Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

event id 4098 - printer name invalid error deploying printers

Posted on 2011-03-14
1
Medium Priority
?
1,691 Views
Last Modified: 2012-05-11
Hello gang and thanks as always for your time and expertise.
Here's my deal:  I have one laptop out of 24 that will not apply my group policy printers or mapped drives.  I created an image for these laptops and the same image was applied to the other laptops.  The other laptops applied the policies fine.  I formatted this problem laptop and imaged it again but no change.  I reset the computer account and rejoined the domain but no change.  
The only thing the event viewer says is the printers are not applied because the printer name is invalid which is not true.  And again, the same policy has applied successfully to 24 other laptops.  The event id for both the printer failure and mapping failure is event id 4098.  
The printers and network drives are being mapped through user config, preferences.  Anyway, kind of lost as to what the hell is going on.  Your recommendations and advice are greatly appreciated.
We have a mixed enviornment of 2008 and 2003 and the client os is xp sp3.
0
Comment
Question by:pendal1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
pendal1 earned 0 total points
ID: 35129649
Nevermind.  A bad ip address was causing this laptop to not resolve the server names where the resources were located.  Aggravating but thank God I checked that.  
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question