So this is happening with very specific user accounts. Most user accounts have no problems, but a handful are failing. Using LDP to bind, i'm getting this error:
0 = ldap_set_option(ld, LDAP_OPT_ENCRYPT, 1)
res = ldap_bind_s(ld, NULL, &NtAuthIdentity, NEGOTIATE (1158)); // v.3
{NtAuthIdentity: User='firstname.lastname'; Pwd=<unavailable>; domain = 'domainname.local'}
Error <49>: ldap_bind_s() failed: Invalid Credentials.
Server error: 8009030C: LdapErr: DSID-0C090588, comment: AcceptSecurityContext error, data 569, v2580
Error 0x8009030C The logon attempt failed
I am absolutely certain that the credentials are correct, because this is happening with my domain account. I can log into my Windows systems with no problems, including the DCs. But logging into LDAP, it fails.
I believe this is the important detail of the error:
Server error: 8009030C: LdapErr: DSID-0C090588, comment: AcceptSecurityContext error, data 569, v2580
This lists the errors https://ldapwiki.com/wiki/Common%20Active%20Directory%20Bind%20Errors
But there isn't an entry for 569...
This actually first occurred this afternoon with the built-in domain Administrator account. Our VPN services were failing because the LDAP bind utilized the built-in domain Administrator account. After spending an hour attempting to resolve it without success, i simply created an ldap user account to use with LDAP. Now a few hours later, the same issue is happening with my own domain account. What is happening here?
Hello @Nick@519 ,
Thank you for marking my reply as answer. I am very glad that the information is helpful.
As always, if there is any question in future, we warmly welcome you to post in this forum again. We are happy to assist you!
Have a nice day!
Best Regards,
Daisy Zhou
Hello @Nick@519 ,
Thank you for your update and sharing.
I am so glad that the problem was resolved.
As the question: is there a way to see who exactly made the change?
I have done a test in my lab and it worked.
If we want to check who exactly made the change on this machine (not all machines in the domain).
We can configure the following audit policy through local group policy on this machine(or maybe you have already configured it as mentioned).
1.Type gpedit.msc on Start search bar and click Enter.
2.Navigate to Computer Configuration\Windows settings\security settings\Advanced Audit Policy Configuration\System Audit Policies- Local Group Policy Object\Policy Change\Audit Authentication Policy Change==> Success and Failure.
3.Run gpupdate /force or restart the machine to refresh the GPO setting.
4.If I add a user or group Deny access to this computer from the network under Local Group Policy Editor > Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Users Rights Assignments.
I will see event ID 4717 as below (I added user account user15s using A\administrator).
5.4.If I removed a user or group Deny access to this computer from the network under Local Group Policy Editor > Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Users Rights Assignments.
I will see event ID 4718 as below(I removed user account user15s using A\administrator)..
Hope the information above is helpful. If anything is unclear, please feel free to let us know.
Best Regards,
Daisy Zhou
I was able to resolve this.
In Local Group Policy Editor > Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Users Rights Assignments > Deny access to this computer from the network
Administrators was listed there.
Now i need to find out how or who did this. I have auditing enabled in Event Viewer, is there a way to see who exactly made the change?
Hello @Nick@519 ,
Thank you for posting here.
From the description, I understand we can not bind LDAP. We can check as below:
1.If you can bind LDAP on other DC except this one, we can check if AD replication works fine.
2.If the time is not synchronized, authentication problems may also occur.
3.Whether you are perform bind operation on DC or client? If your domain credential is correct, we can check whether the hardware keyboard buttons are normal, type the credential on one txt file to check.
4.Also do you provide the credential with UPN (usernam@keyman .com) or domain\username, we can use the two one by one to see if it helps.
5.If it is NTLM authentication method, the NTLM version may also have impact.
For more information above NTLM version, we can refer to the link below.
Network security: LAN Manager authentication level
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level
If all above does not work. Please confirm the following information:
1.Whether your domain is a single forest with one domain or multiple domains?
