=NTDS Site Settings,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[3].pszISTG=CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[3].iSiteOption=0
 
		pSites[3].cServers=1
 
	SITES:  pSites[4].pszName=Bryte
		pSites[4].pszSiteSettings=CN=NTDS Site Settings,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[4].pszISTG=CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[4].iSiteOption=0
 
		pSites[4].cServers=1
 
	SITES:  pSites[5].pszName=AlyceNorman
		pSites[5].pszSiteSettings=CN=NTDS Site Settings,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[5].pszISTG=CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[5].iSiteOption=0
 
		pSites[5].cServers=1
 
	SITES:  pSites[6].pszName=SouthPort
		pSites[6].pszSiteSettings=CN=NTDS Site Settings,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[6].pszISTG=CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[6].iSiteOption=0
 
		pSites[6].cServers=1
 
	SITES:  pSites[7].pszName=Westmore
		pSites[7].pszSiteSettings=CN=NTDS Site Settings,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[7].pszISTG=CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[7].iSiteOption=0
 
		pSites[7].cServers=1
 
	SITES:  pSites[8].pszName=StoneGate
		pSites[8].pszSiteSettings=CN=NTDS Site Settings,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[8].pszISTG=CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[8].iSiteOption=0
 
		pSites[8].cServers=1
 
	SITES:  pSites[9].pszName=DistrictOffice
		pSites[9].pszSiteSettings=CN=NTDS Site Settings,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[9].pszISTG=CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[9].iSiteOption=0
 
		pSites[9].cServers=5
 
	SITES:  pSites[10].pszName=RiverBank
		pSites[10].pszSiteSettings=CN=NTDS Site Settings,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[10].pszISTG=CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[10].iSiteOption=0
 
		pSites[10].cServers=1
 
	SITES:  pSites[11].pszName=RiverCity
		pSites[11].pszSiteSettings=CN=NTDS Site Settings,CN=RiverCity,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[11].pszISTG=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[11].iSiteOption=0
 
		pSites[11].cServers=0
 
	SITES:  pSites[12].pszName=NewHighSchool
		pSites[12].pszSiteSettings=CN=NTDS Site Settings,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[12].pszISTG=CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
		pSites[12].iSiteOption=0
 
		pSites[12].cServers=4
 
	NC:     pNCs[0].pszName=DomainDnsZones
		pNCs[0].pszDn=DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[0].aCrInfo[0].dwFlags=0x00000201
			pNCs[0].aCrInfo[0].pszDn=CN=c3450136-b047-4425-b15b-781c7e606f40,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[0].aCrInfo[0].pszDnsRoot=DomainDnsZones.wusd.k12.ca.us
			pNCs[0].aCrInfo[0].iSourceServer=18
			pNCs[0].aCrInfo[0].pszSourceServer=(null)
			pNCs[0].aCrInfo[0].ulSystemFlags=0x00000005
			pNCs[0].aCrInfo[0].bEnabled=TRUE
			pNCs[0].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[0].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[0].aCrInfo[0].pszNetBiosName=(null)
			pNCs[0].aCrInfo[0].cReplicas=-1
			pNCs[0].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[1].pszName=ForestDnsZones
		pNCs[1].pszDn=DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[1].aCrInfo[0].dwFlags=0x00000201
			pNCs[1].aCrInfo[0].pszDn=CN=b455cdeb-2730-4b13-a298-458d836a5190,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[1].aCrInfo[0].pszDnsRoot=ForestDnsZones.wusd.k12.ca.us
			pNCs[1].aCrInfo[0].iSourceServer=18
			pNCs[1].aCrInfo[0].pszSourceServer=(null)
			pNCs[1].aCrInfo[0].ulSystemFlags=0x00000005
			pNCs[1].aCrInfo[0].bEnabled=TRUE
			pNCs[1].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[1].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[1].aCrInfo[0].pszNetBiosName=(null)
			pNCs[1].aCrInfo[0].cReplicas=-1
			pNCs[1].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[2].pszName=Schema
		pNCs[2].pszDn=CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[2].aCrInfo[0].dwFlags=0x00000201
			pNCs[2].aCrInfo[0].pszDn=CN=Enterprise Schema,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[2].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
			pNCs[2].aCrInfo[0].iSourceServer=18
			pNCs[2].aCrInfo[0].pszSourceServer=(null)
			pNCs[2].aCrInfo[0].ulSystemFlags=0x00000001
			pNCs[2].aCrInfo[0].bEnabled=TRUE
			pNCs[2].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[2].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[2].aCrInfo[0].pszNetBiosName=(null)
			pNCs[2].aCrInfo[0].cReplicas=-1
			pNCs[2].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[3].pszName=Configuration
		pNCs[3].pszDn=CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[3].aCrInfo[0].dwFlags=0x00000201
			pNCs[3].aCrInfo[0].pszDn=CN=Enterprise Configuration,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[3].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
			pNCs[3].aCrInfo[0].iSourceServer=18
			pNCs[3].aCrInfo[0].pszSourceServer=(null)
			pNCs[3].aCrInfo[0].ulSystemFlags=0x00000001
			pNCs[3].aCrInfo[0].bEnabled=TRUE
			pNCs[3].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[3].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[3].aCrInfo[0].pszNetBiosName=(null)
			pNCs[3].aCrInfo[0].cReplicas=-1
			pNCs[3].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[4].pszName=wusd
		pNCs[4].pszDn=DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[4].aCrInfo[0].dwFlags=0x00000201
			pNCs[4].aCrInfo[0].pszDn=CN=WUSD,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[4].aCrInfo[0].pszDnsRoot=wusd.k12.ca.us
			pNCs[4].aCrInfo[0].iSourceServer=18
			pNCs[4].aCrInfo[0].pszSourceServer=(null)
			pNCs[4].aCrInfo[0].ulSystemFlags=0x00000003
			pNCs[4].aCrInfo[0].bEnabled=TRUE
			pNCs[4].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[4].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[4].aCrInfo[0].pszNetBiosName=(null)
			pNCs[4].aCrInfo[0].cReplicas=-1
			pNCs[4].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[5].pszName=DomainDnsZones
		pNCs[5].pszDn=DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[5].aCrInfo[0].dwFlags=0x00000201
			pNCs[5].aCrInfo[0].pszDn=CN=82d3fb70-7d87-458d-8656-9ec3177fb867,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[5].aCrInfo[0].pszDnsRoot=DomainDnsZones.rchs.wusd.k12.ca.us
			pNCs[5].aCrInfo[0].iSourceServer=18
			pNCs[5].aCrInfo[0].pszSourceServer=(null)
			pNCs[5].aCrInfo[0].ulSystemFlags=0x00000005
			pNCs[5].aCrInfo[0].bEnabled=TRUE
			pNCs[5].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[5].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[5].aCrInfo[0].pszNetBiosName=(null)
			pNCs[5].aCrInfo[0].cReplicas=-1
			pNCs[5].aCrInfo[0].aszReplicas=
 
 
	NC:     pNCs[6].pszName=rchs
		pNCs[6].pszDn=DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
			pNCs[6].aCrInfo[0].dwFlags=0x00000201
			pNCs[6].aCrInfo[0].pszDn=CN=RCHS,CN=Partitions,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
			pNCs[6].aCrInfo[0].pszDnsRoot=rchs.wusd.k12.ca.us
			pNCs[6].aCrInfo[0].iSourceServer=18
			pNCs[6].aCrInfo[0].pszSourceServer=(null)
			pNCs[6].aCrInfo[0].ulSystemFlags=0x00000003
			pNCs[6].aCrInfo[0].bEnabled=TRUE
			pNCs[6].aCrInfo[0].ftWhenCreated=00000000 00000000 			pNCs[6].aCrInfo[0].pszSDReferenceDomain=(null)
			pNCs[6].aCrInfo[0].pszNetBiosName=(null)
			pNCs[6].aCrInfo[0].cReplicas=-1
			pNCs[6].aCrInfo[0].aszReplicas=
 
 
	7 NC TARGETS: DomainDnsZones, ForestDnsZones, Schema, Configuration, wusd, DomainDnsZones, rchs, 
	19 TARGETS: WUSD-DC1, AN-ADMIN, BI-ADMIN, BT-ADMIN, ELK-ADMIN, EV-ADMIN, WF-ADMIN, SP-ADMIN, WM-CAMPUS, RCHS-CAMPUS, RCHS-DC02, WUSD-DC01, WUSD-DC02, RCHS-ADMIN, SG-CAMPUS, RB-CAMPUS, WUSD-DC2, WUSD-TMPDC, RCHS-TMPDC, 
 
=============================================Done Printing pDsInfo
 
Doing initial required tests
 
   
   Testing server: DistrictOffice\WUSD-DC1
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WUSD-DC1.currentTime = 20090127170248.0Z
 
         WUSD-DC1.highestCommittedUSN = 1848526
 
         WUSD-DC1.isSynchronized = 1
 
         WUSD-DC1.isGlobalCatalogReady = 0
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WUSD-DC1 ... OK.
         * Active Directory RPC Services Check
         ......................... WUSD-DC1 passed test Connectivity
 
   
   Testing server: AlyceNorman\AN-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         AN-ADMIN.currentTime = 20090127170248.0Z
 
         AN-ADMIN.highestCommittedUSN = 4390623
 
         AN-ADMIN.isSynchronized = 1
 
         AN-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: AN-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... AN-ADMIN passed test Connectivity
 
   
   Testing server: BridgewayIsland\BI-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         BI-ADMIN.currentTime = 20090127170248.0Z
 
         BI-ADMIN.highestCommittedUSN = 5274681
 
         BI-ADMIN.isSynchronized = 1
 
         BI-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: BI-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... BI-ADMIN passed test Connectivity
 
   
   Testing server: Bryte\BT-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         BT-ADMIN.currentTime = 20090127170249.0Z
 
         BT-ADMIN.highestCommittedUSN = 4689843
 
         BT-ADMIN.isSynchronized = 1
 
         BT-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: BT-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... BT-ADMIN passed test Connectivity
 
   
   Testing server: Elkhorn\ELK-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         ELK-ADMIN.currentTime = 20090127170249.0Z
 
         ELK-ADMIN.highestCommittedUSN = 4570569
 
         ELK-ADMIN.isSynchronized = 1
 
         ELK-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: ELK-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... ELK-ADMIN passed test Connectivity
 
   
   Testing server: Evergreen\EV-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         EV-ADMIN.currentTime = 20090127170249.0Z
 
         EV-ADMIN.highestCommittedUSN = 6618908
 
         EV-ADMIN.isSynchronized = 1
 
         EV-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: EV-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... EV-ADMIN passed test Connectivity
 
   
   Testing server: Westfield\WF-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WF-ADMIN.currentTime = 20090127170250.0Z
 
         WF-ADMIN.highestCommittedUSN = 3986599
 
         WF-ADMIN.isSynchronized = 1
 
         WF-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WF-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... WF-ADMIN passed test Connectivity
 
   
   Testing server: SouthPort\SP-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         SP-ADMIN.currentTime = 20090127170250.0Z
 
         SP-ADMIN.highestCommittedUSN = 3601894
 
         SP-ADMIN.isSynchronized = 1
 
         SP-ADMIN.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: SP-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... SP-ADMIN passed test Connectivity
 
   
   Testing server: Westmore\WM-CAMPUS
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WM-CAMPUS.currentTime = 20090127170250.0Z
 
         WM-CAMPUS.highestCommittedUSN = 2804317
 
         WM-CAMPUS.isSynchronized = 1
 
         WM-CAMPUS.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WM-CAMPUS ... OK.
         * Active Directory RPC Services Check
         ......................... WM-CAMPUS passed test Connectivity
 
   
   Testing server: NewHighSchool\RCHS-CAMPUS
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         RCHS-CAMPUS.currentTime = 20090127170250.0Z
 
         RCHS-CAMPUS.highestCommittedUSN = 5702675
 
         RCHS-CAMPUS.isSynchronized = 1
 
         RCHS-CAMPUS.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: RCHS-CAMPUS ... OK.
         * Active Directory RPC Services Check
         ......................... RCHS-CAMPUS passed test Connectivity
 
   
   Testing server: DistrictOffice\RCHS-DC02
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         RCHS-DC02.currentTime = 20090127170250.0Z
 
