Microsoft Legacy OS





The Microsoft Legacy Operating System topic includes legacy versions of Microsoft operating systems prior to Windows 2000: All versions of MS-DOS and other versions developed for specific manufacturers and Windows 3/3.1, Windows 95 and Windows 98, plus any other Windows-related versions, and Windows Mobile.

When you start your Windows 10 PC and got an "Operating system not found" error or just saw "Auto repair for startup" or a blinking cursor with black screen. A loop for Auto repair will start but fix nothing. You will be panic as there are no backup of your document. How can you fix the problem?

Expert Comment

by:harry for
well addressed !

Expert Comment

In addition, the first thing that you should do is chkdsk c: /r
and let that scan. Usually the damage is from windows shutting down incorrectly and corrupting the hard drive or files on the drive. The rest if that may not be necessary. If that fails, then proceed to the mbr repair.
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
When you upgrade from Windows 8 to 8.1 or to Windows 10 or if you are like me you are on the Insider Program you may find yourself with many 450MB recovery partitions.  With a traditional disk that may not be a problem but with relatively smaller SSD's every byte counts.

Expert Comment

by:Ralph Scharping
So in the end we still remain with two partitions.  Can we do the same thing again to end up with only one?
LVL 99

Author Comment

by:David Johnson, CD
My intent was to recover the (450mb of space x 7) from 3GB used to just 450MB.
If you don't want the recovery partition you can certainly remove it. But you will lose the functionality that it performs. If you have made a recovery disk or recovery USB drive then you don't need it.

The original disk had the normal EFI partitions, windows 8.1 and then windows server 2012R2 with the disk space fully partitioned. Each upgrade of the operating system carved out 450MB before the WS2012R2 partition

I think you could use the recovery partition the one at the far left by simply using the recovery agent command line tool.

reagentc /setreimage  /path \\?\GLOBALROOT\device\harddisk2\partition1\Recovery\WindowsRE
Directory set to: \\?\GLOBALROOT\device\harddisk2\partition1\Recovery\WindowsRE
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and fix some common problems.
LVL 68

Expert Comment

Sure. But I suppose that for each platform there will be a way and to copy and re-use a disk file using explorer is not the supported way in the first place.
LVL 100

Author Comment

by:Lee W, MVP
I can see an argument could be made to provide advice on proper ways of copying VHDs... but my point to the article was handling collisions and correcting them when they occur... With virtual disks being the easiest way to demonstrate the issue (and often to have it).  Feel free to post in links of "proper" ways to copy virtual disks (I've never seen one from MS, but I haven't looked either).
Since the demise of Windows XP each version of the operating system (client and server) have their own unique way of using user profile information. This information applies to all windows operating systems not just the operating systems outlined in the sourced articles
LVL 99

Author Comment

by:David Johnson, CD
WHat's the impact in sharing or overwriting the user Roaming profile home directory ? it is already a share.. so I don't understand the question

Expert Comment

by:Rusty Koenig
Could you create a custom system variable then target the policy to a certain PC?  Instead of keeping OS version profiles you could basically keep "local profile" versions for specific computers instead of specific OS versions?

Soon as I read your post FIRST thing that popped into my mind was using the same method for custom PC variables to separate "roaming LOCAL profiles" that are still stored on central server location but still be "local".

Like if you logged into Server2016 on server PC and Win10 on your desktop it would spit out the same version # for both but you wouldn't want the same profile you use for your PC on your server login.  I always got around this by adding another user with myname-server to use for server login so it wouldn't mix the profiles.  

I know a lot recommend core server but I want Desktop (I used Commodore64, most all the DOS versions, Apple II.... Faster to icon shit and use desktop for ordinary everyday functions  and just use command prompt/shell for specialized tasks or command functions).

AND I know you shouldn't use "Admin" roles to login for everything but It is home domain and I don't want/need several login names to use :)
Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home edition.

Author Comment

by:Joost Kuin
Take back control of your Windows Updates!
LVL 40

Expert Comment

This comment is in no way meant to shine a negative light on this article nor the author and is just a general message of caution and advice that careful computer user should consider before making changes that may modify their machine or running a binary from an unknown source.

