Solved

Group Policy not being applied.

Posted on 2014-12-05
2
125 Views
Last Modified: 2015-01-16
Hello Experts,

I just deployed some registry files using a .bat file and a GPO. This worked well for all remote sites except one, and at this same site on the users pc's i'm seeing the below message in the event viewer. Please Help!!

Event Type:      Error
Event Source:      Userenv
Event Category:      None
Event ID:      1058
Date:            12/1/2014
Time:            2:38:11 PM
User:            IFS\User.Name
Computer:      PC3J7DPD1
Description:
Windows cannot access the file gpt.ini for GPO cn={DD2E3F6C-214D-42FB-89A7-A0354DB602F9},cn=policies,cn=system,DC=cnb,DC=domainname,DC=com. The file must be present at the location <\\ifs.domain.com\SysVol\ifs.domain.com\Policies\{DD2E3F6C-214D-42FB-89A7-A0354DB602F9}\gpt.ini>. (The system cannot find the path specified. ). Group Policy processing aborted.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0
Comment
Question by:CNBELGIN
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 81

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40483928
check your replication to that site
0
 
LVL 24

Expert Comment

by:VB ITS
ID: 40484182
Sounds AD in this remote site is having issues replicating. Check the log on the DC in this site and let us know of any errors/warnings.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question