         RCHS-DC02.highestCommittedUSN = 6555347
 
         RCHS-DC02.isSynchronized = 1
 
         RCHS-DC02.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: RCHS-DC02 ... OK.
         * Active Directory RPC Services Check
         ......................... RCHS-DC02 passed test Connectivity
 
   
   Testing server: DistrictOffice\WUSD-DC01
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WUSD-DC01.currentTime = 20090127170217.0Z
 
         WUSD-DC01.highestCommittedUSN = 13128125
 
         WUSD-DC01.isSynchronized = 1
 
         WUSD-DC01.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WUSD-DC01 ... OK.
         * Active Directory RPC Services Check
         ......................... WUSD-DC01 passed test Connectivity
 
   
   Testing server: DistrictOffice\WUSD-DC02
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WUSD-DC02.currentTime = 20090127170250.0Z
 
         WUSD-DC02.highestCommittedUSN = 12836165
 
         WUSD-DC02.isSynchronized = 1
 
         WUSD-DC02.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WUSD-DC02 ... OK.
         * Active Directory RPC Services Check
         ......................... WUSD-DC02 passed test Connectivity
 
   
   Testing server: NewHighSchool\RCHS-ADMIN
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         RCHS-ADMIN.currentTime = 20090127170250.0Z
 
         RCHS-ADMIN.highestCommittedUSN = 6508167
 
         RCHS-ADMIN.isSynchronized = 1
 
         RCHS-ADMIN.isGlobalCatalogReady = 0
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: RCHS-ADMIN ... OK.
         * Active Directory RPC Services Check
         ......................... RCHS-ADMIN passed test Connectivity
 
   
   Testing server: StoneGate\SG-CAMPUS
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         SG-CAMPUS.currentTime = 20090127170250.0Z
 
         SG-CAMPUS.highestCommittedUSN = 2247173
 
         SG-CAMPUS.isSynchronized = 1
 
         SG-CAMPUS.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: SG-CAMPUS ... OK.
         * Active Directory RPC Services Check
         ......................... SG-CAMPUS passed test Connectivity
 
   
   Testing server: RiverBank\RB-CAMPUS
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         RB-CAMPUS.currentTime = 20090127170250.0Z
 
         RB-CAMPUS.highestCommittedUSN = 957208
 
         RB-CAMPUS.isSynchronized = 1
 
         RB-CAMPUS.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: RB-CAMPUS ... OK.
         * Active Directory RPC Services Check
         ......................... RB-CAMPUS passed test Connectivity
 
   
   Testing server: DistrictOffice\WUSD-DC2
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WUSD-DC2.currentTime = 20090127170450.0Z
 
         WUSD-DC2.highestCommittedUSN = 1908386
 
         WUSD-DC2.isSynchronized = 1
 
         WUSD-DC2.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WUSD-DC2 ... OK.
         * Active Directory RPC Services Check
         The clock difference between the home server RCHS-TMPDC and target
 
         server WUSD-DC2 is greater than one minute. This may cause Kerberos
 
         authentication failures. Please check that the time service is working
 
         properly. You may need to resynchonize the time between these servers.
 
         ......................... WUSD-DC2 passed test Connectivity
 
   
   Testing server: NewHighSchool\WUSD-TMPDC
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         WUSD-TMPDC.currentTime = 20090127170250.0Z
 
         WUSD-TMPDC.highestCommittedUSN = 847139
 
         WUSD-TMPDC.isSynchronized = 1
 
         WUSD-TMPDC.isGlobalCatalogReady = 1
 
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: WUSD-TMPDC ... OK.
         * Active Directory RPC Services Check
         ......................... WUSD-TMPDC passed test Connectivity
 
   
   Testing server: NewHighSchool\RCHS-TMPDC
 
      Starting test: Connectivity
 
         * Active Directory LDAP Services Check
         Determining IP4 connectivity 
         Determining IP6 connectivity 
         Failure Analysis: RCHS-TMPDC ... OK.
         * Active Directory RPC Services Check
         ......................... RCHS-TMPDC passed test Connectivity
 
 
 
Doing primary tests
 
   
   Testing server: DistrictOffice\WUSD-DC1
 
      Starting test: Advertising
 
         The DC WUSD-DC1 is advertising itself as a DC and having a DS.
         The DC WUSD-DC1 is advertising as an LDAP server
         The DC WUSD-DC1 is advertising as having a writeable directory
         The DC WUSD-DC1 is advertising as a Key Distribution Center
         The DC WUSD-DC1 is advertising as a time server
         ......................... WUSD-DC1 passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC1
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/726e2d0a-8354-4b0e-a51c-3d22421421f1/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC1
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
            [WUSD-DC1] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-DC1] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WUSD-DC1] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WUSD-DC1 passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC1 passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         The event log File Replication Service on server
 
         wusd-dc1.wusd.k12.ca.us could not be queried, error 0x5
 
         "Access is denied."
 
         ......................... WUSD-DC1 failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         The event log DFS Replication on server wusd-dc1.wusd.k12.ca.us could
 
         not be queried, error 0x5 "Access is denied."
 
 
         ......................... WUSD-DC1 failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC1 failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC1 failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         The event log Directory Service on server wusd-dc1.wusd.k12.ca.us
 
         could not be queried, error 0x5 "Access is denied."
 
         ......................... WUSD-DC1 failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WUSD-DC1 passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC1
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/726e2d0a-8354-4b0e-a51c-3d22421421f1/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC1
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WUSD-DC1 passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WUSD-DC1.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         ......................... WUSD-DC1 passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WUSD-DC1\netlogon
         Verified share \\WUSD-DC1\sysvol
         [WUSD-DC1] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WUSD-DC1 failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WUSD-DC1 is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WUSD-DC1 passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WUSD-DC1 passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         [Replications Check,WUSD-DC1] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WUSD-DC1 failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 14107 to 14606
         * rIDPreviousAllocationPool is 14107 to 14606
         * rIDNextRID: 14187
         ......................... WUSD-DC1 passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on wusd-dc1.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WUSD-DC1 failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         The event log System on server wusd-dc1.wusd.k12.ca.us could not be
 
         queried, error 0x5 "Access is denied."
 
         ......................... WUSD-DC1 failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC1 passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WUSD-DC1 passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WUSD-DC1,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WUSD-DC1,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WUSD-DC1 passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WUSD-DC1 passed test VerifyReplicas
 
   
   Testing server: AlyceNorman\AN-ADMIN
 
      Starting test: Advertising
 
         The DC AN-ADMIN is advertising itself as a DC and having a DS.
         The DC AN-ADMIN is advertising as an LDAP server
         The DC AN-ADMIN is advertising as having a writeable directory
         The DC AN-ADMIN is advertising as a Key Distribution Center
         The DC AN-ADMIN is advertising as a time server
         The DS AN-ADMIN is advertising as a GC.
         ......................... AN-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC AN-ADMIN for domain wusd.k12.ca.us in site AlyceNorman
         Checking machine account for DC AN-ADMIN on DC AN-ADMIN.
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/AN-ADMIN
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2/wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [AN-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [AN-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [AN-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... AN-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... AN-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\AN-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... AN-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\AN-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... AN-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... AN-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... AN-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\AN-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... AN-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... AN-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC AN-ADMIN on DC AN-ADMIN.
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/AN-ADMIN
         * SPN found :LDAP/AN-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02ccb0ce-5ebf-4d94-b1dd-726bfe9843c2/wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/AN-ADMIN
         * SPN found :HOST/AN-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/AN-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... AN-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC AN-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         AN-ADMIN.currentTime = 20090127170321.0Z
 
         AN-ADMIN.highestCommittedUSN = 4390691
 
         AN-ADMIN.isSynchronized = 1
 
         AN-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... AN-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\AN-ADMIN\netlogon
         Verified share \\AN-ADMIN\sysvol
         [AN-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... AN-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         AN-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... AN-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... AN-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,AN-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... AN-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 6107 to 6606
         * rIDPreviousAllocationPool is 6107 to 6606
         * rIDNextRID: 6260
         ......................... AN-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on AN-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... AN-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\AN-ADMIN:System:
 
          Access is denied.
 
         ......................... AN-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... AN-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... AN-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=AN-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=AN-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=AN-ADMIN,CN=Servers,CN=AlyceNorman,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... AN-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... AN-ADMIN passed test VerifyReplicas
 
   
   Testing server: BridgewayIsland\BI-ADMIN
 
      Starting test: Advertising
 
         The DC BI-ADMIN is advertising itself as a DC and having a DS.
         The DC BI-ADMIN is advertising as an LDAP server
         The DC BI-ADMIN is advertising as having a writeable directory
         The DC BI-ADMIN is advertising as a Key Distribution Center
         The DC BI-ADMIN is advertising as a time server
         The DS BI-ADMIN is advertising as a GC.
         ......................... BI-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC BI-ADMIN for domain wusd.k12.ca.us in site BridgewayIsland
         Checking machine account for DC BI-ADMIN on DC BI-ADMIN.
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us
         * SPN found :LDAP/BI-ADMIN
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0/wusd.k12.ca.us
         * SPN found :HOST/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/bi-admin.wusd.k12.ca.us
         * SPN found :HOST/BI-ADMIN
         * SPN found :HOST/bi-admin.wusd.k12.ca.us/WUSD
         * SPN found :GC/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
            [BI-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [BI-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [BI-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... BI-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... BI-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\BI-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... BI-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\BI-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... BI-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... BI-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... BI-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\BI-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... BI-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... BI-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC BI-ADMIN on DC BI-ADMIN.
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us
         * SPN found :LDAP/BI-ADMIN
         * SPN found :LDAP/bi-admin.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/0f5fe312-24c7-4f6e-bc2f-f002f664f5f0/wusd.k12.ca.us
         * SPN found :HOST/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/bi-admin.wusd.k12.ca.us
         * SPN found :HOST/BI-ADMIN
         * SPN found :HOST/bi-admin.wusd.k12.ca.us/WUSD
         * SPN found :GC/bi-admin.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... BI-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC BI-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         BI-ADMIN.currentTime = 20090127170345.0Z
 
         BI-ADMIN.highestCommittedUSN = 5274771
 
         BI-ADMIN.isSynchronized = 1
 
         BI-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... BI-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\BI-ADMIN\netlogon
         Verified share \\BI-ADMIN\sysvol
         [BI-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... BI-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         BI-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... BI-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... BI-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,BI-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... BI-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 4607 to 5106
         * rIDPreviousAllocationPool is 4607 to 5106
         * rIDNextRID: 4760
         ......................... BI-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on bi-admin.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... BI-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\BI-ADMIN:System:
 
          Access is denied.
 
         ......................... BI-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... BI-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... BI-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=BI-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=BI-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=BI-ADMIN,CN=Servers,CN=BridgewayIsland,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... BI-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... BI-ADMIN passed test VerifyReplicas
 
   
   Testing server: Bryte\BT-ADMIN
 
      Starting test: Advertising
 
         The DC BT-ADMIN is advertising itself as a DC and having a DS.
         The DC BT-ADMIN is advertising as an LDAP server
         The DC BT-ADMIN is advertising as having a writeable directory
         The DC BT-ADMIN is advertising as a Key Distribution Center
         The DC BT-ADMIN is advertising as a time server
         The DS BT-ADMIN is advertising as a GC.
         ......................... BT-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC BT-ADMIN for domain wusd.k12.ca.us in site Bryte
         Checking machine account for DC BT-ADMIN on DC BT-ADMIN.
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/BT-ADMIN
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/abe39041-dee2-4e2a-906c-06c0beda2372/wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [BT-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [BT-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [BT-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... BT-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... BT-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\BT-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... BT-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\BT-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... BT-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... BT-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... BT-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\BT-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... BT-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... BT-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC BT-ADMIN on DC BT-ADMIN.
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/BT-ADMIN
         * SPN found :LDAP/BT-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/abe39041-dee2-4e2a-906c-06c0beda2372._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/abe39041-dee2-4e2a-906c-06c0beda2372/wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/BT-ADMIN
         * SPN found :HOST/BT-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/BT-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... BT-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC BT-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         BT-ADMIN.currentTime = 20090127170410.0Z
 
         BT-ADMIN.highestCommittedUSN = 4689909
 
         BT-ADMIN.isSynchronized = 1
 
         BT-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... BT-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\BT-ADMIN\netlogon
         Verified share \\BT-ADMIN\sysvol
         [BT-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... BT-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         BT-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... BT-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... BT-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,BT-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... BT-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 6607 to 7106
         * rIDPreviousAllocationPool is 6607 to 7106
         * rIDNextRID: 6734
         ......................... BT-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on BT-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... BT-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\BT-ADMIN:System:
 
          Access is denied.
 
