Solved

chkdsk /f gives multiple invalid security id messages

Posted on 2006-07-06
9
513 Views
Last Modified: 2008-01-09
After creating a master image PC - we then sysprep and clone the PC using Imagecast.  On deploying the image to new hardware the chkdsk /f gives an invalid security identifier message for every file on the volume.  A message then appears that this is not an Authentic version of windows XP.  Any ideas?
0
Comment
Question by:fac044
  • 3
  • 2
  • 2
9 Comments
 
LVL 32

Expert Comment

by:and235100
ID: 17049027
Try this:

http://support.microsoft.com/?kbid=328874

manually update a single installation, and see if this helps (manually updating the key) - then you may find you have a bad image...
0
 

Author Comment

by:fac044
ID: 17049122
Hi,  We have an image from a week ago that works fine with the same valid VL number.  The problem has only started occurring since we have added a few minor applications.  The master image will chkdsk /f with no problem but when I sysprep and download to a new PC the chkdsk /f produces screens of these "invalid security id" errors.
0
 
LVL 32

Expert Comment

by:and235100
ID: 17049239
What are the applications?
0
Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

 

Author Comment

by:fac044
ID: 17049306
Applications were Dreamweaver MX 2004,Sigmaplot, Eclipse and Maple 8.
0
 
LVL 14

Expert Comment

by:FriarTuk
ID: 17060986
The CHKDSK command incorrectly identifies certain security descriptors as not valid in Windows 2000
http://support.microsoft.com/default.aspx?scid=kb;en-us;873437
0
 
LVL 14

Accepted Solution

by:
FriarTuk earned 500 total points
ID: 17061009
The CHKDSK utility incorrectly identifies and deletes in-use security descriptors
http://support.microsoft.com/default.aspx?scid=kb;en-us;831374
0
 

Author Comment

by:fac044
ID: 17232321
We never did come up with a fix for this.  I eventually had to go back to an archived image and bring it up to date.  So far we have had no problems with this image.  Thanks for all comments.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Can I legally transfer my OEM version of Windows to another PC?  (AKA - Can I put a new systemboard in my OEM PC?) Few of us are both IT and legal experts but we all have our own views of Microsoft's licensing rules and how they apply.  There are…
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
This video discusses moving either the default database or any database to a new volume.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now