Knowledge Base

Troubleshooting Group Policy Processing Errors in an Active Directory Domain



Article Summary: This article provides information on troubleshooting Group Policy processing errors on Windows machines in an Active Directory domain.



Members of an Active Directory (AD) domain can experience problems applying Group Policy for a number of reasons. This article discusses some of the more common ones and provides guidelines for troubleshooting the underlying issues.

General Troubleshooting
The first step in troubleshooting these issues should be to determine their extent. If only one machine is unable to process Group Policy, the problem likely stems from a malfunction or misconfiguration of that machine rather than a problem with a domain controller (DC) or AD itself. In the case of a machine-specific problem, it may be useful to run gpupdate /force on the affected machine before troubleshooting further, to make sure the failure wasn't caused by a temporary network issue that has since been resolved.

When a machine is unable to process Group Policy, it will typically generate one or more Userenv errors in its Application log. Common event ID numbers include 1030, 1053, 1054, and 1058. The descriptions of the particular errors on an affected machine should give some idea of the underlying issue.

DNS Issues
Perhaps the most common cause of Group Policy failures (and numerous other issues in AD) is a name-resolution problem: a client tries to update its Group Policy settings but can't determine the name of a DC in the domain, can't resolve a DC's name to an IP address, or resolves that name to the address of a machine that isn't really a DC and may not even exist. If the Userenv errors on an affected machine include the phrase "Network path not found" or "Cannot locate a domain controller," DNS may be to blame. The following are a few tips for troubleshooting this type of issue:

  • Open a command prompt on an affected machine and run nslookup domain_name (nslookup mydomain.local, for example). This command should return the IP addresses of all DCs in the domain. If any other addresses are returned, there are likely invalid records in DNS. The nslookup command can also be used to resolve the names of individual DCs to their IP addresses (nslookup dc1.mydomain.local, for example).
  • Run ipconfig /all on an affected machine and verify that it is configured to use only internal DNS servers. Using the wrong DNS servers is the main cause of DNS issues in a domain, and it is easily remedied. All domain-joined machines must use only internal DNS servers, which are typically DCs.
  • If the affected machine appears to be using the correct DNS servers, check the DNS console on a DC to verify that the proper records exist. Verify that each DC has two host (A) records in the domain forward lookup zone: one with the DC's hostname and one with the name "(same as parent folder)". Both records should include the IP address of the DC.
  • Once the DNS problem has been resolved, don't forget to run ipconfig /flushdns on any affected machines to purge any invalid data from the resolver cache on those machines.

Secure Channel Issues
This type of issue generally occurs when a domain-joined machine has been offline for long enough that the password of its computer account in AD no longer matches the machine's locally cached copy of that password, but it can arise in other situations as well. A secure-channel problem will prevent a machine from authenticating with a DC and will typically manifest itself as an "Access denied" error whenever that machine attempts to access domain resources, including Group Policy updates. Of course, not all "Access denied" events are due to secure-channel issues, but if an affected machine has Userenv errors in its Application log with "Access denied" in their description, the secure channel is worth testing.

  • The nltest command can be used to test (and reset, if necessary) the secure channel on a domain member.
  • The netdom command can also test and reset the secure channel.
  • If the Active Directory PowerShell module is installed, the Test-ComputerSecureChannel PowerShell cmdlet provides another means to test and/or reset the secure channel.
  • In some cases, it may be necessary to remove the affected machine from the domain, reset its AD computer account, and rejoin it to the domain in order to reset its secure channel.

Problems with SYSVOL
Group Policy files are stored in the SYSVOL share on all DCs in the domain - specifically, in subfolders of the SYSVOL\domain\Policies folder. If the SYSVOL share is not present on a DC, this typically indicates a problem with either the File Replication Service (FRS) or Distributed File System Replication (DFS-R), depending on which one is being used to replicate SYSVOL.

This article can't provide an exhaustive guide for troubleshooting FRS or DFS-R, but the following links may be useful:


Clock Skew
By default, if the time on an affected machine is different from the time on a DC by more than five minutes when corrected for time-zone differences, that machine will be unable to authenticate with the DC and will therefore be unable to process Group Policy. Domain members should be configured to synchronize their clocks with a DC, and DCs in turn should synchronize their clocks with the DC holding the PDC Emulator role. For this reason, the PDC Emulator should be the only machine in a domain configured to synchronize with an external source, such as a public NTP server.

More information on configuring the Windows Time service is available here.

Missing Group Policy Files
One or more Group Policy files may have been deleted from their storage location in SYSVOL. The easiest way to check this is to open SYSVOL\domain\Policies in Windows Explorer and check for the specific files mentioned in the Userenv errors that appear on affected machines. The files for each GPO are located in a subfolder of the Policies folder. Each subfolder is named after the GUID of the GPO whose files it contains.

If policy files are found to be missing from all DCs, they can be restored from a backup. If the Default Domain Policy or Default Domain Controller Policy files are missing and no backup is available, the dcgpofix command can restore both policies to their default settings. More information about dcgpofix can be found in this article.




Quick Tips content is self-published by the Dell Support Professionals who resolve issues daily. In order to achieve a speedy publication, Quick Tips may represent only partial solutions or work-arounds that are still in development or pending further proof of successfully resolving an issue. As such Quick Tips have not been reviewed, validated or approved by Dell and should be used with appropriate caution. Dell shall not be liable for any loss, including but not limited to loss of data, loss of profit or loss of revenue, which customers may incur by following any procedure or advice set out in the Quick Tips.

Artikel-ID: SLN163816

Datum der letzten Änderung: 09/05/2014 02:07 PM


Diesen Artikel bewerten

Präzise
Nützlich
Leicht verständlich
War dieser Artikel hilfreich?
Ja Nein
Schicken Sie uns Ihr Feedback.
Die folgenden Sonderzeichen dürfen in Kommentaren nicht verwendet werden: <>()\
Derzeit ist kein Zugriff auf das Feedbacksystem möglich. Bitte versuchen Sie es später erneut.

Vielen Dank für Ihr Feedback.