Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

App log Event 1000 Source Userenv

Posted on 2006-11-12
1
170 Views
Last Modified: 2010-04-13
Every five minutes two errors are being posted to the application log.

First:

Windows cannot access the file gpt.ini for GPO  The file must be present at the location <>. (). Group Policy processing aborted.

Then:

Windows cannot query for the list of Group Policy objects . A message that describes the reason for this was previously logged by this policy engine

This is occuring on a Server 2000 machine.
0
Comment
Question by:classnet
1 Comment
 
LVL 86

Accepted Solution

by:
jkr earned 500 total points
ID: 17925791
http://www.eventid.net/display.asp?eventid=1000&eventno=6866&source=Userenv&phase=1 and the comments that address this problem and how to resolve this issue.

0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Server 2008 Server 2003 Server 2000 12 644
Norton Ghost for Windows NT 5 1,488
how do i restart in safe mode windows Server 2000? 5 610
Can’t delete a file 14 178
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Learn how to PXE Boot both BIOS & UEFI machines with DHCP Policies and Custom Vendor Classes
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question