CAUTION: Anyone who wishes to try this please be aware that it is your responsibility to make sure you back up your machine first and that the risks of any damage caused by attempting this is entirely your own. You should also be aware that running an executable from an unknown source (remember, EE neither supplies nor advocates the execution of the binary achievement in the article) should always be met with a high level of caution and so you are strongly encouraged to scan the file with an up-to-date and reputable anti-virus tool (both before unzipping it and after) before running.
Microsoft has announced the release of the successor of Exchange 2013 i.e., Exchange Server 2016, a new member of the Exchange family. At the Ignite Fest held in Chicago, Microsoft has introduced the Exchange Server 2016 & illustrated some of its awesome qualities. A preview version is now available for download but the final release is planning to ship in the second half or later this year. You can install the preview version to get hands-on experience of the newest member.

Basically, the  newest Exchange Server 2016 is something different because of its discovery in the cloud. There are lots of key improvements  that can be explored by trying out the Preview Release. Let’s check out some of the changes driven in Exchange 2016 at a high scale. From this release, Microsoft has brought up innovation from their datacenters to the general crowds.

Advanced Architectures

The Architecture of the Exchange Server 2016 is an advancement of the architecture which was delivered in Exchange 2013. The best Architecture has been deployed in the Exchange 2016. Most important changes to look at is, CAS Roles & Mailbox Server Roles have been combined that will offer an advanced building block to build up an Exchange environments.

Enhanced Reliability

Exchange 2016 is made with improved reliability so that you can …
Hi all.
The other day I had to change the passwords for a bunch of users on the fly. Because they were so many, I decided to do it in an automated way and I would like to share it with you all.
If you are not doing it directly in a Domain Controller (DC) you need to install and import the Active Directory (AD) module and you also need the required privileges to change passwords.
This script will check the users in a specified Organizational Unit (OU) without specifying any user, so be careful if you decide to use it.
Warning: If you decide to use this script test it first in a lab environment. Do it at your own risk.
This script will check the users in a specified Organizational Unit (OU) and then generate a random alphanumeric password with 8 char length.
Of course we can do more stuff but I don't want to complicate and I just want to show you how it can be done. This is just one way of doing it.
#This is the file that will be generated with the users account ID and the password generated.
[String]$path= ".\NewPass.txt"

#This will check if the file exist and will delete that file so a new one can be created from the scratch
#If the doesn't exist will through an error saying that the file doesn't exist and will continue.
if ($path -ne $null){Remove-Item $path}

<# Required Assembly to Generate Passwords #>
Add-Type -Assembly System.Web
#In my case I created a OU for test purposes here it is.
#You need to change it to meet your requirements.

Open in new window

LVL 12

Author Comment

by:David Paris Vicente
Hi all,

Thank you all for your comments.
@robert for you to be able to do that with the code above you will need to use regexp, but I believe you can achieve it in a more easy way, check the example below.

In my code I have:

Open in new window

If you change it to:
$NewPassword = -join ((97..122) | Get-Random -Count 10 | % {[char]$_})

Open in new window

This will generate a random char only with lower cases.

If you also want to capital letters you need use the ASCII table to check the value of each char, lets see an example.

$NewPassword = -join ((65..90) + (97..122) | Get-Random -Count 10 | % {[char]$_})

Open in new window

The output will be a random string.

Now if you want to add numbers, you can do it by adding the ASCII value related with numbers. Lets check it.

$NewPassword =  ((0..8) + (65..90) + (97..122) | Get-Random -Count 10 | % {[int32]$_}) 
Foreach($pass in $NewPassword){
 if ($pass -le 8){
    $finalpass+= $pass 
 }else {
 $finalpass+= [char]$pass 
Write-Host $finalpass

Open in new window

I believe this can do the trick, I didn't had to much time to tested it, but I can see that some random passwords could only have letters.

Then you can export it to a csv file piping the  variable $finalpass
$finalpass|Export-CSV c:\NewPass.csv -Append  

Open in new window

With this little code you already have the tools to start tweaking and accomplish your goal.

I hope it helps.



Expert Comment

by:rob ert
alright i managed to make it generate lowercase letter + letters using ur code and it works perfectly thanks alot ..
i have another question i hope im not being annoying ... the exported csv shows like Capture.PNG ... how can i make it like this Capture2.PNG ... if you notice the users and not consecutive they should be ige1 ige2 ige3 ige4 ige5 etc instead of userID: and password: in every row... plus is there a way to select specific users from that OU ?
your help is much appreciated ...
I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and the awful customer support. I can not tell you the countless hours i have spent on the phone with Cisco attempting to fix issues.

