Solved

How do I solve a logon failure problem when running syspreped altiris jobs?

Posted on 2009-05-05
3
1,110 Views
Last Modified: 2012-05-06
We are running Altiris Deployment Server 6.8 and when trying to distribute a syspreped image, the job always fails giving the following error: Logon failure: unknown user name or bad password.  The username and password we are authenticating are valid domain accounts and have administrative privileges.  The computer from which the image was taken was part of the domain, and the computer that is receiving the disk image is also part of the domain.  Any Idea as to what else could be causing the problem?
0
Comment
Question by:RaymondEC
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Expert Comment

by:djpazza
ID: 24305939
One thing I would check

start - run - secpol.msc click Security options then under Network Access make sure the sharing and security model is set to classic.
0
 

Author Comment

by:RaymondEC
ID: 24306254
I tried that with no results.  I don't think it would have any effect since we are not using a local log on.  The account and password we are using to authenticate are domain accounts, not local ones.  
0
 

Accepted Solution

by:
RaymondEC earned 0 total points
ID: 24317409
I figured out the problem.  We recently updated our security policy and all of our passwords.  The script in the deployment job that mapped the drive was running with an old logon.  After updating the password, the job ran correctly.  
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question