         ......................... BT-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... BT-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... BT-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=BT-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=BT-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=BT-ADMIN,CN=Servers,CN=Bryte,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... BT-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... BT-ADMIN passed test VerifyReplicas
 
   
   Testing server: Elkhorn\ELK-ADMIN
 
      Starting test: Advertising
 
         The DC ELK-ADMIN is advertising itself as a DC and having a DS.
         The DC ELK-ADMIN is advertising as an LDAP server
         The DC ELK-ADMIN is advertising as having a writeable directory
         The DC ELK-ADMIN is advertising as a Key Distribution Center
         The DC ELK-ADMIN is advertising as a time server
         The DS ELK-ADMIN is advertising as a GC.
         ......................... ELK-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC ELK-ADMIN for domain wusd.k12.ca.us in site Elkhorn
         Checking machine account for DC ELK-ADMIN on DC ELK-ADMIN.
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/ELK-ADMIN
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/13050545-307f-4a3b-b17b-0a1f0ebd6265/wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [ELK-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [ELK-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [ELK-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... ELK-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... ELK-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\ELK-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... ELK-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\ELK-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... ELK-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... ELK-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... ELK-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\ELK-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... ELK-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... ELK-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC ELK-ADMIN on DC ELK-ADMIN.
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/ELK-ADMIN
         * SPN found :LDAP/ELK-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/13050545-307f-4a3b-b17b-0a1f0ebd6265._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/13050545-307f-4a3b-b17b-0a1f0ebd6265/wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/ELK-ADMIN
         * SPN found :HOST/ELK-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/ELK-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... ELK-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC ELK-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         ELK-ADMIN.currentTime = 20090127170431.0Z
 
         ELK-ADMIN.highestCommittedUSN = 4570627
 
         ELK-ADMIN.isSynchronized = 1
 
         ELK-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... ELK-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\ELK-ADMIN\netlogon
         Verified share \\ELK-ADMIN\sysvol
         [ELK-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... ELK-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         ELK-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... ELK-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... ELK-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,ELK-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... ELK-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 7607 to 8106
         * rIDPreviousAllocationPool is 7607 to 8106
         * rIDNextRID: 7787
         ......................... ELK-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on ELK-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... ELK-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\ELK-ADMIN:System:
 
          Access is denied.
 
         ......................... ELK-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... ELK-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... ELK-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=ELK-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=ELK-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=ELK-ADMIN,CN=Servers,CN=Elkhorn,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... ELK-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... ELK-ADMIN passed test VerifyReplicas
 
   
   Testing server: Evergreen\EV-ADMIN
 
      Starting test: Advertising
 
         The DC EV-ADMIN is advertising itself as a DC and having a DS.
         The DC EV-ADMIN is advertising as an LDAP server
         The DC EV-ADMIN is advertising as having a writeable directory
         The DC EV-ADMIN is advertising as a Key Distribution Center
         The DC EV-ADMIN is advertising as a time server
         The DS EV-ADMIN is advertising as a GC.
         ......................... EV-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC EV-ADMIN for domain wusd.k12.ca.us in site Evergreen
         Checking machine account for DC EV-ADMIN on DC EV-ADMIN.
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/EV-ADMIN
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/3f349957-da42-43bb-b8c1-ac5e984bd02c/wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [EV-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [EV-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [EV-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... EV-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... EV-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\EV-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... EV-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\EV-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... EV-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... EV-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... EV-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\EV-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... EV-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... EV-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC EV-ADMIN on DC EV-ADMIN.
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/EV-ADMIN
         * SPN found :LDAP/EV-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/3f349957-da42-43bb-b8c1-ac5e984bd02c._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/3f349957-da42-43bb-b8c1-ac5e984bd02c/wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/EV-ADMIN
         * SPN found :HOST/EV-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/EV-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... EV-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC EV-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         EV-ADMIN.currentTime = 20090127170449.0Z
 
         EV-ADMIN.highestCommittedUSN = 6618960
 
         EV-ADMIN.isSynchronized = 1
 
         EV-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... EV-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\EV-ADMIN\netlogon
         Verified share \\EV-ADMIN\sysvol
         [EV-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... EV-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         EV-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... EV-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... EV-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,EV-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... EV-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 3607 to 4106
         * rIDPreviousAllocationPool is 3607 to 4106
         * rIDNextRID: 3736
         ......................... EV-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on EV-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... EV-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\EV-ADMIN:System:
 
          Access is denied.
 
         ......................... EV-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... EV-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... EV-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=EV-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=EV-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=EV-ADMIN,CN=Servers,CN=Evergreen,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... EV-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... EV-ADMIN passed test VerifyReplicas
 
   
   Testing server: Westfield\WF-ADMIN
 
      Starting test: Advertising
 
         The DC WF-ADMIN is advertising itself as a DC and having a DS.
         The DC WF-ADMIN is advertising as an LDAP server
         The DC WF-ADMIN is advertising as having a writeable directory
         The DC WF-ADMIN is advertising as a Key Distribution Center
         The DC WF-ADMIN is advertising as a time server
         The DS WF-ADMIN is advertising as a GC.
         ......................... WF-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WF-ADMIN for domain wusd.k12.ca.us in site Westfield
         Checking machine account for DC WF-ADMIN on DC WF-ADMIN.
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/WF-ADMIN
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2f5849a9-7eb5-403e-85fc-22b7f325b93a/wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [WF-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WF-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WF-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WF-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WF-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\WF-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... WF-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\WF-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... WF-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WF-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WF-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\WF-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... WF-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WF-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WF-ADMIN on DC WF-ADMIN.
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/WF-ADMIN
         * SPN found :LDAP/WF-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/2f5849a9-7eb5-403e-85fc-22b7f325b93a._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2f5849a9-7eb5-403e-85fc-22b7f325b93a/wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/WF-ADMIN
         * SPN found :HOST/WF-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/WF-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WF-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WF-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WF-ADMIN.currentTime = 20090127170515.0Z
 
         WF-ADMIN.highestCommittedUSN = 3986651
 
         WF-ADMIN.isSynchronized = 1
 
         WF-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WF-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WF-ADMIN\netlogon
         Verified share \\WF-ADMIN\sysvol
         [WF-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WF-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WF-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WF-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WF-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,WF-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WF-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 7107 to 7606
         * rIDPreviousAllocationPool is 7107 to 7606
         * rIDNextRID: 7232
         ......................... WF-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on WF-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WF-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\WF-ADMIN:System:
 
          Access is denied.
 
         ......................... WF-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WF-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WF-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WF-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WF-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WF-ADMIN,CN=Servers,CN=Westfield,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WF-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WF-ADMIN passed test VerifyReplicas
 
   
   Testing server: SouthPort\SP-ADMIN
 
      Starting test: Advertising
 
         The DC SP-ADMIN is advertising itself as a DC and having a DS.
         The DC SP-ADMIN is advertising as an LDAP server
         The DC SP-ADMIN is advertising as having a writeable directory
         The DC SP-ADMIN is advertising as a Key Distribution Center
         The DC SP-ADMIN is advertising as a time server
         The DS SP-ADMIN is advertising as a GC.
         ......................... SP-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC SP-ADMIN for domain wusd.k12.ca.us in site SouthPort
         Checking machine account for DC SP-ADMIN on DC SP-ADMIN.
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/SP-ADMIN
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94/wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [SP-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [SP-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [SP-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... SP-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... SP-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\SP-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... SP-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\SP-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... SP-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... SP-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... SP-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\SP-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... SP-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... SP-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC SP-ADMIN on DC SP-ADMIN.
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/SP-ADMIN
         * SPN found :LDAP/SP-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/5ef54068-8fdb-4cdf-95b2-bd64b4f5ee94/wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/SP-ADMIN
         * SPN found :HOST/SP-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/SP-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... SP-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC SP-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         SP-ADMIN.currentTime = 20090127170540.0Z
 
         SP-ADMIN.highestCommittedUSN = 3601966
 
         SP-ADMIN.isSynchronized = 1
 
         SP-ADMIN.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... SP-ADMIN passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\SP-ADMIN\netlogon
         Verified share \\SP-ADMIN\sysvol
         [SP-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... SP-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         SP-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... SP-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... SP-ADMIN passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,SP-ADMIN] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... SP-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 9107 to 9606
         * rIDPreviousAllocationPool is 9107 to 9606
         * rIDNextRID: 9186
         ......................... SP-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on SP-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... SP-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\SP-ADMIN:System:
 
          Access is denied.
 
         ......................... SP-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... SP-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... SP-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=SP-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=SP-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=SP-ADMIN,CN=Servers,CN=SouthPort,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... SP-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... SP-ADMIN passed test VerifyReplicas
 
   
   Testing server: Westmore\WM-CAMPUS
 
      Starting test: Advertising
 
         The DC WM-CAMPUS is advertising itself as a DC and having a DS.
         The DC WM-CAMPUS is advertising as an LDAP server
         The DC WM-CAMPUS is advertising as having a writeable directory
         The DC WM-CAMPUS is advertising as a Key Distribution Center
         The DC WM-CAMPUS is advertising as a time server
         The DS WM-CAMPUS is advertising as a GC.
         ......................... WM-CAMPUS passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WM-CAMPUS for domain wusd.k12.ca.us in site Westmore
         Checking machine account for DC WM-CAMPUS on DC WM-CAMPUS.
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us
         * SPN found :LDAP/WM-CAMPUS
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/a86aa50f-8b4e-4eac-87b7-503614be8e34/wusd.k12.ca.us
         * SPN found :HOST/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wm-campus.wusd.k12.ca.us
         * SPN found :HOST/WM-CAMPUS
         * SPN found :HOST/wm-campus.wusd.k12.ca.us/WUSD
         * SPN found :GC/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
            [WM-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WM-CAMPUS] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WM-CAMPUS] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WM-CAMPUS passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WM-CAMPUS passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\WM-CAMPUS:File Replication Service:
 
          Access is denied.
 
         ......................... WM-CAMPUS failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\WM-CAMPUS:DFS Replication:
 
          Access is denied.
 
         ......................... WM-CAMPUS failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WM-CAMPUS failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WM-CAMPUS failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\WM-CAMPUS:Directory Service:
 
          Access is denied.
 
         ......................... WM-CAMPUS failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WM-CAMPUS passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WM-CAMPUS on DC WM-CAMPUS.
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us
         * SPN found :LDAP/WM-CAMPUS
         * SPN found :LDAP/wm-campus.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/a86aa50f-8b4e-4eac-87b7-503614be8e34._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/a86aa50f-8b4e-4eac-87b7-503614be8e34/wusd.k12.ca.us
         * SPN found :HOST/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wm-campus.wusd.k12.ca.us
         * SPN found :HOST/WM-CAMPUS
         * SPN found :HOST/wm-campus.wusd.k12.ca.us/WUSD
         * SPN found :GC/wm-campus.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WM-CAMPUS passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WM-CAMPUS.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WM-CAMPUS.currentTime = 20090127170604.0Z
 
         WM-CAMPUS.highestCommittedUSN = 2804369
 
         WM-CAMPUS.isSynchronized = 1
 
         WM-CAMPUS.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WM-CAMPUS passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WM-CAMPUS\netlogon
         Verified share \\WM-CAMPUS\sysvol
         [WM-CAMPUS] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WM-CAMPUS failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WM-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WM-CAMPUS passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WM-CAMPUS passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,WM-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WM-CAMPUS failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 10107 to 10606
         * rIDPreviousAllocationPool is 10107 to 10606
         * rIDNextRID: 10131
         ......................... WM-CAMPUS passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on wm-campus.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WM-CAMPUS failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\WM-CAMPUS:System:
 
          Access is denied.
 