Well I have good and bad news for you all. Cisco has "End of Lifed" this platform and will no longer continue to support or sell it. The official timeline for this is below. But for some of you who have invested a lot of time and more importantly money into the product are probably pretty upset.

Well, there is a solution out there: the Dell Wyse Platform. The VXC platform was "purchased" from Wyse and simply branded by Cisco and they made a few coding changes but all in all the source code is the same. Even the asthetic look of the software is almost identical to the VXC. However, Wyse takes much better care of the software and has had out for quite some time a version of the management software that is compatible with Windows Server 2012 R2, that is something those of us with Cisco have been waiting for, for a while.

Wyse also releases patches much more quickly and has much better support, as well as an FAQ with discussion boards and forums. And the…

Author Comment

by:Bradley Bishop
How much are the Clients? We can get Wyse clients for around 300 and they are pretty good machines.

Expert Comment

We are looking at Wyse with Cloud Client Manager. Are you aware if it's able to manage both WyseOS and Windows Embedded TCs? We're also looking at the desktop extender LinuxOS to load on old laptops to keep them from going obsolete. Working with a rep there but haven't gotten answers yet. Looking for a way to manage all the ThinClient settings from one management interface. Switching from the Teradici zero client  model .
On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around the world.

A recent survey by Spiceworks shows that in Asia Pacific alone, almost 60% of organisations are still running at least one instance of Windows Server 2003 (as of March 2015). Although this figure has dropped from almost 65% in June 2014, it is still a huge number of 2003 servers with only 3 weeks to go.

Gartner states that there are over 8 million Windows Server 2003 instances in operation and 20% of those will miss the EOS date. That will leave around 1.6 million servers with no more security patches, no vulnerabilities fixed, and no more support for problems that may arise.

AppZero surveyed Fortune 1000 companies and reports that the majority of these companies won't finish their migration from Windows Server 2003 before the EOS date. Other key figures from the AppZero survey showed:
  • Almost half (47%) are not aware of the EOS date or have no plans (yet) for remediation
  • Only 21% of respondents have a remediation plan in place
  • Security compliance and vulnerability management remains the largest concern (>50%)
  • Fully one quarter (25%) of respondents still have more than 500+ Windows Server 2003 machines
I work at a firm who also still have around …

Expert Comment

Some bright programmer should figure out a process to envelop older but in every way adequate Operating Systems into a security shell/sandbox? that will protect them from security vulnerabilities and still allow them to run. I imagine that many of the owners of those 1.6 million 2003 servers would rather pay for such a sandbox/shell than migrate. An enterprising person or team could make 100 million overnight, and free a lot of clients from some of the stranglehold that they find themselves in. If after you make the 100 million mark and want to thank me for the idea, I'd be glad to take a cut!
Learn simple and easy methods to extract text and images from PDF documents. Extract data from the selected pages of Adobe PDF files. The user either manual or professional solution to save data from PDF document.
This article will review the basic installation and configuration for Windows Software Update Services (WSUS) in a Windows 2012 R2 environment.  WSUS is a Microsoft tool that allows administrators to manage and control updates to be approved and installed in their environment.

We will cover the following topics:
  • Installing the WSUS Role
  • Securing WSUS with SSL
  • Configuring WSUS
  • Configuring Group Policy
  • Managing Updates
  • Viewing Reports
  • Using PowerShell
  • Using wsusutil

For our test environment, we will use 3 Windows 2012 R2 servers with the following roles:
  • Domain controller
  • CA server (enterprise root)
  • WSUS

We already have a domain controller (DC1) and Certificate Authority (CA1) for mydomain.local in place.
A Windows 7 Enterprise system will also be used for this environment.
We will start with installing the WSUS role on the WSUS server.

Installing the WSUS Role

Login to the server with an account having local administrator rights.
Open Server Manager and go to Add roles and features.

WSUS-2015-06-03-20-47-32.pngClick next on the 'Before you begin' then next again on the 'Installation Type' pages.
On the Server Selection page, select the current server if it isn't already; click next.
For Server Roles, scroll to the bottom and check Windows Server Update Services.  This will bring up a dialog box to install dependent features.  Click add features.

