Active Directory
--
Questions
--
Followers
Top Experts
one of my customers have repeating issue with GPO.
They have 3 DC's, which work fine most of the time, except maybe of a fact, that 3rd DC is on ADSL line, so it gets unaccessible from time to time for few minutes. Also, this 3rd DC's line response is depenant of network traffic, so PING varies from 20 to 800ms.
Ok, the problem:
every few months they get a bunch of  1030 and 1058 Userenv errors on all 3 DC's:
Event Type: Â Â Â Â Â Error
Event Source: Â Â Â Â Â Userenv
Event Category: Â Â Â Â Â None
Event ID: Â Â Â Â Â 1058
Date: Â Â Â Â Â Â Â Â Â Â Â 21.3.2008
Time: Â Â Â Â Â Â Â Â Â Â Â 11:04:33
User: Â Â Â Â Â Â Â Â Â Â Â NT AUTHORITY\SYSTEM
Computer: Â Â Â Â Â DC1
Description:
Windows cannot access the file gpt.ini for GPO CN={31B2F340-016D-11D2-945
Event Type: Â Â Â Â Â Error
Event Source: Â Â Â Â Â Userenv
Event Category: Â Â Â Â Â None
Event ID: Â Â Â Â Â 1030
Date: Â Â Â Â Â Â Â Â Â Â Â 21.3.2008
Time: Â Â Â Â Â Â Â Â Â Â Â 11:04:33
User: Â Â Â Â Â Â Â Â Â Â Â NT AUTHORITY\SYSTEM
Computer: Â Â Â Â Â DC1
Description:
Windows cannot query for the list of Group Policy objects. Check the event log for possible messages previously logged by the policy engine that describes the reason for this.
These events repeat every 5 minutes, which is normal for this type of error.
Why?
Because whole GPO file structure under \SYSVOL\domain_name.local\
This vanishing process starts on one of DC's (random one), and then propagates to other 2 DC's when domain replication occures, so in 1 hour all 3 DC's \SYSVOL folders are empty, and GPO's are missing.
Since each client has its local copy of GPO, they continue to function, but whole Active Directory is loosing its functions slowly.
I checked:
- SMB signing is not a problem, all DC's and all Workstations can see \SYSVOL share
- permissions on SYSVOL share are correct, I mean, Domain users have only Read/Execute/List permissions, nothing more
- no Antivirus activity in the time when GPO's were deleted
- no system upgrades were meade
- noone messed with GPO, since this last time it happened at 10:05 hours on Sunday
- on all 3 DC's no other Event is recorded within +/- 2 hours of GPO dissapearance event, except this one:
Event Type: Â Â Â Â Â Information
Event Source: Â Â Â Â Â Windows File Protection
Event Category: Â Â Â Â Â None
Event ID: Â Â Â Â Â 64001
Date: Â Â Â Â Â Â Â Â Â Â Â 21.3.2008
Time: Â Â Â Â Â Â Â Â Â Â Â 10:04:52
User: Â Â Â Â Â Â Â Â Â Â Â N/A
Computer: Â Â Â Â Â DC1
Description:
File replacement was attempted on the protected system file ntfrsutl.exe. This file was restored to the original version to maintain system stability. The file version of the bad file is 5.2.3790.2725, the version of the system file is 5.2.3790.1830.
Ok, I restored GPO from backup, as I did meny times before, and after I restore GPO to 1 DC, replication takes care to replicate GPO files to other 2 DC's. But this is not the sollution.
Any idea what else to look for?
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Actually...I don't understand one thing here about my missing GPO files.
All files under C:\Windows\SYSVOL were in one moment MISSING on DC1, and PRESENT on DC2 and DC3. Why did files not replicate back to DC1, but they rather got deleted on DC2 and DC3?
I also checked Domains And Trusts, and there are no entries, so this should not be an issue.