2.Do you have multiple DCs in this domain? If you have multiple DCs in this domain, can you bind LDAP on other DCs?
3.Please check whether AD replication is working fine. Run repadmin /showrepl and repadmin /showrepl * /csv >showrepl.csv on PDC in this domain. If there is no error from the command result, then AD replication works fine.
4.What LDAP tool are you using?
5.If we use Windows built-in ldp.exe tool, how we bind LDAP (method 1 or method 2 or others)?
Method 1
Method 2
Hope the information above is helpful. If anything is unclear, please feel free to let us know.
Best Regards,
Daisy Zhou
1.If you can bind LDAP on other DC except this one, we can check if AD replication works fine.
All DCs. Confirm that replication is fine.
2.If the time is not synchronized, authentication problems may also occur.
Time is synchronized. As i mentioned, it was only specific accounts, the built-in domain Administrator account and my personal domain account. I was able to figure out the problem through gpsesult /z that both accounts were set on the DCs to deny the accounts to be logged in. It was denied both on the local policy as well as GPO. I removed both from the denied policies, and now my personal domain account is fine, but the Administrator account is still having issues.
3.Whether you are perform bind operation on DC or client? If your domain credential is correct, we can check whether the hardware keyboard buttons are normal, type the credential on one txt file to check.
**4.Also do you provide the credential with UPN (usernam@keyman .com) or domain\username, we can use the two one by one to see if it helps.
Again, i am 100% certain that the problem is not credential related. I have been troubleshooting this with multiple computers and have altered the passwords multiple times to simple passwords like 'Nameofmycity!!'
5.If it is NTLM authentication method, the NTLM version may also have impact.
Again, this is only happening with specific accounts. At the moment, only the built-in domain Administrator account that i know of.
If all above does not work. Please confirm the following information:
1.Whether your domain is a single forest with one domain or multiple domains?
Single forest.
2.Do you have multiple DCs in this domain? If you have multiple DCs in this domain, can you bind LDAP on other DCs?
We have 2 DCs, neither binds.
3.Please check whether AD replication is working fine. Run repadmin /showrepl and **repadmin /showrepl /csv >showrepl.csv* on PDC in this domain. If there is no error from the command result, then AD replication works fine
There is no error. All results are successful.
4.What LDAP tool are you using?
I'm using lpd.exe to troubleshoot, but it is failing with Freeradius and Cisco Anyconnect.
5.If we use Windows built-in ldp.exe tool, how we bind LDAP (method 1 or method 2 or others)?
Yes, i'm using lpd.exe to troubleshoot. Both method results in the error i posted in the original post.
This is the current gpresult /z results, is there anything that could be causing it:
Microsoft (R) Windows (R) Operating System Group Policy Result tool v2.0
© 2013 Microsoft Corporation. All rights reserved.