Expert Comment

Hi, many thanks for useful article. I have some questions:
- What are the purposes of installing SSL on WSUS server?
- What happens if I did not install SSL?
LVL 38

Author Comment

by:Seth Simmons
What are the purposes of installing SSL on WSUS server?

encrypting communication between client and server

What happens if I did not install SSL?

traffic between client and server is not encrypted; will still work
The biggest nightmare for any Exchange Server Administrator is to keep the server running without any issue. But the problems often come and they need to be resolved efficiently and timely. Here are important troubleshooting points:

Define the Problem & its Scope

In order to begin troubleshooting in Exchange Server, you need to understand what the problem really is. This will require gathering information by asking questions from end users. After collecting information, the next thing is to find out the scope (how many clients have been affected, what are the common characteristics etc.

Understanding Error Code 

Most of when something goes wrong with the Server it returns some error code. There are built-in tools that make Microsoft Exchange truly powerful. Based on which Admin/User can have some idea about the problem. 
Check out Different Exchange Error Codes and their Solution:
Here is the list of tools available on Exchange Server: 

Use of Tools in Exchange Server for Troubleshooting


(1) Event Viewer
The Event Viewer stores detailed information about the recent system state and application errors. Using the event logs in Event Viewer one can obtain information about system hardware, software, and problems. In the Event Viewer, both application log and system log contain errors, informational events and warnings that can be used in the process of troubleshooting.
Read More about Event Viewer:
Unless you've been hiding under a rock you know that Microsoft will be releasing a new version of Windows this summer (2015). As administrators of Active Directory and managers of group policy we use WMI filtering to set and apply group policy objects to different versions of Windows, clients / servers, desktops and laptops. For instance, we want the policy to be applied only to laptops and not desktops, or to client operating systems and not server operating systems.

The examples below might be familiar as it is a common way to apply a GPO to all Versions of Windows after 7. It would also automatically work for Windows 8 and Windows 8.1 but it will fail for Windows 10.
select * from Win32_OperatingSystem where Version >= “6.1”
Unfortunately, WMI does the comparison as a string and not a number. This means that Version “10” is actually lower than “6.0” as 1 is lower that 6. So now we have to change our previously working WMI filter to:
select * from Win32_OperatingSystem where Version like “10.%” or Version >=”6.1″
Note: The same is also true for Windows Server 2016 as it has the same OS version number. This is why I've created this new article

WMI Filtering is another tool to put in your active directory toolbox. Order of execution of Group Policy Objects
Policies in hierarchy are located. (L-S-D-OU)
WMI Filters are checked.
Security settings are checked.
Only then after everything has passed does the policy …
Computer running slow? Taking forever to open a folder, documents, or any programs that you didn't have an issue with before? Here are a few steps to help speed it up.

The programs mentioned below ALL have free versions, you can buy them if you want, but I suggest using the free version in this case.

First step is to check, and clean up, any viruses / malware you might have installed on your computer. Any good antivirus will help with this. There are many out there, if you don’t have any currently installed, you should do this right away. Many of the big names have free 30 day trials to find one you like. There are also many free ones, but they may only give you a quarter of the feature or not have real-time scanning as an option. The only downside is this could slightly slow your computer as it will be running in the background at all times. However, it is very important you have an antivirus program installed to help prevent you from becoming infecting and losing personal information.

Once installed run a full system scan and clean up any viruses it may find.

One suggested antivirus program to run is MalwareBytes found at ( Use the free version (this does not do real time scans unless you buy it. However it is free to do on demand scans for this case. However, I highly recommend buying a antivirus program from your favorite antivirus vendor (or do some research and pick which one is best for you).


Expert Comment

by:Rochelle Adsitt
Also - is a fabulous resource for installing the latest version of utilities and other software we've come to depend on (Adobe Reader, Flash, Java, Malwarebytes, etc.) cleanly and quickly. It installs the software for me and doesn't allow any of the extra junk (like toolbars) to get installed or enabled.

Expert Comment

CCleaner I mentioned above can be found at ( use the free version

i installed and analyzed saw 9243 mb worth of files. now cleaning them.

when i open the windows explorer (windows key+E)it is closing by itself in few seconds saying 'windows enountered a trying to find solution etc) not sure why

From Coral's  "So You Want To Play With Computers" Series

A bit of background first, so this story will make a little sense.

One day, probably because he needed a good laugh, Finagle hooked me up with a church to upgrade/run their Media Booth. {Yeah, I know. I've been to "Hell and back" so many times, I already have my spot picked out and homesteaded}.
Anyhow, getting time to work on their system is hard to do, so I've been dual booting to a clone of their hard drive, so I can check the music, fix/add lyrics, and set up the music schedules, at my place. Then copy the schedules for a couple of weeks to a USB stick to take in with me, and copy to their computer.
But lately they have been throwing new music at me, and booting back and forth between Vista (nic is blocked) and W7, to go online to chase down lyrics, is getting to be a pita.

So I thought I would move Vista to a VM, then I could just toggle between them. Which brings me to what follows:

After firing up my Googlefu, and doing some research, I had a few points I wanted clarified, so I posted a Q on EE, which Finagle promptly kept the VM Gurus from posting in. Looks like I'm on my own.
That's alright. I can do this. After all, I'm a self taught computer geek. I've been mucking with computers for over 25 years. And I recently took a ComTIA  A+  Cram Course, and set the new high A+ test score for that class. As a bonus, it kind of irritated the college boys …
LVL 32

Author Comment

added screenshot of Vista running in MS Virtual PC.    ; )
How to remove superseded packages in windows w60 or w61 installation media (.wim) or online system to prevent unnecessary space.

w60 means Windows Vista or Windows Server 2008.
w61 means Windows 7 or Windows Server 2008 R2.

There are various guides found on the internet on how-to integrate updates into Windows installation media using dism.
This article is a post-integrate how-to to this numerous articles.
This article is addressed to users, who are comfortable using dism to mount, update, manage and unmount Windows Image files for deployment of Windows Systems.
So mounting and dismounting images is intentionally left out.

Administrators often include windows update packages into their deployment images to save time when deploying.
In Windows 8 dism.exe has built-in command-line extensions to remove superseded updates from Windows 8 image files.
Earlier versions of Windows do not have this feature.
So when you integrate packages into a windows installation media (w60 or w61), superseded or outdated packages reside in the deployment image and use unneccessary space. This guide shows how to list and remove superseded packages from the command-line or by batch.

Short description for what you have to do before:
- Download Windows Updates for Windows (w60 or w61).
  Best practice is using wsus offline update.
- Mount Windows installation media.
- Apply packages to the mounted image.

The listings below offers two options.
The first option …
I consult and manage a number of small businesses with no IT staff and staff who could do some serious damage if they were given the ADUC interface.  Sure, I can delegate rights and still give access to the ADUC interface but truly believe that less is best.  

You may already know about these command-line tools.  All I have done is to place them into .cmd scripts, and since the environments have terminal servers, I created .rdp files so all they have to do is launch the scripts and get to the tools they need for some basic day to day user management.

The way this works:
  1. The scripts below will need to be placed into a directory that is accessible by your admins.  I used c:\AD Scripts.
  2. I then configured Remote Apps and created a .RDP file and shared with my local power users.
  3. The next step is to use the AD delegation wizard and provide permissions to allow password changed by specific users.
I hope this helps anyone who consults and supports small businesses as I do.

The main user management script copy this into a file named usermgmt.cmd:
  • This script has three menu items; Lock AD Account, Unlock AD Account and Change AD password.
  • At line four, you can add information to for IT support such as your email address or telephone number.
@echo off
ECHO ...............................................
ECHO ..Please select an option
ECHO ..for any questions

Open in new window

The Diagnostic and Recovery Toolset (DART) is used to troubleshoot and repair Windows 7 and later operating systems, including Windows 2008 and R2 64-bit servers.  More information about DART can be found at   

DART 7.0: Windows 7, Windows Server 2008 R2
Latest version of DART: 8.1: Windows 8.1 and 2012 R2.

You need to customize the DART / ERD ISO images by updating drivers / Debug tools etc. Once you have this image, mount this ISO image to defective Virtual machine or Physical server (try connecting Remote consoles like DRAC /iLO / Vcenter).

Boot server from mounted ISO (Boot from CD / DVD option you need to select)

You need to wait until Windows loads the boot files.
Win-Load-Screen.jpgClick on “Yes” to initiate network connectivity in the background.

Click on “Yes” to Remap the drive letters.
DART-Map-drives.jpgClick Next to continue. Select the Operating system from below screen and click on “Yes”.

Below image shows for Windows Server 2003 / Win XP

You need to click on Microsoft Diagnostics and Recovery Toolset.

You will get below screen which contains all the troubleshooting tools, Based on your problem you need to select the tools,

Most of the Reboot or OS problems are loading issues, or there might be a problem with Services / Drives, Click on Computer management to get services window. You can select the Problematic service and disable that service / Driver.

LVL 68

Expert Comment

Hi Manjunath Sullad.

I think you should add
-how to aquire Dart (as far as I can see, only volume license customers get it, right?)
-That additional steps are needed to use it on encrypted hard drives (manage-bde on the command line can unlock the drive if bitlocked, but what do we do for drives encrypted with something else if we don't want to decrypt it first)
LVL 11

Author Comment

by:Manjunath Sullad
Hi McKnife,

Thanks for suggestions; I will update this article with above recommendations.
Are you getting those annoying warnings of Service Principal Name (SPN) incorrect in your System Center Operations Manager (SCOM)?

I call this warnings annoying because they don't affect the monitoring or operation, but you will see them every time you check the SCOM console, and that makes it hard to find real and important warnings. So, if you don't need the SPN for your server you can disable this monitor since SCOM is working properly. What follows is an example and the steps on to how to disable this warning.

First go to your SCOM console and check for alerts:

SCOM-warning.gifDouble-clicking on Stats of Server3 you will see the SPN incorrect warning:
Well, you can avoid the problem by creating the correct SPN, but imagine if you have dozens or hundreds of servers that need to have the SPN created? And you need to remember that new servers will need the correct SPN to be created.

So the best and quick way to get rid of those warnings is to disable the SPN monitor. This monitor comes with the respective Management Pack. Below is an example for this monitor in SQL Server Management Pack that you can find in Authoring tab / Management Pack Objects / Monitors in Operations Manager Console.
After overriding this monitor you should see a healthy Stat (it may needs few minutes to SCOM realize it):
NOTE: Only disable the SPN monitor if you don't need it. This monitor comes enabled by default but as you could see it raises only a warning and not a critical error.
LVL 15

Administrative Comment

by:Eric AKA Netminder

Congratuations; your article has been Accepted.

Page Editor


During one of Operating System deployment project, I face issue when I tried to deploy image with Microsoft Windows 7 x86 Professional with service pack 1 and Internet Explorer 10.

The error occur in specialize phase:
Windows could not parse or process unattend answer file [C:\windows\Panther\unattend.xml] for pass [specialize]. A component or setting specified in the answer file does not exist.

Sysprep Error
I was using Microsoft Deployment Tool 2012, but I think the issue may occur also in case you use Microsoft System Center 2012 Configuration Manager or any other deployment tool  

Additional Information:
I didn't receive any error message when I deploy Microsoft Windows 7 x86 Professional with service pack 1 and Internet Explorer 9.

Troubleshooting Steps

Usually I'm always looking for "%systemroot%\Panther\setupact.log" log file when I'm facing issue in specialize phase or during "Setup is applying system settings" as showing in the above snapshot. And found the following:

Error [setup.exe] SMI data results dump: Source = Name: Microsoft-Windows-IE-InternetExplorer, Language: neutral, ProcessorArchitecture: x86, PublicKeyToken: 31bf3856ad364e35, VersionScope: nonSxS, /settings/IEWelcomeMsg

Error [setup.exe] SMI data results dump: Description = Setting is not defined in this component.

Error [0x060432] IBS The provided unattend file is not valid; hrResult = 0x80220001


Expert Comment

This worked like a charm.  Not sure why all of a sudden I am getting bad  unattend files but this fixed it.  Also, my file must have gotten corrupt and wouldn't open from the deployment workbench.  I had to open another task and open it's unattend.xml and then open the one in the task I was working with.
For Windows XP, see my earlier EE article titled, Windows XP Profile Copying

Revised for Windows 7

This article is for non-techies, using Windows 7 who just want to copy their existing Windows 7 settings to a new computer which is also running Windows 7, or for users who want to replace their existing desktop profile with a new profile.

Note: haven’t figured yet figured how to migrate the printer/drive mappings if not mapped automatically.  The previous Windows XP article explained how to do this so make sure to do print screens of the printer/drive mappings if needed before recreating/creating the user profile.