Any other idea?
looking again at AD Sites and Services, I found this replication scheme. Maybe there is a catch:
DC1 (slow ADSL line)
- replicate FROM: DC2
- replicate to: Â Â Â DC2
DC2
- replicate FROM: DC3, DC1
- replicate TO: Â Â DC3, DC1
DC3 (should be main DC)
- replicate FROM: DC2
- replicate TO: Â Â DC2
Is such replication scheme correct? Might it be causing troubles?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
That replication scheme looks pretty normal to me. Â However, depending on the role of DC1 on the ADSL line, you might not have to replicate from it to DC2. Â Does anyone use DC1 to add accounts or manage the domain in any other way (group policies, etc.)? Is DC1 used as a primary DNS server by the workstations at that site? Â If neither of those things is true, you wouldn't need to replicate its information to the other 2 DCs, you'd only need to replicate to it from the others. Â
Which of these machines has/have the FSMO roles? Â If that machine is the one with the problem manifesting first, I would suggest that you move the FSMO roles to another machine. Â Also, if you can identify the machine where the problem starts, you would want to remove any "replicate to" settings on that machine. Â That way, it will replicate FROM the other DC(s) but not replicate its damaged information TO the others. That might temporarily stabilize things at least until you can figure out what's really going on.
Have you checked the FRS logs on all these machines for any errors or warnings?
One thing I would go with first would be to make sure that all of these servers are free of any viruses, spyware or malware. Â Then, I recommend making sure that they are all up-to-date with the latest service pack (SP2) and security updates. Â
I checked operations roles in AD and found, that DC3 is the FSMO, RID, PDC and Infrastructure master for domain. Does this go along with above replication schema?
Problems arived from DC1, which is not operations master.
Partial fix:
I just restored whole SYSVOL structure from backup to DC3 (which is schema and roles master).
It replicated without problems to DC2.
But it does not want to replicate to DC1!
I removed NTDS connection on DC1, and added DC3 as "replicate from" manually. But when I click "Replicate Now" I get this:
the following error occured during attempt to synchronize naming context domain_name.local from domain controller DC3 to domain controller DC1:
The naming context is in the process of being removed or is not replicated from the specified server.
What I would recommend would be to dcpromo DC1 to demote it to a member server first, remove it from the domain, clean it up, make sure it's current on service pack/security updates, and then re-join the domain and dcpromo it to reload AD on it. It's possible the first dcpromo won't go smoothly, though. Â If so, here's an article that might help:
http://support.microsoft.com/kb/332199/en-us
After the first dcpromo (demotion), make sure that the server has been successfully demoted and that the demotion has been replicated to both DC3 and DC2. Â Make sure you have edited the TCP/IP properties of DC1 so that it points to DC3 or DC2 for DNS, etc. Reboot DC1 and make sure it comes up and you can log on to it as a member server - of course this may be a little slow if you are working over a WAN link, but it should work. Check DC1 and make sure there aren't any left-over traces of the SYSVOL folder. Â Then, on DC1, unjoin the domain and manually DELETE the computer account from DC3, make sure that replicates to DC2.
Then, run as many antivirus/antispyware/malw
What do you think?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
One of issues I found was that all 3 DC's have had ADSL provider's DNS-es entere under TCP/IP properties for NIC card! I mean, beside of (correct) DC2 and DC3 as DNS servers, there were also 2 DNS servers of ADSL provider.
I cleared this immidiatelly and wondered, how this could work at all. I left only DC2 and DC3 as DNS servers, which have properly configured forwarders.
It's now end of shift there, and I'm gonna reboot DC1 remotelly.
As of now, all DC tests pass, but replication still does not work to DC1.
...maybe one thing more:
DC2 and DC3 replicate via RPC, while DC1, which is on ADSL line, replicates via IP protocol. Might there be some issue...we'll see.
Don't think the replication over the ADSL itself is the issue - but as you say, we'll see.
Those additional DNS servers...DC1, which is on ADSL line, had DC2 and DC3 and 2 additional DNS servers from ISP provider. And this ADSL line dropped from time to time, so DC1 was left with only DNS servers from ISP, which is very bad. Might this be the couse of the problems?
Remember, all GPO dissapearance always begun with DC1...
Â






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
We actually did not find the resolution for my problem, but Hypercat was the only one who tried to help, and suggestions were quite good. Thanx for help :)
Active Directory
--
Questions
--
Followers
Top Experts
Active Directory (AD) is a Microsoft brand for identity-related capabilities. In the on-premises world, Windows Server AD provides a set of identity capabilities and services, and is hugely popular (88% of Fortune 1000 and 95% of enterprises use AD). This topic includes all things Active Directory including DNS, Group Policy, DFS, troubleshooting, ADFS, and all other topics under the Microsoft AD and identity umbrella.