hello
I have 2 domain controller in my domain, both of them are windows server 2008 R2 in past i lost my Default group policy files in some ransomware attack (attack was on other machine but sysvol folder and GPOs damaged),after that i rebuild default GPOs
with "dcgpofix /target:both" and everything seems to be OK but few days ago i found that one of my DCs dose not apply any group policy even "default domain controllers policy"
i didn't found any error or warning in event viewer and even when i run "gpupdate /force" it show "User and Computer Policy update has completed successfully" and even there is no error in "winlogon.log" file
and i can't found root of problem after couple of hours.
for example i change the "Account lockout threshold" to "15 invalid logon attempts" in "default domain controllers
policy" it dose not effect of one of my DCs but work fine in other, and even this change dose not show in "gpresult" and "rsop" in that DC
i even create a new GPO and link that to my DCs but the same result.
my winlogon.log:
*************************
Error 0 to send control flag 1 over to server.
Make a local copy of \\My.Domain\SysVol\My.Domain\Policies\{2F6E7BAA-5DD4-4123-829C-8297C6FCDBA3}\Machine\Microsoft\Windows NT\SecEdit\GptTmpl.inf.
GPLinkSite GPO_INFO_FLAG_BACKGROUND )
Make a local copy of \\My.Domain\sysvol\My.Domain\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\Machine\Microsoft\Windows NT\SecEdit\GptTmpl.inf.
GPLinkDomain GPO_INFO_FLAG_BACKGROUND )
Make a local copy of \\My.Domain\SysVol\My.Domain\Policies\{D03F35EE-2D52-4BCD-A785-8B4DD7D61F7D}\Machine\Microsoft\Windows NT\SecEdit\GptTmpl.inf.
GPLinkOrganizationUnit GPO_INFO_FLAG_BACKGROUND )
Make a local copy of \\My.Domain\sysvol\My.Domain\Policies\{6AC1786C-016F-11D2-945F-00C04FB984F9}\Machine\Microsoft\Windows NT\SecEdit\GptTmpl.inf.
GPLinkOrganizationUnit GPO_INFO_FLAG_BACKGROUND )
Process GP template gpt00000.inf.
This is not the last GPO : domain policy is ignored on DC.
-------------------------------------------
Sunday, March 10, 2019 5:24:23 PM
Copy undo values to the merged policy.
----Un-initialize configuration engine...
Process GP template gpt00001.dom.
This is not the last GPO.
-------------------------------------------
Sunday, March 10, 2019 5:24:23 PM
----Un-initialize configuration engine...
Process GP template gpt00002.inf.
This is not the last GPO : domain policy is ignored on DC.
-------------------------------------------
Sunday, March 10, 2019 5:24:23 PM
----Un-initialize configuration engine...
Process GP template gpt00003.inf.
This is the last GPO : domain policy is ignored on DC.
-------------------------------------------
Sunday, March 10, 2019 5:24:23 PM
----Un-initialize configuration engine...
-------------------------------------------
Sunday, March 10, 2019 5:24:23 PM
----Configuration engine was initialized successfully.----
----Reading Configuration Template info...
----Configure User Rights...
Configure S-1-5-20.
Configure S-1-5-19.
Configure S-1-5-32-549.
Configure S-1-5-32-551.
Configure S-1-5-32-544.
Configure S-1-5-32-559.
Configure S-1-5-32-554.
Configure S-1-5-11.
Configure S-1-1-0.
Configure S-1-5-32-550.
Configure S-1-5-32-548.
Configure S-1-5-9.
Configure S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420.
User Rights configuration was completed successfully.
----Configure Security Policy...
LSA anonymous lookup names setting : existing SD = D:(D;;0x800;;;AN)(A;;0xf1fff;;;BA)(A;;0x20801;;;WD)(A;;0x801;;;AN)(A;;0x1000;;;LS)(A;;0x1000;;;NS)(A;;0x1000;;;S-1-5-17).
Configure LSA anonymous lookup setting.
Configure machine\system\currentcontrolset\control\lsa\nolmhash.
Configure machine\system\currentcontrolset\control\lsa\scenoapplylegacyauditpolicy.
Configure machine\system\currentcontrolset\services\lanmanserver\parameters\enablesecuritysignature.
Configure machine\system\currentcontrolset\services\lanmanserver\parameters\requiresecuritysignature.
Configure machine\system\currentcontrolset\services\netlogon\parameters\requiresignorseal.
Configure machine\system\currentcontrolset\services\ntds\parameters\ldapserverintegrity.
Configuration of Registry Values was completed successfully.
Legacy audit settings are disabled. Skipped configuration of legacy audit settings.
Audit/Log configuration was completed successfully.
Kerberos Policy configuration was completed successfully.
----Configure available attachment engines...