         ......................... WM-CAMPUS failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WM-CAMPUS passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WM-CAMPUS passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WM-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WM-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WM-CAMPUS,CN=Servers,CN=Westmore,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WM-CAMPUS passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WM-CAMPUS passed test VerifyReplicas
 
   
   Testing server: NewHighSchool\RCHS-CAMPUS
 
      Starting test: Advertising
 
         The DC RCHS-CAMPUS is advertising itself as a DC and having a DS.
         The DC RCHS-CAMPUS is advertising as an LDAP server
         The DC RCHS-CAMPUS is advertising as having a writeable directory
         The DC RCHS-CAMPUS is advertising as a Key Distribution Center
         The DC RCHS-CAMPUS is advertising as a time server
         The DS RCHS-CAMPUS is advertising as a GC.
         ......................... RCHS-CAMPUS passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RCHS-TMPDC for domain rchs.wusd.k12.ca.us in site NewHighSchool
         Checking machine account for DC RCHS-CAMPUS on DC RCHS-TMPDC.
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-CAMPUS
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/1ade07c1-fd1d-4af7-827d-325a59a6e1e6/rchs.wusd.k12.ca.us
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-CAMPUS
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/rchs-campus.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         Checking for CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
            Object is up-to-date on all servers.
         [RCHS-CAMPUS] No security related replication errors were found on
 
         this DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... RCHS-CAMPUS passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-CAMPUS passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         ......................... RCHS-CAMPUS passed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         There are warning or error events within the last 24 hours after the
 
         SYSVOL has been shared.  Failing SYSVOL replication problems may cause
 
         Group Policy problems. 
         An Warning Event occurred.  EventID: 0x800005F4
 
            Time Generated: 01/26/2009   22:47:29
 
            (Event String (event log = DFS Replication) could not be retrieved,
 
            error 0x13d)
 
         ......................... RCHS-CAMPUS passed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-CAMPUS passed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-CAMPUS passed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
         ......................... RCHS-CAMPUS passed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... RCHS-CAMPUS passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC RCHS-CAMPUS on DC RCHS-CAMPUS.
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-CAMPUS
         * SPN found :LDAP/rchs-campus.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/1ade07c1-fd1d-4af7-827d-325a59a6e1e6/rchs.wusd.k12.ca.us
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-CAMPUS
         * SPN found :HOST/rchs-campus.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/rchs-campus.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... RCHS-CAMPUS passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC RCHS-CAMPUS.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
         RCHS-CAMPUS.currentTime = 20090127170622.0Z
 
         RCHS-CAMPUS.highestCommittedUSN = 5703079
 
         RCHS-CAMPUS.isSynchronized = 1
 
         RCHS-CAMPUS.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... RCHS-CAMPUS passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\RCHS-CAMPUS\netlogon
         Verified share \\RCHS-CAMPUS\sysvol
         ......................... RCHS-CAMPUS passed test NetLogons
 
      Starting test: ObjectsReplicated
 
         RCHS-CAMPUS is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... RCHS-CAMPUS passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... RCHS-CAMPUS passed test
 
         OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
         DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         * Replication Latency Check
            DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  11 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  9 were retired Invocations.  2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
         ......................... RCHS-CAMPUS passed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 10104 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 9104 to 9603
         * rIDPreviousAllocationPool is 9104 to 9603
         * rIDNextRID: 9341
         ......................... RCHS-CAMPUS passed test RidManager
 
      Starting test: Services
 
         * Checking Service: EventSystem
         * Checking Service: RpcSs
         * Checking Service: DnsCache
         * Checking Service: NtFrs
         * Checking Service: IsmServ
         * Checking Service: kdc
         * Checking Service: SamSs
         * Checking Service: LanmanServer
         * Checking Service: LanmanWorkstation
         * Checking Service: w32time
         * Checking Service: NETLOGON
         ......................... RCHS-CAMPUS passed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         An Error Event occurred.  EventID: 0x00000457
 
            Time Generated: 01/27/2009   08:27:51
 
            (Event String (event log = System) could not be retrieved, error
 
            0x13d)
 
         An Warning Event occurred.  EventID: 0x8000000E
 
            Time Generated: 01/27/2009   08:28:56
 
            Event String:
 
            There were password errors using the Credential
 
            Manager. To remedy, launch the Stored User Names
 
            and Passwords control panel applet, and reenter
 
            the password for the credential WUSD. 
 
         An Warning Event occurred.  EventID: 0x8000A000
 
            Time Generated: 01/27/2009   08:28:56
 
            Event String:
 
            The Security System detected an authentication
 
            error for the server cifs/wusd-dc01. The failure
 
            code from authentication protocol Kerberos was
 
            "The attempted logon is invalid. This is either due to a bad username or authentication information.
 
             (0xc000006d)".
 
             
 
         An Warning Event occurred.  EventID: 0x8000A000
 
            Time Generated: 01/27/2009   08:28:56
 
            Event String:
 
            The Security System detected an authentication
 
            error for the server
 
            cifs/wusd-dc01.wusd.k12.ca.us. The failure code
 
            from authentication protocol Kerberos was
 
            "The attempted logon is invalid. This is either due to a bad username or authentication information.
 
             (0xc000006d)".
 
             
 
         An Error Event occurred.  EventID: 0x00000457
 
            Time Generated: 01/27/2009   08:30:05
 
            (Event String (event log = System) could not be retrieved, error
 
            0x13d)
 
         ......................... RCHS-CAMPUS failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-CAMPUS passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... RCHS-CAMPUS passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=RCHS-CAMPUS,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=RCHS-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=RCHS-CAMPUS,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... RCHS-CAMPUS passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... RCHS-CAMPUS passed test VerifyReplicas
 
   
   Testing server: DistrictOffice\RCHS-DC02
 
      Starting test: Advertising
 
         The DC RCHS-DC02 is advertising itself as a DC and having a DS.
         The DC RCHS-DC02 is advertising as an LDAP server
         The DC RCHS-DC02 is advertising as having a writeable directory
         The DC RCHS-DC02 is advertising as a Key Distribution Center
         The DC RCHS-DC02 is advertising as a time server
         The DS RCHS-DC02 is advertising as a GC.
         ......................... RCHS-DC02 passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RCHS-DC02 for domain rchs.wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC RCHS-DC02 on DC RCHS-DC02.
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-DC02
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02329cde-05de-4208-9935-0ec4743e6fba/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/RCHS-DC02.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         [RCHS-DC02] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... RCHS-DC02 passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-DC02 passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         ......................... RCHS-DC02 passed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         ......................... RCHS-DC02 passed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-DC02 passed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-DC02 passed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
         ......................... RCHS-DC02 passed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... RCHS-DC02 passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC RCHS-DC02 on DC RCHS-DC02.
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-DC02
         * SPN found :LDAP/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/02329cde-05de-4208-9935-0ec4743e6fba/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-DC02
         * SPN found :HOST/RCHS-DC02.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/RCHS-DC02.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... RCHS-DC02 passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC RCHS-DC02.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
         RCHS-DC02.currentTime = 20090127170636.0Z
 
         RCHS-DC02.highestCommittedUSN = 6556414
 
         RCHS-DC02.isSynchronized = 1
 
         RCHS-DC02.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... RCHS-DC02 passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\RCHS-DC02\netlogon
         Verified share \\RCHS-DC02\sysvol
         ......................... RCHS-DC02 passed test NetLogons
 
      Starting test: ObjectsReplicated
 
         RCHS-DC02 is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... RCHS-DC02 passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... RCHS-DC02 passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
         DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         * Replication Latency Check
            DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  11 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  9 were retired Invocations.  2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
         ......................... RCHS-DC02 passed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 10104 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 3104 to 3603
         * rIDPreviousAllocationPool is 3104 to 3603
         * rIDNextRID: 3304
         ......................... RCHS-DC02 passed test RidManager
 
      Starting test: Services
 
         * Checking Service: EventSystem
         * Checking Service: RpcSs
         * Checking Service: DnsCache
         * Checking Service: NtFrs
         * Checking Service: IsmServ
         * Checking Service: kdc
         * Checking Service: SamSs
         * Checking Service: LanmanServer
         * Checking Service: LanmanWorkstation
         * Checking Service: w32time
         * Checking Service: NETLOGON
         ......................... RCHS-DC02 passed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Found no errors in "System" Event log in the last 60 minutes.
         ......................... RCHS-DC02 passed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-DC02 passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... RCHS-DC02 passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=RCHS-DC02,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=RCHS-DC02,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=RCHS-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... RCHS-DC02 passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... RCHS-DC02 passed test VerifyReplicas
 
   
   Testing server: DistrictOffice\WUSD-DC01
 
      Starting test: Advertising
 
         The DC WUSD-DC01 is advertising itself as a DC and having a DS.
         The DC WUSD-DC01 is advertising as an LDAP server
         The DC WUSD-DC01 is advertising as having a writeable directory
         The DC WUSD-DC01 is advertising as a Key Distribution Center
         The DC WUSD-DC01 is advertising as a time server
         The DS WUSD-DC01 is advertising as a GC.
         ......................... WUSD-DC01 passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC WUSD-DC01 on DC WUSD-DC1.
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC01
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/37beb541-54e8-4189-b0ae-0d56719fafa3/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC01
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         Checking for CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
            Object is up-to-date on all servers.
            [WUSD-DC01] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-DC01] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WUSD-DC01] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WUSD-DC01 passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC01 passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\WUSD-DC01:File Replication Service:
 
          Access is denied.
 
         ......................... WUSD-DC01 failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\WUSD-DC01:DFS Replication:
 
          Access is denied.
 
         ......................... WUSD-DC01 failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC01 failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC01 failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\WUSD-DC01:Directory Service:
 
          Access is denied.
 
         ......................... WUSD-DC01 failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WUSD-DC01 passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WUSD-DC01 on DC WUSD-DC01.
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC01
         * SPN found :LDAP/wusd-dc01.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/37beb541-54e8-4189-b0ae-0d56719fafa3._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/37beb541-54e8-4189-b0ae-0d56719fafa3/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC01
         * SPN found :HOST/wusd-dc01.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc01.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WUSD-DC01 passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WUSD-DC01.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WUSD-DC01.currentTime = 20090127170619.0Z
 
         WUSD-DC01.highestCommittedUSN = 13128420
 
         WUSD-DC01.isSynchronized = 1
 
         WUSD-DC01.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WUSD-DC01 passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WUSD-DC01\netlogon
         Verified share \\WUSD-DC01\sysvol
         [WUSD-DC01] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WUSD-DC01 failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WUSD-DC01 is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WUSD-DC01 passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WUSD-DC01 passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,WUSD-DC01] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WUSD-DC01 failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 12107 to 12606
         * rIDPreviousAllocationPool is 11607 to 12106
         * rIDNextRID: 12086
         * Warning :There is less than 5% available RIDs in the current pool
         ......................... WUSD-DC01 passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on wusd-dc01.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WUSD-DC01 failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\WUSD-DC01:System:
 
          Access is denied.
 
         ......................... WUSD-DC01 failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC01 passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WUSD-DC01 passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WUSD-DC01,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WUSD-DC01,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WUSD-DC01,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WUSD-DC01 passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WUSD-DC01 passed test VerifyReplicas
 
   
   Testing server: DistrictOffice\WUSD-DC02
 
      Starting test: Advertising
 
         The DC WUSD-DC02 is advertising itself as a DC and having a DS.
         The DC WUSD-DC02 is advertising as an LDAP server
         The DC WUSD-DC02 is advertising as having a writeable directory
         The DC WUSD-DC02 is advertising as a Key Distribution Center
         The DC WUSD-DC02 is advertising as a time server
         The DS WUSD-DC02 is advertising as a GC.
         ......................... WUSD-DC02 passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC WUSD-DC02 on DC WUSD-DC1.
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC02
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c5105bc1-2b24-4573-8711-8622336e982e/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC02
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         Checking for CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
            Object is up-to-date on all servers.
            [WUSD-DC02] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-DC02] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WUSD-DC02] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WUSD-DC02 passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC02 passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\WUSD-DC02:File Replication Service:
 
          Access is denied.
 
         ......................... WUSD-DC02 failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\WUSD-DC02:DFS Replication:
 
          Access is denied.
 
         ......................... WUSD-DC02 failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC02 failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC02 failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\WUSD-DC02:Directory Service:
 
          Access is denied.
 