Created on 11/5/2020 at 7:37:45 PM
RSOP data for DOMAIN\firstname.lastname on DC1 : Logging Mode
-------------------------------------------------------
OS Configuration: Primary Domain Controller
OS Version: 6.3.9600
Site Name: City
Roaming Profile: N/A
Local Profile: C:\Users\firstname.lastname
Connected over a slow link?: No
COMPUTER SETTINGS
------------------
CN=DC1,OU=Domain Controllers,DC=domain,DC=local
Last time Group Policy was applied: 11/5/2020 at 7:33:05 PM
Group Policy was applied from: DC1.domain.local
Group Policy slow link threshold: 500 kbps
Domain Name: DOMAIN
Domain Type: Windows 2008 or later
Applied Group Policy Objects
-----------------------------
Default Domain Controllers Policy
Default Domain Policy
ADAuditPlusMSPolicy
Manage Engine
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
ADAuditPlusPolicy
Filtering: Denied (Security)
Allow Remote Management
Filtering: Denied (Security)
Local Group Policy
Filtering: Not Applied (Empty)
The computer is a part of the following security groups
-------------------------------------------------------
BUILTIN\Administrators
Everyone
BUILTIN\Pre-Windows 2000 Compatible Access
BUILTIN\Users
Windows Authorization Access Group
NT AUTHORITY\NETWORK
NT AUTHORITY\Authenticated Users
This Organization
Domain Controllers
DnsUpdateProxy
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Authentication authority asserted identity
Denied RODC Password Replication Group
RAS and IAS Servers
ADAuditPlusMS
System Mandatory Level
Resultant Set Of Policies for Computer
---------------------------------------
Software Installations
----------------------
Startup Scripts
---------------
Shutdown Scripts
----------------
Account Policies
----------------
GPO: Default Domain Policy
Policy: MaxRenewAge
Computer Setting: 7
GPO: Default Domain Policy
Policy: LockoutDuration
Computer Setting: 15
GPO: Default Domain Policy
Policy: MaximumPasswordAge
Computer Setting: 365
GPO: Default Domain Policy
Policy: MinimumPasswordAge
Computer Setting: N/A
GPO: Default Domain Policy
Policy: ResetLockoutCount
Computer Setting: 15
GPO: Default Domain Policy
Policy: MaxServiceAge
Computer Setting: 600
GPO: Default Domain Policy
Policy: LockoutBadCount
Computer Setting: 10
GPO: Default Domain Policy
Policy: MaxClockSkew
Computer Setting: 5
GPO: Default Domain Policy
Policy: MaxTicketAge
Computer Setting: 10
GPO: Default Domain Policy
Policy: PasswordHistorySize
Computer Setting: 5
GPO: Default Domain Policy
Policy: MinimumPasswordLength
Computer Setting: 10
Audit Policy
------------
GPO: Default Domain Controllers Policy
Policy: AuditPolicyChange
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditAccountManage
Computer Setting: Success, Failure
GPO: Default Domain Controllers Policy
Policy: AuditObjectAccess
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditDSAccess
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditPrivilegeUse
Computer Setting: No Auditing
GPO: Default Domain Controllers Policy
Policy: AuditProcessTracking
Computer Setting: Success
GPO: Default Domain Controllers Policy
Policy: AuditAccountLogon
Computer Setting: Success, Failure
GPO: Default Domain Controllers Policy
Policy: AuditLogonEvents
Computer Setting: Success, Failure
GPO: Default Domain Controllers Policy
Policy: AuditSystemEvents
Computer Setting: Success
User Rights
-----------
GPO: Default Domain Controllers Policy
Policy: SyncAgentPrivilege
Computer Setting: N/A
GPO: Default Domain Controllers Policy
Policy: MachineAccountPrivilege
Computer Setting: Authenticated Users
GPO: Default Domain Controllers Policy
Policy: ChangeNotifyPrivilege
Computer Setting: *S-1-5-80-1670033946-1058562292-2418231921-1479535664-4274663199
Pre-Windows 2000 Compatible Access
Authenticated Users
Administrators
Everyone
DOMAIN\QBDataServiceUser19
*S-1-5-80-797827364-3451187129-808634983-2979512460-2324440249