Configuration of attachment engines was completed successfully.
----Un-initialize configuration engine...
*********************
and this is my "gpresult /z" there is no sing of Account lockout that i set:
Microsoft (R) Windows (R) Operating System Group Policy Result tool v2.0
Copyright (C) Microsoft Corp. 1981-2001
Created On 3/10/2019 at 5:26:47 PM
RSOP data for Mydomain\MyUser on MyServerName : Logging Mode
---------------------------------------------------
OS Configuration: Additional/Backup Domain Controller
OS Version: 6.1.7601
Site Name: site2-internet
Roaming Profile: N/A
Local Profile: C:\Users\MyUser
Connected over a slow link?: No
COMPUTER SETTINGS
------------------
CN=MyServerName,OU=Domain Controllers,DC=Mydomain,DC=local
Last time Group Policy was applied: 3/10/2019 at 5:24:22 PM
Group Policy was applied from: MyServerName.Mydomain.local
Group Policy slow link threshold: 500 kbps
Domain Name: Mydomain
Domain Type: Windows 2000
Applied Group Policy Objects
-----------------------------
Default Domain Controllers Policy
accountlockout
Default Domain Policy
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
Local Group Policy
Filtering: Not Applied (Empty)
The computer is a part of the following security groups
-------------------------------------------------------
BUILTIN\Administrators
Everyone
BUILTIN\Users
BUILTIN\Pre-Windows 2000 Compatible Access
Windows Authorization Access Group
NT AUTHORITY\NETWORK
NT AUTHORITY\Authenticated Users
This Organization
MyServerName$
Domain Controllers
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Denied RODC Password Replication Group
System Mandatory Level
Resultant Set Of Policies for Computer
---------------------------------------
Software Installations
----------------------
N/A
Startup Scripts
---------------
N/A
Shutdown Scripts
----------------
N/A
Account Policies
----------------
GPO: Default Domain Policy
Policy: MaxRenewAge
Computer Setting: 7
GPO: Default Domain Policy
Policy: MaxServiceAge
Computer Setting: 600
GPO: Default Domain Policy
Policy: MaxClockSkew
Computer Setting: 5
GPO: Default Domain Policy
Policy: MaxTicketAge
Computer Setting: 10
Audit Policy
------------
GPO: Default Domain Controllers Policy
Policy: AuditPolicyChange
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditAccountManage
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditDSAccess
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditSystemEvents
Computer Setting: Success
User Rights
-----------
GPO: Default Domain Controllers Policy
Policy: MachineAccountPrivilege
Computer Setting: Authenticated Users
GPO: Default Domain Controllers Policy
Policy: ChangeNotifyPrivilege
Computer Setting: Everyone
LOCAL SERVICE
NETWORK SERVICE
Administrators
Authenticated Users
Pre-Windows 2000 Compatible Access
GPO: Default Domain Controllers Policy
Policy: IncreaseBasePriorityPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: TakeOwnershipPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: RestorePrivilege
Computer Setting: Administrators
Backup Operators
Server Operators
GPO: Default Domain Controllers Policy
Policy: DebugPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: SystemTimePrivilege
Computer Setting: LOCAL SERVICE
Administrators
Server Operators
GPO: Default Domain Controllers Policy
Policy: SecurityPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: ShutdownPrivilege
Computer Setting: Administrators
Backup Operators
Server Operators
Print Operators
GPO: Default Domain Controllers Policy
Policy: AuditPrivilege
Computer Setting: LOCAL SERVICE
NETWORK SERVICE
GPO: Default Domain Controllers Policy
Policy: InteractiveLogonRight
Computer Setting: Administrators
Backup Operators
Account Operators
Server Operators
Print Operators
GPO: Default Domain Controllers Policy
Policy: CreatePagefilePrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: BatchLogonRight
Computer Setting: Administrators
Backup Operators
Performance Log Users
GPO: Default Domain Controllers Policy
Policy: NetworkLogonRight
Computer Setting: Everyone
Administrators
ENTERPRISE DOMAIN CONTROLLERS
Authenticated Users
Pre-Windows 2000 Compatible Access
GPO: Default Domain Controllers Policy
Policy: SystemProfilePrivilege
Computer Setting: Administrators
NT SERVICE\WdiServiceHost
GPO: Default Domain Controllers Policy
Policy: ServiceLogonRight
Computer Setting: NETWORK SERVICE
GPO: Default Domain Controllers Policy
Policy: RemoteShutdownPrivilege
Computer Setting: Administrators
Server Operators
GPO: Default Domain Controllers Policy
Policy: BackupPrivilege
Computer Setting: Administrators
Backup Operators
Server Operators
GPO: Default Domain Controllers Policy
Policy: EnableDelegationPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: UndockPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: SystemEnvironmentPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: LoadDriverPrivilege
Computer Setting: Administrators
Print Operators
GPO: Default Domain Controllers Policy
Policy: IncreaseQuotaPrivilege