         ......................... WUSD-DC02 failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WUSD-DC02 passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WUSD-DC02 on DC WUSD-DC02.
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC02
         * SPN found :LDAP/wusd-dc02.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/c5105bc1-2b24-4573-8711-8622336e982e._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c5105bc1-2b24-4573-8711-8622336e982e/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC02
         * SPN found :HOST/wusd-dc02.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc02.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WUSD-DC02 passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WUSD-DC02.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WUSD-DC02.currentTime = 20090127170710.0Z
 
         WUSD-DC02.highestCommittedUSN = 12836447
 
         WUSD-DC02.isSynchronized = 1
 
         WUSD-DC02.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WUSD-DC02 passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WUSD-DC02\netlogon
         Verified share \\WUSD-DC02\sysvol
         [WUSD-DC02] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WUSD-DC02 failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WUSD-DC02 is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WUSD-DC02 passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WUSD-DC02 passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,WUSD-DC02] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WUSD-DC02 failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 15607 to 16106
         * rIDPreviousAllocationPool is 15607 to 16106
         * rIDNextRID: 15840
         ......................... WUSD-DC02 passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on wusd-dc02.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WUSD-DC02 failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\WUSD-DC02:System:
 
          Access is denied.
 
         ......................... WUSD-DC02 failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC02 passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WUSD-DC02 passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WUSD-DC02,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WUSD-DC02,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WUSD-DC02,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WUSD-DC02 passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WUSD-DC02 passed test VerifyReplicas
 
   
   Testing server: NewHighSchool\RCHS-ADMIN
 
      Starting test: Advertising
 
         The DC RCHS-ADMIN is advertising itself as a DC and having a DS.
         The DC RCHS-ADMIN is advertising as an LDAP server
         The DC RCHS-ADMIN is advertising as having a writeable directory
         The DC RCHS-ADMIN is advertising as a Key Distribution Center
         The DC RCHS-ADMIN is advertising as a time server
         ......................... RCHS-ADMIN passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RCHS-ADMIN for domain wusd.k12.ca.us in site NewHighSchool
         Checking machine account for DC RCHS-ADMIN on DC RCHS-ADMIN.
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-ADMIN
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/ee694a22-0e78-4716-82c2-81c32084b26a/wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
            [RCHS-ADMIN] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [RCHS-ADMIN] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [RCHS-ADMIN] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... RCHS-ADMIN passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-ADMIN passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\RCHS-ADMIN:File Replication Service:
 
          Access is denied.
 
         ......................... RCHS-ADMIN failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\RCHS-ADMIN:DFS Replication:
 
          Access is denied.
 
         ......................... RCHS-ADMIN failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... RCHS-ADMIN failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... RCHS-ADMIN failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\RCHS-ADMIN:Directory Service:
 
          Access is denied.
 
         ......................... RCHS-ADMIN failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... RCHS-ADMIN passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC RCHS-ADMIN on DC RCHS-ADMIN.
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-ADMIN
         * SPN found :LDAP/RCHS-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/ee694a22-0e78-4716-82c2-81c32084b26a._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/ee694a22-0e78-4716-82c2-81c32084b26a/wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us
         * SPN found :HOST/RCHS-ADMIN
         * SPN found :HOST/RCHS-ADMIN.wusd.k12.ca.us/WUSD
         * SPN found :GC/RCHS-ADMIN.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... RCHS-ADMIN passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC RCHS-ADMIN.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         Ldap search capabality attribute search failed on server RCHS-ADMIN,
 
         return value = 81
         ......................... RCHS-ADMIN failed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\RCHS-ADMIN\netlogon
         Verified share \\RCHS-ADMIN\sysvol
         [RCHS-ADMIN] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... RCHS-ADMIN failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         RCHS-ADMIN is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... RCHS-ADMIN passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... RCHS-ADMIN passed test
 
         OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 22 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         [Replications Check,RCHS-ADMIN] DsReplicaGetInfo(CURSORS,
 
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us) failed, error 0x20f8
 
         "The naming context specified for this replication operation is invalid."
 
         
 
         ......................... RCHS-ADMIN failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 5607 to 6106
         * rIDPreviousAllocationPool is 5607 to 6106
         * rIDNextRID: 5813
         ......................... RCHS-ADMIN passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on RCHS-ADMIN.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... RCHS-ADMIN failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\RCHS-ADMIN:System:
 
          Access is denied.
 
         ......................... RCHS-ADMIN failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-ADMIN passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... RCHS-ADMIN passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=RCHS-ADMIN,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=RCHS-ADMIN,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=RCHS-ADMIN,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... RCHS-ADMIN passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... RCHS-ADMIN passed test VerifyReplicas
 
   
   Testing server: StoneGate\SG-CAMPUS
 
      Starting test: Advertising
 
         The DC SG-CAMPUS is advertising itself as a DC and having a DS.
         The DC SG-CAMPUS is advertising as an LDAP server
         The DC SG-CAMPUS is advertising as having a writeable directory
         The DC SG-CAMPUS is advertising as a Key Distribution Center
         The DC SG-CAMPUS is advertising as a time server
         The DS SG-CAMPUS is advertising as a GC.
         ......................... SG-CAMPUS passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC SG-CAMPUS for domain wusd.k12.ca.us in site StoneGate
         Checking machine account for DC SG-CAMPUS on DC SG-CAMPUS.
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us
         * SPN found :LDAP/SG-CAMPUS
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c983e27e-0a85-4f89-baed-549df9475f34/wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/WUSD
         * SPN found :GC/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
            [SG-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [SG-CAMPUS] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [SG-CAMPUS] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... SG-CAMPUS passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... SG-CAMPUS passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\SG-CAMPUS:File Replication Service:
 
          Access is denied.
 
         ......................... SG-CAMPUS failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\SG-CAMPUS:DFS Replication:
 
          Access is denied.
 
         ......................... SG-CAMPUS failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... SG-CAMPUS failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... SG-CAMPUS failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\SG-CAMPUS:Directory Service:
 
          Access is denied.
 
         ......................... SG-CAMPUS failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... SG-CAMPUS passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC SG-CAMPUS on DC SG-CAMPUS.
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us
         * SPN found :LDAP/SG-CAMPUS
         * SPN found :LDAP/SG-CAMPUS.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/c983e27e-0a85-4f89-baed-549df9475f34._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/c983e27e-0a85-4f89-baed-549df9475f34/wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us
         * SPN found :HOST/SG-CAMPUS
         * SPN found :HOST/SG-CAMPUS.wusd.k12.ca.us/WUSD
         * SPN found :GC/SG-CAMPUS.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... SG-CAMPUS passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC SG-CAMPUS.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         SG-CAMPUS.currentTime = 20090127170753.0Z
 
         SG-CAMPUS.highestCommittedUSN = 2247273
 
         SG-CAMPUS.isSynchronized = 1
 
         SG-CAMPUS.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... SG-CAMPUS passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\SG-CAMPUS\netlogon
         Verified share \\SG-CAMPUS\sysvol
         [SG-CAMPUS] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... SG-CAMPUS failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         SG-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... SG-CAMPUS passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... SG-CAMPUS passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 18 cursors.
         [Replications Check,SG-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... SG-CAMPUS failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 10607 to 11106
         * rIDPreviousAllocationPool is 10607 to 11106
         * rIDNextRID: 10711
         ......................... SG-CAMPUS passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on SG-CAMPUS.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... SG-CAMPUS failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\SG-CAMPUS:System:
 
          Access is denied.
 
         ......................... SG-CAMPUS failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... SG-CAMPUS passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... SG-CAMPUS passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=SG-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=SG-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=SG-CAMPUS,CN=Servers,CN=StoneGate,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... SG-CAMPUS passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... SG-CAMPUS passed test VerifyReplicas
 
   
   Testing server: RiverBank\RB-CAMPUS
 
      Starting test: Advertising
 
         The DC RB-CAMPUS is advertising itself as a DC and having a DS.
         The DC RB-CAMPUS is advertising as an LDAP server
         The DC RB-CAMPUS is advertising as having a writeable directory
         The DC RB-CAMPUS is advertising as a Key Distribution Center
         The DC RB-CAMPUS is advertising as a time server
         The DS RB-CAMPUS is advertising as a GC.
         ......................... RB-CAMPUS passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RB-CAMPUS for domain wusd.k12.ca.us in site RiverBank
         Checking machine account for DC RB-CAMPUS on DC RB-CAMPUS.
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us
         * SPN found :LDAP/RB-CAMPUS
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/8e7bcbe2-8749-4d26-bf07-25b31106f55c/wusd.k12.ca.us
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us
         * SPN found :HOST/RB-CAMPUS
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us/WUSD
         * SPN found :GC/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
            [RB-CAMPUS] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [RB-CAMPUS] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [RB-CAMPUS] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... RB-CAMPUS passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RB-CAMPUS passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         Error 5 opening File Replication Service eventlog
 
         \\RB-CAMPUS:File Replication Service:
 
          Access is denied.
 
         ......................... RB-CAMPUS failed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         Error 5 opening DFS Replication eventlog \\RB-CAMPUS:DFS Replication:
 
          Access is denied.
 
         ......................... RB-CAMPUS failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... RB-CAMPUS failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... RB-CAMPUS failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Error 5 opening Directory Service eventlog
 
         \\RB-CAMPUS:Directory Service:
 
          Access is denied.
 
         ......................... RB-CAMPUS failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... RB-CAMPUS passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC RB-CAMPUS on DC RB-CAMPUS.
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us
         * SPN found :LDAP/RB-CAMPUS
         * SPN found :LDAP/RB-Campus.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/8e7bcbe2-8749-4d26-bf07-25b31106f55c._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/8e7bcbe2-8749-4d26-bf07-25b31106f55c/wusd.k12.ca.us
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us
         * SPN found :HOST/RB-CAMPUS
         * SPN found :HOST/RB-Campus.wusd.k12.ca.us/WUSD
         * SPN found :GC/RB-Campus.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... RB-CAMPUS passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC RB-CAMPUS.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         RB-CAMPUS.currentTime = 20090127170817.0Z
 
         RB-CAMPUS.highestCommittedUSN = 957307
 
         RB-CAMPUS.isSynchronized = 1
 
         RB-CAMPUS.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... RB-CAMPUS passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\RB-CAMPUS\netlogon
         Verified share \\RB-CAMPUS\sysvol
         [RB-CAMPUS] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... RB-CAMPUS failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         RB-CAMPUS is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... RB-CAMPUS passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... RB-CAMPUS passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,RB-CAMPUS] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... RB-CAMPUS failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 13107 to 13606
         * rIDPreviousAllocationPool is 13107 to 13606
         * rIDNextRID: 13176
         ......................... RB-CAMPUS passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on RB-Campus.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... RB-CAMPUS failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         Error 5 opening System eventlog \\RB-CAMPUS:System:
 
          Access is denied.
 
         ......................... RB-CAMPUS failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RB-CAMPUS passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... RB-CAMPUS passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=RB-CAMPUS,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=RB-CAMPUS,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=RB-CAMPUS,CN=Servers,CN=RiverBank,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... RB-CAMPUS passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... RB-CAMPUS passed test VerifyReplicas
 
   
   Testing server: DistrictOffice\WUSD-DC2
 
      Starting test: Advertising
 
         The DC WUSD-DC2 is advertising itself as a DC and having a DS.
         The DC WUSD-DC2 is advertising as an LDAP server
         The DC WUSD-DC2 is advertising as having a writeable directory
         The DC WUSD-DC2 is advertising as a Key Distribution Center
         The DC WUSD-DC2 is advertising as a time server
         The DS WUSD-DC2 is advertising as a GC.
         ......................... WUSD-DC2 passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC WUSD-DC2 on DC WUSD-DC1.
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC2
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003/wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/WUSD
         * SPN found :GC/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         Checking for CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
            Object is up-to-date on all servers.
            [WUSD-DC2] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-DC2] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WUSD-DC2] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WUSD-DC2 passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC2 passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         ......................... WUSD-DC2 passed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         The event log DFS Replication on server WUSD-DC2.wusd.k12.ca.us could
 
         not be queried, error 0x5 "Access is denied."
 
         ......................... WUSD-DC2 failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC2 failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-DC2 failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         The event log Directory Service on server WUSD-DC2.wusd.k12.ca.us
 
         could not be queried, error 0x5 "Access is denied."
 