GPO: Default Domain Controllers Policy
Policy: IncreaseBasePriorityPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: CreateTokenPrivilege
Computer Setting: N/A
GPO: Manage Engine
Policy: SecurityPrivilege
Computer Setting: DOMAIN\manage.engine
GPO: Default Domain Controllers Policy
Policy: TakeOwnershipPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: DenyInteractiveLogonRight
Computer Setting: DOMAIN\QBDataServiceUser19
GPO: Default Domain Controllers Policy
Policy: RestorePrivilege
Computer Setting: Server Operators
Backup Operators
Administrators
GPO: Default Domain Controllers Policy
Policy: DebugPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: SystemTimePrivilege
Computer Setting: Server Operators
Administrators
LOCAL SERVICE
GPO: Default Domain Controllers Policy
Policy: SecurityPrivilege
Computer Setting: DOMAIN\Exchange Servers
Administrators
GPO: Default Domain Controllers Policy
Policy: ShutdownPrivilege
Computer Setting: Print Operators
Server Operators
Backup Operators
Administrators
GPO: Default Domain Controllers Policy
Policy: AuditPrivilege
Computer Setting: NETWORK SERVICE
LOCAL SERVICE
IIS APPPOOL\DefaultAppPool
GPO: Default Domain Controllers Policy
Policy: InteractiveLogonRight
Computer Setting: Print Operators
Server Operators
Account Operators
Backup Operators
Administrators
DOMAIN\IUSR_EXCH
GPO: Default Domain Controllers Policy
Policy: CreatePagefilePrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: BatchLogonRight
Computer Setting: IIS_IUSRS
DOMAIN\Administrator
DOMAIN\IIS_WPG
DOMAIN\IUSR_EXCH
DOMAIN\IWAM_EXCH
LOCAL SERVICE
GPO: Default Domain Controllers Policy
Policy: LockMemoryPrivilege
Computer Setting: N/A
GPO: Default Domain Controllers Policy
Policy: NetworkLogonRight
Computer Setting: DOMAIN\IWAM_EXCH
Pre-Windows 2000 Compatible Access
ENTERPRISE DOMAIN CONTROLLERS
Authenticated Users
Administrators
Everyone
DOMAIN\IUSR_EXCH
DOMAIN\QBDataServiceUser19
GPO: Default Domain Controllers Policy
Policy: CreatePermanentPrivilege
Computer Setting: N/A
GPO: Default Domain Controllers Policy
Policy: SystemProfilePrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: TcbPrivilege
Computer Setting: N/A
GPO: Default Domain Controllers Policy
Policy: ServiceLogonRight
Computer Setting: DOMAIN\backup.service
*S-1-5-80-2567096502-4068731684-1555260761-2520130083-3392037366
*S-1-5-80-1670033946-1058562292-2418231921-1479535664-4274663199
DOMAIN\SQLServer2005SQLBrowserUser$DC2
DOMAIN\firstname.lastname
NETWORK SERVICE
DOMAIN\QBDataServiceUser19
IIS APPPOOL\DefaultAppPool
SYSTEM
*S-1-5-80-797827364-3451187129-808634983-2979512460-2324440249
DOMAIN\Administrator
DOMAIN\SQLServer2005SQLBrowserUser$DC3
GPO: Default Domain Controllers Policy
Policy: RemoteShutdownPrivilege
Computer Setting: Server Operators
Administrators
GPO: Default Domain Controllers Policy
Policy: BackupPrivilege
Computer Setting: Server Operators
Backup Operators
Administrators
GPO: Default Domain Controllers Policy
Policy: EnableDelegationPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: UndockPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: SystemEnvironmentPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: DenyServiceLogonRight
Computer Setting: N/A
GPO: Default Domain Controllers Policy
Policy: LoadDriverPrivilege
Computer Setting: Print Operators
Administrators
GPO: Default Domain Controllers Policy
Policy: IncreaseQuotaPrivilege
Computer Setting: *S-1-5-80-1670033946-1058562292-2418231921-1479535664-4274663199
Administrators
NETWORK SERVICE
LOCAL SERVICE
DOMAIN\IWAM_EXCH
IIS APPPOOL\DefaultAppPool
*S-1-5-80-797827364-3451187129-808634983-2979512460-2324440249
GPO: Default Domain Controllers Policy
Policy: ProfileSingleProcessPrivilege
Computer Setting: Administrators
GPO: Default Domain Controllers Policy
Policy: AssignPrimaryTokenPrivilege
Computer Setting: *S-1-5-80-1670033946-1058562292-2418231921-1479535664-4274663199
