Event ID 6006, WinLogon

Posted on 2013-08-28
Medium Priority
Last Modified: 2013-09-15
Hi Experts,

I restarted and it spent an hour at "applying computer settings". When I checked the event log I found the below.

Source: WinLogon
Event ID: 6006
The winlogon notification subscriber <GPClient> took 3598 second(s) to handle the notification event (CreateSession).

It is also accompanied by event id 6005 you would suspect.

I did find and follow http://support.microsoft.com/kb/2004121 but it was not relevant.

We are Running SBS2008 with AD, WSUS, Print, File, Mail, Security, DHCP & DNS.

Any Feedback is appreciated.
Question by:isdd2000
  • 2
LVL 13

Expert Comment

ID: 39445671
Check any corrupt profile there in the server.

Also check the below link

LVL 22

Expert Comment

ID: 39448087

Accepted Solution

isdd2000 earned 0 total points
ID: 39482079
Hi Guys,

This was a one off occurrence.

Author Closing Comment

ID: 39493886
This issue was a once off.

Featured Post

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

SingleRun is a tool that ensures that only one instance of an application is started, running it again brings the application to focus.
You have missed a phone call. The number looks like it belongs to the bunch of numbers which your company uses. How to find out who has just called you?
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question