         ......................... WUSD-DC2 failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WUSD-DC2 passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WUSD-DC2 on DC WUSD-DC2.
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC2
         * SPN found :LDAP/WUSD-DC2.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/2cb154d1-ce95-4c62-a2f9-ea3cb9f15003/wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC2
         * SPN found :HOST/WUSD-DC2.wusd.k12.ca.us/WUSD
         * SPN found :GC/WUSD-DC2.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WUSD-DC2 passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WUSD-DC2.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WUSD-DC2.currentTime = 20090127171039.0Z
 
         WUSD-DC2.highestCommittedUSN = 1908706
 
         WUSD-DC2.isSynchronized = 1
 
         WUSD-DC2.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WUSD-DC2 passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WUSD-DC2\netlogon
         Verified share \\WUSD-DC2\sysvol
         [WUSD-DC2] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WUSD-DC2 failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WUSD-DC2 is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WUSD-DC2 passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WUSD-DC2 passed test OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 17 cursors.
         [Replications Check,WUSD-DC2] DsReplicaGetInfo(PENDING_OPS, NULL)
 
         failed, error 0x2105 "Replication access was denied."
 
         ......................... WUSD-DC2 failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 15107 to 15606
         * rIDPreviousAllocationPool is 15107 to 15606
         * rIDNextRID: 15170
         ......................... WUSD-DC2 passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on WUSD-DC2.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WUSD-DC2 failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         The event log System on server WUSD-DC2.wusd.k12.ca.us could not be
 
         queried, error 0x5 "Access is denied."
 
         ......................... WUSD-DC2 failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-DC2 passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WUSD-DC2 passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WUSD-DC2,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WUSD-DC2,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WUSD-DC2,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WUSD-DC2 passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WUSD-DC2 passed test VerifyReplicas
 
   
   Testing server: NewHighSchool\WUSD-TMPDC
 
      Starting test: Advertising
 
         The DC WUSD-TMPDC is advertising itself as a DC and having a DS.
         The DC WUSD-TMPDC is advertising as an LDAP server
         The DC WUSD-TMPDC is advertising as having a writeable directory
         The DC WUSD-TMPDC is advertising as a Key Distribution Center
         The DC WUSD-TMPDC is advertising as a time server
         The DS WUSD-TMPDC is advertising as a GC.
         ......................... WUSD-TMPDC passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RCHS-ADMIN for domain wusd.k12.ca.us in site NewHighSchool
         Checking machine account for DC WUSD-TMPDC on DC RCHS-ADMIN.
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-TMPDC
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b294c123-5db0-4086-80ce-a99f61b9923d/wusd.k12.ca.us
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us
         * SPN found :HOST/WUSD-TMPDC
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         Checking for CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 2 servers
            Object is up-to-date on all servers.
            [WUSD-TMPDC] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-TMPDC] Unable to query the list of KCC connection failures.
 
            Continuing...
 
         [WUSD-TMPDC] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... WUSD-TMPDC passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-TMPDC passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         ......................... WUSD-TMPDC passed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         The event log DFS Replication on server wusd-tmpdc.wusd.k12.ca.us
 
         could not be queried, error 0x5 "Access is denied."
 
         ......................... WUSD-TMPDC failed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-TMPDC failed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         The registry lookup failed to determine the state of the SYSVOL.  The
 
         error returned  was 0x5 "Access is denied.".  Check the FRS event log
 
         to see if the SYSVOL has successfully been shared. 
         ......................... WUSD-TMPDC failed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         The event log Directory Service on server wusd-tmpdc.wusd.k12.ca.us
 
         could not be queried, error 0x5 "Access is denied."
 
         ......................... WUSD-TMPDC failed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... WUSD-TMPDC passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC WUSD-TMPDC on DC WUSD-TMPDC.
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-TMPDC
         * SPN found :LDAP/wusd-tmpdc.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/b294c123-5db0-4086-80ce-a99f61b9923d._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b294c123-5db0-4086-80ce-a99f61b9923d/wusd.k12.ca.us
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us
         * SPN found :HOST/WUSD-TMPDC
         * SPN found :HOST/wusd-tmpdc.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-tmpdc.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... WUSD-TMPDC passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC WUSD-TMPDC.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         WUSD-TMPDC.currentTime = 20090127170858.0Z
 
         WUSD-TMPDC.highestCommittedUSN = 847412
 
         WUSD-TMPDC.isSynchronized = 1
 
         WUSD-TMPDC.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... WUSD-TMPDC passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\WUSD-TMPDC\netlogon
         Verified share \\WUSD-TMPDC\sysvol
         [WUSD-TMPDC] User credentials does not have permission to perform this
 
         operation.
 
         The account used for this test must have network logon privileges
 
         for this machine's domain.
 
         ......................... WUSD-TMPDC failed test NetLogons
 
      Starting test: ObjectsReplicated
 
         WUSD-TMPDC is in domain DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... WUSD-TMPDC passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... WUSD-TMPDC passed test
 
         OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 20 cursors.
         [Replications Check,WUSD-TMPDC] A recent replication attempt failed:
 
            From RCHS-ADMIN to WUSD-TMPDC
 
            Naming Context: DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
 
            The replication generated an error (8451):
 
            The replication operation encountered a database error.
 
            The failure occurred at 2009-01-27 08:58:48.
 
            The last success occurred at (never).
 
            961 failures have occurred since the last success.
 
            A serious error is preventing replication from continuing.
 
            Consult the error log for further information.
 
            If a particular object is named, it may be necessary to manually
 
            modify or delete the object.
 
            If the condition persists, contact Microsoft Support.
 
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 25 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 18 cursors.
         ......................... WUSD-TMPDC failed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 16607 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * wusd-dc1.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 16107 to 16606
         * rIDPreviousAllocationPool is 16107 to 16606
         * rIDNextRID: 16255
         ......................... WUSD-TMPDC passed test RidManager
 
      Starting test: Services
 
         Could not open Service Control Manager on wusd-tmpdc.wusd.k12.ca.us,
 
         error 0x5 "Access is denied."
 
         ......................... WUSD-TMPDC failed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         The event log System on server wusd-tmpdc.wusd.k12.ca.us could not be
 
         queried, error 0x5 "Access is denied."
 
         ......................... WUSD-TMPDC failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... WUSD-TMPDC passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... WUSD-TMPDC passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=WUSD-TMPDC,OU=Domain Controllers,DC=wusd,DC=k12,DC=ca,DC=us and
 
         backlink on
 
         CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=WUSD-TMPDC,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=WUSD-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... WUSD-TMPDC passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... WUSD-TMPDC passed test VerifyReplicas
 
   
   Testing server: NewHighSchool\RCHS-TMPDC
 
      Starting test: Advertising
 
         The DC RCHS-TMPDC is advertising itself as a DC and having a DS.
         The DC RCHS-TMPDC is advertising as an LDAP server
         The DC RCHS-TMPDC is advertising as having a writeable directory
         The DC RCHS-TMPDC is advertising as a Key Distribution Center
         The DC RCHS-TMPDC is advertising as a time server
         The DS RCHS-TMPDC is advertising as a GC.
         ......................... RCHS-TMPDC passed test Advertising
 
      Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC RCHS-TMPDC for domain rchs.wusd.k12.ca.us in site NewHighSchool
         Checking machine account for DC RCHS-TMPDC on DC RCHS-TMPDC.
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-TMPDC
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b1b9edc1-55cc-403f-8477-57f46100bcb5/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/RCHS-TMPDC.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         [RCHS-TMPDC] No security related replication errors were found on this
 
         DC!  To target the connection to a specific source DC use
 
         /ReplSource:<DC>.
 
         ......................... RCHS-TMPDC passed test CheckSecurityError
 
      Starting test: CutoffServers
 
         * Configuration Topology Aliveness Check
         * Analyzing the alive system replication topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the alive system replication topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-TMPDC passed test CutoffServers
 
      Starting test: FrsEvent
 
         * The File Replication Service Event log test 
         ......................... RCHS-TMPDC passed test FrsEvent
 
      Starting test: DFSREvent
 
         The DFS Replication Event Log. 
         ......................... RCHS-TMPDC passed test DFSREvent
 
      Starting test: SysVolCheck
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-TMPDC passed test SysVolCheck
 
      Starting test: FrsSysVol
 
         * The File Replication Service SYSVOL ready test 
         File Replication Service's SYSVOL is ready 
         ......................... RCHS-TMPDC passed test FrsSysVol
 
      Starting test: KccEvent
 
         * The KCC Event log test
         Found no KCC errors in "Directory Service" Event log in the last 15 minutes.
         ......................... RCHS-TMPDC passed test KccEvent
 
      Starting test: KnowsOfRoleHolders
 
         Role Schema Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Domain Owner = CN=NTDS Settings,CN=WUSD-DC1,CN=Servers,CN=DistrictOffice,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role PDC Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Rid Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         ......................... RCHS-TMPDC passed test KnowsOfRoleHolders
 
      Starting test: MachineAccount
 
         Checking machine account for DC RCHS-TMPDC on DC RCHS-TMPDC.
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us
         * SPN found :LDAP/RCHS-TMPDC
         * SPN found :LDAP/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
         * SPN found :LDAP/b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/b1b9edc1-55cc-403f-8477-57f46100bcb5/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us
         * SPN found :HOST/RCHS-TMPDC
         * SPN found :HOST/RCHS-TMPDC.rchs.wusd.k12.ca.us/RCHS
         * SPN found :GC/RCHS-TMPDC.rchs.wusd.k12.ca.us/wusd.k12.ca.us
         ......................... RCHS-TMPDC passed test MachineAccount
 
      Starting test: NCSecDesc
 
         * Security Permissions check for all NC's on DC RCHS-TMPDC.
         * Security Permissions Check for
 
           DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
            (NDNC,Version 3)
         * Security Permissions Check for
 
           DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
            (Domain,Version 3)
         * Security Permissions Check for
 
           CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Schema,Version 3)
         * Security Permissions Check for
 
           CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
            (Configuration,Version 3)
         * Security Permissions Check for
 
           DC=wusd,DC=k12,DC=ca,DC=us
         RCHS-TMPDC.currentTime = 20090127170911.0Z
 
         RCHS-TMPDC.highestCommittedUSN = 841993
 
         RCHS-TMPDC.isSynchronized = 1
 
         RCHS-TMPDC.isGlobalCatalogReady = 1
 
            (Domain,Version 3)
         ......................... RCHS-TMPDC passed test NCSecDesc
 
      Starting test: NetLogons
 
         * Network Logons Privileges Check
         Verified share \\RCHS-TMPDC\netlogon
         Verified share \\RCHS-TMPDC\sysvol
         ......................... RCHS-TMPDC passed test NetLogons
 
      Starting test: ObjectsReplicated
 
         RCHS-TMPDC is in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         Checking for CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us in domain DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us on 18 servers
         Failed to read object metadata on RCHS-ADMIN, error
 
         The name does not identify an object; the name identifies a phantom.
 
            Object is up-to-date on all servers.
         Checking for CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us in domain CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us on 19 servers
            Object is up-to-date on all servers.
         ......................... RCHS-TMPDC passed test ObjectsReplicated
 
      Starting test: OutboundSecureChannels
 
         * The Outbound Secure Channels test
         ** Did not run Outbound Secure Channels test because /testdomain: was
 
         not entered
 
         ......................... RCHS-TMPDC passed test
 
         OutboundSecureChannels
 
      Starting test: Replications
 
         * Replications Check
         DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us has 30 cursors.
         CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us has 34 cursors.
         DC=wusd,DC=k12,DC=ca,DC=us has 28 cursors.
         DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us has 3 cursors.
         * Replication Latency Check
            DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  11 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 15 entries in the vector were ignored.
                  15 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
            DC=wusd,DC=k12,DC=ca,DC=us
               Latency information for 11 entries in the vector were ignored.
                  9 were retired Invocations.  2 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC).  
         ......................... RCHS-TMPDC passed test Replications
 
      Starting test: RidManager
 
         ridManagerReference = CN=RID Manager$,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * Available RID Pool for the Domain is 10104 to 1073741823
         fSMORoleOwner = CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
         * RCHS-TMPDC.rchs.wusd.k12.ca.us is the RID Master
         * DsBind with RID Master was successful
         rIDSetReferences = CN=RID Set,CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
         * rIDAllocationPool is 9604 to 10103
         * rIDPreviousAllocationPool is 9604 to 10103
         * rIDNextRID: 9742
         ......................... RCHS-TMPDC passed test RidManager
 
      Starting test: Services
 
         * Checking Service: EventSystem
         * Checking Service: RpcSs
         * Checking Service: NTDS
         * Checking Service: DnsCache
         * Checking Service: NtFrs
         * Checking Service: IsmServ
         * Checking Service: kdc
         * Checking Service: SamSs
         * Checking Service: LanmanServer
         * Checking Service: LanmanWorkstation
         * Checking Service: w32time
         * Checking Service: NETLOGON
         ......................... RCHS-TMPDC passed test Services
 
      Starting test: SystemLog
 
         * The System Event log test
         An Error Event occurred.  EventID: 0x00000457
 
            Time Generated: 01/27/2009   08:24:16
 
            Event String:
 
            Driver HP LaserJet P1500 Series PCL 5e required for printer HP LaserJet P1500 Series PCL 5e is unknown. Contact the administrator to install the driver before you log in again.
 