NETWORK SERVICE
LOCAL SERVICE
DOMAIN\IWAM_EXCH
IIS APPPOOL\DefaultAppPool
*S-1-5-80-797827364-3451187129-808634983-2979512460-2324440249
Security Options
----------------
GPO: Default Domain Policy
Policy: PasswordComplexity
Computer Setting: Enabled
GPO: Default Domain Policy
Policy: ClearTextPassword
Computer Setting: Not Enabled
GPO: Default Domain Policy
Policy: ForceLogoffWhenHourExpire
Computer Setting: Not Enabled
GPO: Default Domain Policy
Policy: RequireLogonToChangePassword
Computer Setting: Not Enabled
GPO: Default Domain Policy
Policy: TicketValidateClient
Computer Setting: Enabled
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59059
ValueName: MACHINE\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel
Computer Setting: 2
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59013
ValueName: MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity
Computer Setting: 1
GPO: ADAuditPlusMSPolicy
Policy: @wsecedit.dll,-59104
ValueName: MACHINE\System\CurrentControlSet\Control\Lsa\SCENoApplyLegacyAuditPolicy
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59043
ValueName: MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\RequireSecuritySignature
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59044
ValueName: MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\EnableSecuritySignature
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59104
ValueName: MACHINE\System\CurrentControlSet\Control\Lsa\SCENoApplyLegacyAuditPolicy
Computer Setting: 1
GPO: Default Domain Controllers Policy
Policy: @wsecedit.dll,-59018
ValueName: MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\RequireSignOrSeal
Computer Setting: 1
Event Log Settings
------------------
Restricted Groups
-----------------
System Services
---------------
Registry Settings
-----------------
File System Settings
--------------------
Public Key Policies
-------------------
Administrative Templates
------------------------
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallTime
Value: 5, 0, 0, 0
State: Enabled
GPO: Default Domain Policy
Folder Id: Software\Policies\Microsoft\Windows NT\Terminal Services\RAUnsolicit\domain\firstname.lastname
Value: 100, 0, 101, 0, 106, 0, 101, 0, 114, 0, 111, 0, 92, 0, 110, 0, 105, 0, 99, 0, 107, 0, 46, 0, 110, 0, 103, 0, 104, 0, 105, 0, 101, 0, 109, 0, 0, 0
State: Enabled
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\AutomaticMaintenanceEnabled
Value: 1, 0, 0, 0
State: Enabled
GPO: Default Domain Policy
Folder Id: Software\Policies\Microsoft\Windows NT\Terminal Services\fAllowUnsolicitedFullControl
Value: 1, 0, 0, 0
State: Enabled
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate
Value: 0, 0, 0, 0
State: Enabled
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallDay
Value: 1, 0, 0, 0
State: Enabled
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\WindowsUpdate\AU\AUOptions
Value: 4, 0, 0, 0
State: Enabled
GPO: Default Domain Policy
Folder Id: Software\Policies\Microsoft\Windows NT\Terminal Services\fAllowUnsolicited
Value: 1, 0, 0, 0
State: Enabled
GPO: Default Domain Controllers Policy
Folder Id: Software\Policies\Microsoft\Windows\EventLog\Security\AutoBackupLogFiles
Value: 49, 0, 0, 0
State: Enabled
USER SETTINGS
--------------
CN=Firstname Lastname,OU=IT Admins,OU=Domain Users,DC=domain,DC=local
Last time Group Policy was applied: 11/5/2020 at 7:17:08 PM
Group Policy was applied from: DC1.domain.local
Group Policy slow link threshold: 500 kbps
Domain Name: DOMAIN
Domain Type: Windows 2008 or later
Applied Group Policy Objects
-----------------------------
Redirected Folders - Domain-Users
Drive Mapping
Printers
Default Domain Policy
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
Production Printer
Filtering: Denied (Security)
Local Group Policy
Filtering: Not Applied (Empty)
Printers - Finance
Filtering: Denied (Security)
The user is a part of the following security groups
---------------------------------------------------
Domain Users
Everyone
Event Log Readers
Performance Monitor Users
BUILTIN\Users
BUILTIN\Pre-Windows 2000 Compatible Access
BUILTIN\Administrators
REMOTE INTERACTIVE LOGON
NT AUTHORITY\INTERACTIVE
NT AUTHORITY\Authenticated Users
This Organization
LOCAL
Domain Admins
Quality
FolderRedirectDeny
Software
Enterprise Admins
Authentication authority asserted identity
Denied RODC Password Replication Group
NetworkAdmins
High Mandatory Level
The user has the following security privileges
----------------------------------------------
Bypass traverse checking
Increase a process working set
Manage auditing and security log
Back up files and directories
Restore files and directories
Change the system time
Shut down the system
Force shutdown from a remote system
Take ownership of files or other objects
Debug programs
Modify firmware environment values
Profile system performance
Profile single process
Increase scheduling priority
Load and unload device drivers
Create a pagefile
Adjust memory quotas for a process
Remove computer from docking station
Perform volume maintenance tasks
Impersonate a client after authentication
Create global objects
Change the time zone
Create symbolic links
Enable computer and user accounts to be trusted for delegation
Add workstations to domain
Resultant Set Of Policies for User
-----------------------------------
Software Installations
----------------------
Logon Scripts
-------------
Logoff Scripts
--------------
Public Key Policies
-------------------
Administrative Templates
------------------------
GPO: Redirected Folders - Domain-Users
Folder Id: Software\Policies\Microsoft\Windows\NetCache\SyncAtLogoff
Value: 1, 0, 0, 0
State: Enabled
GPO: Redirected Folders - Domain-Users
Folder Id: Software\Policies\Microsoft\Windows\System\Fdeploy\FolderRedirectionEnableCacheRename
Value: 1, 0, 0, 0
State: Enabled
GPO: Intelsat
Folder Id: Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ListBox_Support_ZoneMapKey
Value: 1, 0, 0, 0
State: Enabled
GPO: Redirected Folders - Domain-Users
Folder Id: Software\Policies\Microsoft\Windows\NetCache\SyncAtLogon
Value: 1, 0, 0, 0
State: Enabled
Folder Redirection
------------------
GPO: Redirected Folders - Domain-Users
Folder Id: Documents
Primary Computer Evaluation: Not evaluated because primary computer policy is not enabled
InstallationType: basic
Grant Type: Not Exclusive Rights
Move Type: Contents of Local Directory moved
Policy Removal: Redirect the folder back to user profile location
Redirecting Group: N/A
Redirected Path: \\Domain-Files\Domain-Users$\%USERNAME%\Documents
Configuration Control: Group Policy
GPO: Redirected Folders - Domain-Users
Folder Id: Favorites
Primary Computer Evaluation: Not evaluated because primary computer policy is not enabled
InstallationType: basic
Grant Type: Not Exclusive Rights
Move Type: Contents of Local Directory moved
Policy Removal: Redirect the folder back to user profile location
Redirecting Group: N/A
Redirected Path: \\Domain-Files\Domain-Users$\%USERNAME%\Favorites
Configuration Control: Group Policy
GPO: Redirected Folders - Domain-Users
Folder Id: Desktop
Primary Computer Evaluation: Not evaluated because primary computer policy is not enabled
InstallationType: basic
Grant Type: Not Exclusive Rights
Move Type: Contents of Local Directory moved
Policy Removal: Redirect the folder back to user profile location
Redirecting Group: N/A
Redirected Path: \\Domain-Files\Domain-Users$\%USERNAME%\Desktop
Configuration Control: Group Policy
Internet Explorer Browser User Interface
----------------------------------------
Internet Explorer Connection
----------------------------
Internet Explorer URLs
----------------------
Internet Explorer Security
--------------------------
Internet Explorer Programs
--------------------------