Computer Setting: LOCAL SERVICE
NETWORK SERVICE
Administrators
GPO: Default Domain Controllers Policy
Policy: ProfileSingleProcessPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: AssignPrimaryTokenPrivilege
Computer Setting: LOCAL SERVICE
NETWORK SERVICE
Security Options
----------------
GPO: Default Domain Policy
Policy: LSAAnonymousNameLookup
Computer Setting: Not Enabled
GPO: Default Domain Policy
Policy: TicketValidateClient
Computer Setting: Enabled
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59013
ValueName: MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59043
ValueName: MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\RequireSecuritySignature
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59044
ValueName: MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\EnableSecuritySignature
Computer Setting: 1
GPO: Default Domain Policy
Policy: @wsecedit.dll,-59058
ValueName: MACHINE\System\CurrentControlSet\Control\Lsa\NoLMHash
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59104
ValueName: MACHINE\System\CurrentControlSet\Control\Lsa\SCENoApplyLegacyAuditPolicy
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59018
ValueName: MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\RequireSignOrSeal
Computer Setting: 1
Event Log Settings
------------------
N/A
Restricted Groups
-----------------
N/A
System Services
---------------
N/A
Registry Settings
-----------------
N/A
File System Settings
--------------------
N/A
Public Key Policies
-------------------
N/A
Administrative Templates
------------------------
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallTime
Value: 3, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\UseWUServer
Value: 1, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\WUStatusServer
Value: 104, 0, 116, 0, 116, 0, 112, 0, 58, 0, 47, 0, 47, 0, 115, 0, 101, 0, 114, 0, 118, 0, 101, 0, 114, 0, 50, 0, 58, 0, 56, 0, 53, 0, 51, 0, 48, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\DetectionFrequency
Value: 6, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\WUServer
Value: 104, 0, 116, 0, 116, 0, 112, 0, 58, 0, 47, 0, 47, 0, 115, 0, 101, 0, 114, 0, 118, 0, 101, 0, 114, 0, 50, 0, 58, 0, 56, 0, 53, 0, 51, 0, 48, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate
Value: 0, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallDay
Value: 0, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\DetectionFrequencyEnabled
Value: 1, 0, 0, 0
State: Enabled
GPO: site2 wsus gpo
KeyName: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\AUOptions
Value: 2, 0, 0, 0
State: Enabled
USER SETTINGS
--------------
CN=mahyar MyUser,CN=Users,DC=Mydomain,DC=local
Last time Group Policy was applied: 3/10/2019 at 5:24:22 PM
Group Policy was applied from: MyServerName.Mydomain.local
Group Policy slow link threshold: 500 kbps
Domain Name: Mydomain
Domain Type: Windows 2000
Applied Group Policy Objects
-----------------------------
Default Domain Policy
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
Local Group Policy
Filtering: Not Applied (Empty)
The user is a part of the following security groups
---------------------------------------------------
Domain Users
Everyone
BUILTIN\Backup Operators
Performance Log Users
BUILTIN\Users
BUILTIN\Pre-Windows 2000 Compatible Access
BUILTIN\Administrators
NT AUTHORITY\INTERACTIVE
CONSOLE LOGON
NT AUTHORITY\Authenticated Users
This Organization
LOCAL
Domain Admins
Group Policy Creator Owners
Schema Admins
Enterprise Admins
Denied RODC Password Replication Group
High Mandatory Level
The user has the following security privileges
----------------------------------------------
Bypass traverse checking
Back up files and directories
Restore files and directories
Shut down the system
Increase a process working set
Manage auditing and security log
Change the system time
Force shutdown from a remote system
Take ownership of files or other objects
Debug programs
Modify firmware environment values
Profile system performance
Profile single process
Increase scheduling priority
Load and unload device drivers
Create a pagefile
Adjust memory quotas for a process
Remove computer from docking station
Perform volume maintenance tasks
Impersonate a client after authentication
Create global objects
Change the time zone
Create symbolic links
Enable computer and user accounts to be trusted for delegation
Add workstations to domain
Resultant Set Of Policies for User
-----------------------------------
Software Installations
----------------------
N/A
Logon Scripts
-------------
N/A
Logoff Scripts
--------------
N/A
Public Key Policies
-------------------
N/A
Administrative Templates
------------------------
N/A
Folder Redirection
------------------
N/A
Internet Explorer Browser User Interface
----------------------------------------
N/A
Internet Explorer Connection
----------------------------
N/A
Internet Explorer URLs
----------------------
N/A
Internet Explorer Security
--------------------------
N/A
Internet Explorer Programs
--------------------------
N/A