         An Error Event occurred.  EventID: 0x00000457
 
            Time Generated: 01/27/2009   08:34:21
 
            Event String:
 
            Driver HP LaserJet P1500 Series PCL 5e required for printer HP LaserJet P1500 Series PCL 5e is unknown. Contact the administrator to install the driver before you log in again.
 
         An Error Event occurred.  EventID: 0x00000457
 
            Time Generated: 01/27/2009   08:34:26
 
            Event String:
 
            Driver RICOH Aficio MP C4500 RPCS required for printer !!nmc-dc1!RICOH Aficio C4500 is unknown. Contact the administrator to install the driver before you log in again.
 
         ......................... RCHS-TMPDC failed test SystemLog
 
      Starting test: Topology
 
         * Configuration Topology Integrity Check
         * Analyzing the connection topology for DC=DomainDnsZones,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=ForestDnsZones,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Schema,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         * Analyzing the connection topology for DC=wusd,DC=k12,DC=ca,DC=us.
         * Performing upstream (of target) analysis.
         * Performing downstream (of target) analysis.
         ......................... RCHS-TMPDC passed test Topology
 
      Starting test: VerifyEnterpriseReferences
 
         ......................... RCHS-TMPDC passed test
 
         VerifyEnterpriseReferences
 
      Starting test: VerifyReferences
 
         The system object reference (serverReference)
 
         CN=RCHS-TMPDC,OU=Domain Controllers,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         The system object reference (serverReferenceBL)
 
         CN=RCHS-TMPDC,CN=Domain System Volume (SYSVOL share),CN=File Replication Service,CN=System,DC=rchs,DC=wusd,DC=k12,DC=ca,DC=us
 
         and backlink on
 
         CN=NTDS Settings,CN=RCHS-TMPDC,CN=Servers,CN=NewHighSchool,CN=Sites,CN=Configuration,DC=wusd,DC=k12,DC=ca,DC=us
 
         are correct. 
         ......................... RCHS-TMPDC passed test VerifyReferences
 
      Starting test: VerifyReplicas
 
         ......................... RCHS-TMPDC passed test VerifyReplicas
 
   
      Starting test: DNS
 
         
 
         DNS Tests are running and not hung. Please wait a few minutes...
 
            
               Starting test: DNS
 
                     
                        Starting test: DNS
 
                              
                                 Starting test: DNS
 
                                       
                                          Starting test: DNS
 
                                                
                                                   Starting test: DNS
 
                                                         
                                                            Starting test: DNS
 
                                                                  
                                                                     Starting
 
                                                                     test: DNS
 
                                                                           
                                                                              St
 
                                                                              ar
 
                                                                              ti
 
                                                                              ng
 
                                                                              
 
                                                                              te
 
                                                                              st
 
                                                                              :
 
                                                                              DNS
 
                                                                              
 
                                                                                    
                                                                                       Starting test: DNS
 
                                                                                             
                                                                                                Starting test: DNS
 
                                                                                                      
                                                                                                         Starting test: DNS
 
                                                                                                               
                                                                                                                  Starting test: DNS
 
                                                                                                                        
                                                                                                                           Starting test: DNS
 
                                                                                                                                 
                                                                                                                                    Starting test: DNS
 
                                                                                                                                          
                                                                                                                                             Starting test: DNS
 
                                                                                                                                                   
                                                                                                                                                      Starting test: DNS
 
                                                                                                                                                            
                                                                                                                                                               Starting test: DNS
 
                                                                                                                                                                     
                                                                                                                                                                        Starting test: DNS
 
                                                                                                                                                                           See DNS test in enterprise tests section for results
                                                                                                                                                                           ......................... EV-ADMIN failed test DNS
 
                                                                                                                                                                  See DNS test in enterprise tests section for results
                                                                                                                                                                  ......................... BT-ADMIN failed test DNS
 
                                                                                                                                                         See DNS test in enterprise tests section for results
                                                                                                                                                         ......................... WUSD-DC01 failed test DNS
 
                                                                                                                                                See DNS test in enterprise tests section for results
                                                                                                                                                ......................... SP-ADMIN failed test DNS
 
                                                                                                                                       See DNS test in enterprise tests section for results
                                                                                                                                       ......................... WF-ADMIN failed test DNS
 
                                                                                                                              See DNS test in enterprise tests section for results
                                                                                                                              ......................... AN-ADMIN failed test DNS
 
                                                                                                                     See DNS test in enterprise tests section for results
                                                                                                                     ......................... SG-CAMPUS failed test DNS
 
                                                                                                            See DNS test in enterprise tests section for results
                                                                                                            ......................... WUSD-TMPDC failed test DNS
 
                                                                                                   See DNS test in enterprise tests section for results
                                                                                                   ......................... WUSD-DC02 failed test DNS
 
                                                                                          See DNS test in enterprise tests section for results
                                                                                          ......................... RCHS-ADMIN failed test DNS
 
                                                                                 See DNS test in enterprise tests section for results
                                                                                 ......................... RB-CAMPUS failed test DNS
 
                                                                        See DNS test in enterprise tests section for results
                                                                        ........
 
                                                                        ........
 
                                                                        ........
 
                                                                        .
 
                                                                        WUSD-DC1
 
                                                                        failed
 
                                                                        test
 
                                                                        DNS
 
                                                               See DNS test in enterprise tests section for results
                                                               .................
 
                                                               ........
 
                                                               WUSD-DC2 failed
 
                                                               test DNS
 
                                                      See DNS test in enterprise tests section for results
                                                      .........................
 
                                                      ELK-ADMIN failed test DNS
 
                                             See DNS test in enterprise tests section for results
                                             .........................
 
                                             WM-CAMPUS failed test DNS
 
                                    See DNS test in enterprise tests section for results
                                    ......................... BI-ADMIN failed
 
                                    test DNS
 
 ERROR: NO DNS servers for IPV6 stack was found 
 ERROR: NO DNS servers for IPV6 stack was found 
                           See DNS test in enterprise tests section for results
                           ......................... RCHS-TMPDC passed test DNS
 
                  See DNS test in enterprise tests section for results
                  ......................... RCHS-CAMPUS passed test DNS
 
 ERROR: NO DNS servers for IPV6 stack was found 
         See DNS test in enterprise tests section for results
         ......................... RCHS-DC02 passed test DNS
 
   
   Running partition tests on : DomainDnsZones
 
      Starting test: CheckSDRefDom
 
         ......................... DomainDnsZones passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... DomainDnsZones passed test
 
         CrossRefValidation
 
   
   Running partition tests on : ForestDnsZones
 
      Starting test: CheckSDRefDom
 
         ......................... ForestDnsZones passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... ForestDnsZones passed test
 
         CrossRefValidation
 
   
   Running partition tests on : Schema
 
      Starting test: CheckSDRefDom
 
         ......................... Schema passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... Schema passed test CrossRefValidation
 
   
   Running partition tests on : Configuration
 
      Starting test: CheckSDRefDom
 
         ......................... Configuration passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... Configuration passed test CrossRefValidation
 
   
   Running partition tests on : wusd
 
      Starting test: CheckSDRefDom
 
         ......................... wusd passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... wusd passed test CrossRefValidation
 
   
   Running partition tests on : DomainDnsZones
 
      Starting test: CheckSDRefDom
 
         ......................... DomainDnsZones passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... DomainDnsZones passed test
 
         CrossRefValidation
 
   
   Running partition tests on : rchs
 
      Starting test: CheckSDRefDom
 
         ......................... rchs passed test CheckSDRefDom
 
      Starting test: CrossRefValidation
 
         ......................... rchs passed test CrossRefValidation
 
   
   Running enterprise tests on : wusd.k12.ca.us
 
      Starting test: DNS
 
         Test results for domain controllers:
 
            
            DC: WUSD-DC2.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: RB-Campus.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: SG-CAMPUS.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: RCHS-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: wusd-dc02.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: wusd-tmpdc.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: wusd-dc1.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: wusd-dc01.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: wm-campus.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: SP-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: WF-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: EV-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: ELK-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: BT-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: bi-admin.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: AN-ADMIN.wusd.k12.ca.us
 
            Domain: wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Error: No WMI connectivity
                  [Error details: 0x80070005 (Type: HRESULT - Facility: Win32, Description: Access is denied.) - Connection to WMI server failed]
                  No host records (A or AAAA) were found for this DC
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: RCHS-TMPDC.rchs.wusd.k12.ca.us
 
            Domain: rchs.wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Microsoftr Windows Serverr 2008 Standard  (Service Pack level: 1.0)
 
                   is supported
 
                  NETLOGON service is running
 
                  kdc service is running
 
                  DNSCACHE service is running
 
                  DNS service is running
 
                  DC is a DNS server
 
                  Network adapters information:
 
                  Adapter [00000006] Intel(R) PRO/1000 MT Network Connection:
 
                     MAC address is 00:50:56:AA:06:A3
                     IP Address is static 
                     IP address: 10.1.226.3
                     DNS servers:
 
                        10.1.226.3 (RCHS-TMPDC) [Valid]
                        10.1.3.22 (<name unavailable>) [Valid]
                  The A host record(s) for this DC was found
                  Warning: The AAAA record for this DC was not found
                  [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
                  The SOA record for the Active Directory zone was found
                  The Active Directory zone on this DC/DNS server was found primary
                  Root zone on this DC/DNS server was not found
                  
               TEST: Forwarders/Root hints (Forw)
                  Recursion is enabled
                  Forwarders Information: 
                     10.1.3.19 (<name unavailable>) [Valid] 
                     10.1.3.22 (<name unavailable>) [Valid] 
                  
               TEST: Delegations (Del)
                  No delegations were found in this zone on this DNS server
                  
               TEST: Dynamic update (Dyn)
                  Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
                  Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
                  
               TEST: Records registration (RReg)
                  Network Adapter
 
                  [00000006] Intel(R) PRO/1000 MT Network Connection:
 
                     Matching CNAME record found at DNS server 10.1.226.3:
                     b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.226.3:
                     RCHS-TMPDC.rchs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.226.3: 
                     RCHS-TMPDC.rchs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kerberos._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kerberos._udp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kpasswd._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.gc._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.226.3:
                     gc._msdcs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.226.3: 
                     gc._msdcs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.226.3:
                     _ldap._tcp.pdc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching CNAME record found at DNS server 10.1.3.22:
                     b1b9edc1-55cc-403f-8477-57f46100bcb5._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.22:
                     RCHS-TMPDC.rchs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.22: 
                     RCHS-TMPDC.rchs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kerberos._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kerberos._udp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kpasswd._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.gc._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.22:
                     gc._msdcs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.22: 
                     gc._msdcs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.22:
                     _ldap._tcp.pdc._msdcs.rchs.wusd.k12.ca.us
 
               Warning: Record Registrations not found in some network adapters
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: RCHS-DC02.rchs.wusd.k12.ca.us
 
            Domain: rchs.wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Microsoft(R) Windows(R) Server 2003, Standard Edition (Service Pack level: 2.0)
 
                   is supported
 
                  NETLOGON service is running
 
                  kdc service is running
 
                  DNSCACHE service is running
 
                  DNS service is running
 
                  DC is a DNS server
 
                  Network adapters information:
 
