Deploying VSE 8.7 on WorkGroup Computer is failing?

Posted on 2011-05-10
Last Modified: 2013-12-09
I am trying to deploy VSE  8.7 on a computer that is not currently in the domain, how ever it keeps failing, error log says this:

Failed to authenticate with remote system, system error: Logon failure: unknown user name or bad password.

Any suggestions?
Question by:fstinc
    LVL 37

    Expert Comment

    You need an account on the machine that you can use to do the puch install. The local administrator account and password would do
    LVL 3

    Expert Comment

    You should also be able to create a framepkg.exe from ePO and install it manually on the remote machine.

    Author Comment

    Where do I enter the local admin credentials from the Work Group Computer on EPO?
    LVL 3

    Accepted Solution

    you can enter credentials in the agent deployment screen.
    LVL 16

    Assisted Solution

    You have to make sure that the local security policy is modified to be changed from Guest Access to Classic Access access as well

    Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

    Network access: Sharing and security model for local accounts
    (Required)  Local users authenticate as themselves. (This is the equivalent of turning off simple file sharing.)

    Author Closing Comment


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to improve team productivity

    Quip adds documents, spreadsheets, and tasklists to your Slack experience
    - Elevate ideas to Quip docs
    - Share Quip docs in Slack
    - Get notified of changes to your docs
    - Available on iOS/Android/Desktop/Web
    - Online/Offline

    Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
    This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now