These are the steps used to copy over existing Windows 7 user's desktop profile settings from their old Windows 7 computers to a new (or second) Windows 7 computer--or to recreate a user's profile on an existing Windows 7 computer if the existing profile is corrupt and needs to be replaced.

1) Reboot the computer then login as the local Administrator or as another user who has Administrative privileges.

2) First Make a profile backup of some type either manual or via the GUI.
Personally prefer option “B” the manual profile backup as you do not copy over a ton of unneeded temp files etc., or in the situations where the profile is corrupt you don't bring over corrupted files. I'd also
I wish to provide a solution that took me months to find for my Live VM backup on a Server 2008 R2 running 2 VM/s (SBS 2011 & Server 2008 R2/SQL Server 2008R2).

If you recieve an error EVENT ID 521 with the included error code (2155348129) in the event details in your hyper-v host system - and you have exhausted all other possibilities - then have a look at this solution. It may be the hidden gem that will let you sleep at night.

I had been unable to find a solution for performing a FULL BACKUP (Using Microsoft Windows Backup) with my VM's running, and all persons, help tickets, advice, etc., just kept me running in cricles around the same solutions that everyone else seems to have tried - some with success and some without.

Most seemed to come down to the Sharepoint psconfig.exe command needing to be run. Not my problem nor was any thing else I could find. Some including setting your system reserved as an "ACTIVE" partition - DON'T DO THAT!!!!! You will likely end up with a non-bootable system!

Others wanted you to create the VSSACCESSGROUP in your registry and then alter your DIAG key permissions (although all this does is help you clear out some Microsoft "benign" critical errors that may be safely ignored. And the list goes on. None of which worked in my situation to resolve my failed backups.

Well, yesterday, in searching for information on an unrelated issue - I stumbled across this article (mentioned below) that was my salvation.

Finally a solution …
Log Name:      System
Source:        NETLOGON
Date:          10/28/2013 6:24:29 PM
Event ID:      5719
Task Category: None
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      DC1.Contoso.local

This computer was not able to set up a secure session with a domain controller in domain CONTOSO due to the following:
There are currently no logon servers available to service the logon request.
This may lead to authentication problems. Make sure that this computer is connected to the network. If the problem persists, please contact your domain administrator.

Applies to: All Windows OS machines in Network

Minimum Permissions: Administrator

Netlogon Event ID 5719, this event ID occurs in all Microsoft Operating System machines. Netlogon 5719 occurs due to many reasons and we need to be careful while fixing this issue. Most of the time it occurs due to intermittent network problems.

If this occurs on Client Machines:

1. Check the NIC drivers and keep them upto date.
2. Check domain controller's NIC drivers and upgrade them as well.
3. From client access domain controller's shares.
4. No access of shares then unjoin and rejoin clinet machine to domain.

If this occurs on Servers:

1. Check NIC drivers and upgrade them.
2. Check domain controller's NIC drivers and upgrade them as well.
3. If upgrading NIC drivers doesn't fix issue, uninstall NIC completely and …
Problem: A remote user's password has expired, but their local machine has the old password cached. How do you change the password locally and resync it with the Domain again?

If you have a remote domain user with an expired (but cached) password, You can use this procedure to reset it. (using a VPL Client to remotely access the domain environment)

Have the Domain Admins or HelpDesk people reset the user's domain password first, with option to change it if your corporate policy will allows this (ours requires waiting 24 hours before a change can be done).
Instruct the remote domain user (already logged into Windows with the cached password) to login via your VPN client to domain with the new password. (VPN is probably disabled due to expired password. Once it is reset, VPN access can be established)

Instruct the user on how to get the IP address assigned by the VPN client from remote User's PC/VPN client software. (You can also find this by having the remote user open a command promt and type in the command "ipconfig /all" (without quotes) and have them read the IP address assigned).

Using your own Remote Desktop Client (RDP), establish a connection to remote users' PC using only the IP address and use their credentials and new password.

Once you are connected and logged in (to the user's profile), the user's cached password will be updated. The user will be shown a "This computer is currently locked.." screen. You can proceed to logoff from the remote …

Microsoft Legacy OS





The Microsoft Legacy Operating System topic includes legacy versions of Microsoft operating systems prior to Windows 2000: All versions of MS-DOS and other versions developed for specific manufacturers and Windows 3/3.1, Windows 95 and Windows 98, plus any other Windows-related versions, and Windows Mobile.