                  Adapter [00000007] Intel(R) PRO/100 VE Network Connection:
 
                     MAC address is 00:02:E3:48:3A:43
                     IP Address is static 
                     IP address: 10.1.3.70
                     DNS servers:
 
                        10.1.3.70 (RCHS-DC02) [Valid]
                  The A host record(s) for this DC was found
                  Warning: The AAAA record for this DC was not found
                  [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
                  The SOA record for the Active Directory zone was found
                  The Active Directory zone on this DC/DNS server was found primary
                  Root zone on this DC/DNS server was not found
                  
               TEST: Forwarders/Root hints (Forw)
                  Recursion is enabled
                  Forwarders Information: 
                     10.1.3.19 (<name unavailable>) [Valid] 
                     10.1.3.22 (<name unavailable>) [Valid] 
                  
               TEST: Delegations (Del)
                  No delegations were found in this zone on this DNS server
                  
               TEST: Dynamic update (Dyn)
                  Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
                  Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
                  
               TEST: Records registration (RReg)
                  Network Adapter
 
                  [00000007] Intel(R) PRO/100 VE Network Connection:
 
                     Matching CNAME record found at DNS server 10.1.3.70:
                     02329cde-05de-4208-9935-0ec4743e6fba._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.70:
                     RCHS-DC02.rchs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.70: 
                     RCHS-DC02.rchs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kerberos._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kerberos._udp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kpasswd._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.DistrictOffice._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kerberos._tcp.DistrictOffice._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.DistrictOffice._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _kerberos._tcp.DistrictOffice._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.gc._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.70:
                     gc._msdcs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.70: 
                     gc._msdcs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _gc._tcp.DistrictOffice._sites.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.70:
                     _ldap._tcp.DistrictOffice._sites.gc._msdcs.wusd.k12.ca.us
 
               Warning: Record Registrations not found in some network adapters
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 20 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
            
            DC: rchs-campus.rchs.wusd.k12.ca.us
 
            Domain: rchs.wusd.k12.ca.us
 
            
 
                  
               TEST: Authentication (Auth)
                  Authentication test: Successfully completed
                  
               TEST: Basic (Basc)
                  Microsoft(R) Windows(R) Server 2003, Enterprise Edition (Service Pack level: 2.0)
 
                   is supported
 
                  NETLOGON service is running
 
                  kdc service is running
 
                  DNSCACHE service is running
 
                  DNS service is running
 
                  DC is a DNS server
 
                  Network adapters information:
 
                  Adapter
 
                  [00000007] HP NC373i Multifunction Gigabit Server Adapter:
 
                     MAC address is 00:19:BB:35:79:B4
                     IP Address is static 
                     IP address: 10.1.226.1
                     DNS servers:
 
                        10.1.3.10 (<name unavailable>) [Valid]
                        10.1.3.20 (<name unavailable>) [Valid]
                  The A host record(s) for this DC was found
                  Warning: The AAAA record for this DC was not found
                  [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.) - rchs.wusd.k12.ca.us]
                  The SOA record for the Active Directory zone was found
                  The Active Directory zone on this DC/DNS server was found primary
                  Root zone on this DC/DNS server was not found
                  
               TEST: Forwarders/Root hints (Forw)
                  Recursion is enabled
                  Forwarders Information: 
                     10.1.226.3 (RCHS-TMPDC) [Valid] 
                     10.1.3.22 (<name unavailable>) [Valid] 
                  
               TEST: Delegations (Del)
                  No delegations were found in this zone on this DNS server
                  
               TEST: Dynamic update (Dyn)
                  Test record _dcdiag_test_record added successfully in zone rchs.wusd.k12.ca.us
                  Test record _dcdiag_test_record deleted successfully in zone rchs.wusd.k12.ca.us
                  
               TEST: Records registration (RReg)
                  Network Adapter
 
                  [00000007] HP NC373i Multifunction Gigabit Server Adapter:
 
                     Matching CNAME record found at DNS server 10.1.3.10:
                     1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.10:
                     rchs-campus.rchs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.10: 
                     rchs-campus.rchs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kerberos._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kerberos._udp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kpasswd._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.gc._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.10:
                     gc._msdcs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.10: 
                     gc._msdcs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.10:
                     _ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
 
                     Matching CNAME record found at DNS server 10.1.3.20:
                     1ade07c1-fd1d-4af7-827d-325a59a6e1e6._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.20:
                     rchs-campus.rchs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.20: 
                     rchs-campus.rchs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.9df6f1bf-a197-449c-af79-152fffa923d7.domains._msdcs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kerberos._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kerberos._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kerberos._udp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kpasswd._tcp.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kerberos._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.NewHighSchool._sites.dc._msdcs.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _kerberos._tcp.NewHighSchool._sites.rchs.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.gc._msdcs.wusd.k12.ca.us
 
                     Matching A record found at DNS server 10.1.3.20:
                     gc._msdcs.wusd.k12.ca.us
 
                     Warning: 
                     Missing AAAA record at DNS server 10.1.3.20: 
                     gc._msdcs.wusd.k12.ca.us
                     [Error details: 9501 (Type: Win32 - Description: No records found for given DNS query.)]
                     
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _gc._tcp.NewHighSchool._sites.wusd.k12.ca.us
 
                     Matching  SRV record found at DNS server 10.1.3.20:
                     _ldap._tcp.NewHighSchool._sites.gc._msdcs.wusd.k12.ca.us
 
               Warning: Record Registrations not found in some network adapters
 
               Total query time:0 min. 0 sec.. Total RPC connection
 
               time:0 min. 0 sec.
 
               Total WMI connection time:0 min. 0 sec. Total Netuse connection
 
               time:0 min. 0 sec.
 
         
         Summary of test results for DNS servers used by the above domain
 
         controllers:
 
         
 
            DNS server: 10.1.226.3 (RCHS-TMPDC)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
            DNS server: 10.1.3.10 (<name unavailable>)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
            DNS server: 10.1.3.19 (<name unavailable>)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
            DNS server: 10.1.3.20 (<name unavailable>)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
            DNS server: 10.1.3.22 (<name unavailable>)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
            DNS server: 10.1.3.70 (RCHS-DC02)
 
               All tests passed on this DNS server
 
               Name resolution is functional._ldap._tcp SRV record for the forest root domain is registered 
               Total query time:0 min. 0 sec., Total WMI connection
 
               time:0 min. 0 sec.
 
               
         Summary of DNS test results:
 
         
                                            Auth Basc Forw Del  Dyn  RReg Ext
            _________________________________________________________________
            Domain: wusd.k12.ca.us
 
               WUSD-DC2                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               RB-Campus                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               SG-CAMPUS                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               RCHS-ADMIN                   PASS FAIL n/a  n/a  n/a  n/a  n/a  
               wusd-dc02                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               wusd-tmpdc                   PASS FAIL n/a  n/a  n/a  n/a  n/a  
               wusd-dc1                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               wusd-dc01                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               wm-campus                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               SP-ADMIN                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               WF-ADMIN                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               EV-ADMIN                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               ELK-ADMIN                    PASS FAIL n/a  n/a  n/a  n/a  n/a  
               BT-ADMIN                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               bi-admin                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
               AN-ADMIN                     PASS FAIL n/a  n/a  n/a  n/a  n/a  
            Domain: rchs.wusd.k12.ca.us
 
               RCHS-TMPDC                   PASS WARN PASS PASS PASS WARN n/a  
               RCHS-DC02                    PASS WARN PASS PASS PASS WARN n/a  
               rchs-campus                  PASS WARN PASS PASS PASS WARN n/a  
         
         Total Time taken to test all the DCs:0 min. 28 sec.
 
         ......................... wusd.k12.ca.us failed test DNS
 
      Starting test: LocatorCheck
 
         GC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
 
         Locator Flags: 0xe00011fd
         PDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         Preferred Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         KDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         ......................... wusd.k12.ca.us passed test LocatorCheck
 
      Starting test: FsmoCheck
 
         GC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
 
         Locator Flags: 0xe00011fd
         PDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         Preferred Time Server Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         KDC Name: \\RCHS-TMPDC.rchs.wusd.k12.ca.us
         Locator Flags: 0xe00011fd
         ......................... wusd.k12.ca.us passed test FsmoCheck
 
      Starting test: Intersite
 
         Doing intersite inbound replication test on site Westfield: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site Westfield is: WF-ADMIN. 
               ***Error: On server WF-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site Evergreen: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site Evergreen is: EV-ADMIN. 
               ***Error: On server EV-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site BridgewayIsland: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site BridgewayIsland is: BI-ADMIN. 
               ***Error: On server BI-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site Elkhorn: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site Elkhorn is: ELK-ADMIN. 
               ***Error: On server ELK-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site Bryte: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site Bryte is: BT-ADMIN. 
               ***Error: On server BT-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site AlyceNorman: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site AlyceNorman is: AN-ADMIN. 
               ***Error: On server AN-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site SouthPort: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site SouthPort is: SP-ADMIN. 
               ***Error: On server SP-ADMIN, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site Westmore: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site Westmore is: WM-CAMPUS. 
               ***Error: On server WM-CAMPUS, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site StoneGate: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site StoneGate is: SG-CAMPUS. 
               ***Error: On server SG-CAMPUS, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site DistrictOffice: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site DistrictOffice is: WUSD-DC1. 
               ***Error: On server WUSD-DC1, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Doing intersite inbound replication test on site RiverBank: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site RiverBank is: RB-CAMPUS. 
               ***Error: On server RB-CAMPUS, DsReplicaGetInfo() failed, error:
 
               0x2105 "Replication access was denied." 
 
               Inbound intersite replication test cannot proceed. 
         Skipping site RiverCity, this site is outside the scope provided by
 
         the command line arguments provided. 
         Doing intersite inbound replication test on site NewHighSchool: 
            Locating & Contacting Intersite Topology Generator (ISTG) ... 
               The ISTG for site NewHighSchool is: RCHS-CAMPUS. 
               ISTG (RCHS-CAMPUS) Failure Parameters:
 
                   Failover Tries: 1
 
                   Failover Time: 120 
            Checking for down bridgeheads ... 
               Bridghead DistrictOffice\RCHS-DC02 is up and replicating fine. 
               Bridghead NewHighSchool\RCHS-CAMPUS is up and replicating fine. 
               Bridghead StoneGate\SG-CAMPUS is up and replicating fine. 
               Bridghead NewHighSchool\WUSD-TMPDC is up and replicating fine. 
               Bridghead DistrictOffice\WUSD-DC1 is up and replicating fine. 
               Bridghead NewHighSchool\RCHS-TMPDC is up and replicating fine. 
            Doing in depth site analysis ... 
               All expected sites and bridgeheads are replicating into site
 
               NewHighSchool. 
         ......................... wusd.k12.ca.us failed test Intersite

Open in new window

Avatar of SysExpert
SysExpert
Flag of Israel image

see

 The clock difference between the home server RCHS-TMPDC and target
 
         server WUSD-DC2 is greater than one minute. This may cause Kerberos
 
         authentication failures. Please check that the time service is working
 
         properly. You may need to resynchonize the time between these servers.
 
   
I hope this helps !
also

 Starting test: CheckSecurityError
 
         * Dr Auth:  Beginning security errors check!
         Found KDC WUSD-DC1 for domain wusd.k12.ca.us in site DistrictOffice
         Checking machine account for DC WUSD-DC1 on DC WUSD-DC1.
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us
         * SPN found :LDAP/WUSD-DC1
         * SPN found :LDAP/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :LDAP/726e2d0a-8354-4b0e-a51c-3d22421421f1._msdcs.wusd.k12.ca.us
         * SPN found :E3514235-4B06-11D1-AB04-00C04FC2DCD2/726e2d0a-8354-4b0e-a51c-3d22421421f1/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us
         * SPN found :HOST/WUSD-DC1
         * SPN found :HOST/wusd-dc1.wusd.k12.ca.us/WUSD
         * SPN found :GC/wusd-dc1.wusd.k12.ca.us/wusd.k12.ca.us
            [WUSD-DC1] DsReplicaGetInfo(KCC_DS_CONNECT_FAILURES) failed with
 
            error 8453,
 
            Replication access was denied..
            [WUSD-DC1] Unable to query the list of KCC connection failures.
 
            Continuing...
ASKER CERTIFIED SOLUTION
Avatar of SysExpert
SysExpert
Flag of Israel image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial