Solved

Logon script generating "no more endpoints from the endpoint mapper" error

Posted on 2006-10-30
8
710 Views
Last Modified: 2013-11-14
I recently created and ran a logon script for my office network, which would stealth install a couple programs and map network drives to universal letters for the entire office. I used active directory from our server running Windows Server 2003 to export the logon script to the users, running Windows XP. It went off without a hitch for most users, but in two instances the users got the error "There are no more endpoints available from the endpoint mapper" when they log on. I've found a lot of links to troubleshooting sites and posts instructing people to use DC Diag on EE, but I haven't found anything to explain what the actual problem is. If anyone can tell me what is happening here, and how to fix it, it's worth 500 points.
0
Comment
Question by:SysAdmin06
  • 3
  • 3
  • 2
8 Comments
 
LVL 14

Expert Comment

by:FriarTuk
Comment Utility
0
 

Author Comment

by:SysAdmin06
Comment Utility
I've seen that particular link on EE before, but it's not really helping. I would really like to know why I'm getting the error so it won't happen again. Appreciate the tip though.
0
 
LVL 14

Expert Comment

by:FriarTuk
Comment Utility
not having any real knowledge of this type of issue, that was the most useful KB article I could find.  what is the exact error msg? what is shown in the event viewer?
0
 
LVL 1

Expert Comment

by:DrJames99
Comment Utility
Hi,

I'm having this issue myself... almost identical.  Login scripts which are implemented through Domain GPO's.    The dcdiag all return passed results, and it appears that everything within DNS is correctly configured.

The problem is that some Domain Users are having extremely long login times.  I have also tried removing the users from the domain, and re-adding them... and now I run into the "no more enpoints available from endpoint mapper" failure message.

You might want to download and check out GPMC (http://download.microsoft.com/download/a/d/b/adb5177d-01a7-4f04-bfcc-cb7cea8b5bb7/gpmc.msi ), which will allow you to easily locate and manage any additional or rogue GPO's which might exist within your domain.  These might be causing a conflict within your network as well.

Good luck.

DjEc
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:SysAdmin06
Comment Utility
Thanks for the post DrJames99. That link looks promising. I'm currently swamped right now, and the login script is far from essential, so it's taken a back seat to my other little frustrations at the moment, but I'll try to dl and play with GPMC sometime this week and let you know how it goes.
0
 
LVL 1

Accepted Solution

by:
DrJames99 earned 500 total points
Comment Utility
Actually, I have resolved the problem.  In the end, it seems Win2K3 has different RPC protocols which are being used as Win2K.    Therefore, the requests were being filtered.  (you can determine this as well using the  portqry tool.)  In our case it was 1025 which was being dropped on the firewall between the DC's and the client.

Hopefully this helps you out in your quest to find an available endpoint ;-)

Cheers,
DjEc
0
 
LVL 1

Expert Comment

by:DrJames99
Comment Utility
Additionally... if you are using Win2K3 with an updated SP1.  There are more issues that you can find here:

http://www.howtonetworking.com/Troubleshooting/2003sp1a.htm

hth
0
 

Author Comment

by:SysAdmin06
Comment Utility
Thanks for the response and the excellent info!!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Among others, I monitor the Windows Installer zone and Installer zone. I find that many of the questions could be answered much more quickly if a Windows Installer verbose log were submitted with the question.   However, I do not always have t…
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now