First published on TechNet on Apr 18, 2017
Hi this is Michael from the PMC PFE Team, I recently helped a customer during the implementation of their Windows Server 2016 systems. When checking the Event viewer, we spotted a well-known Event ID: Log Name: Application Source: SceCli Date: 08.03.2017 17:49:21 Event ID: 1202 Task Category: None Level: Warning Keywords: Classic User: N/A Computer: test2016.mydomain.com Description: Security policies were propagated with warning. 0x534 : No mapping between account names and security IDs was done. Advanced help for this problem is available on http://support.microsoft.com . Query for "troubleshooting 1202 events". Error 0x534 occurs when a user account in one or more Group Policy objects (GPOs) could not be resolved to a SID. This error is possibly caused by a mistyped or deleted user account referenced in either the User Rights or Restricted Groups branch of a GPO. To resolve this event, contact an administrator in the domain to perform the following actions:
So, okay Event 1202 Sid-to-Name mapping issue. Sure enough there was some security principal in either one of the settings or at the delegation tab on one of the policies which couldn't get resolved. So let's have a look at the Winlogon.log as called out in the event description. We went to %SYSTEMROOT%\Security\Logs\ and then "Dude, where's the Winlogon.log!" We quickly checked if the path may have changed in Server 2016 but couldn't find the log in any other directory. Then we checked how this was enabled / disabled on earlier OS versions. https://msdn.microsoft.com/de-de/library/cc775423(v=ws.10).aspx HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F79F83A} Key name: ExtensionDebugLevel Typ: DWORD Data: 0x2 Okay, so it is not enabled by default on Windows 10 and Server 2016. We enabled the debug log but still after a "gpupdate / force" and a reboot NO winlogon.log file was present. What's wrong? Well actually nothing…. Here's why… We are talking about a CSE (Client side extension) which is repented by that GUID "{827D319E-6EAC-11D2-A4EA-00C04F79F83A}" ; We did a change in the registry which is only triggers when the CSE is run the next time…. But when there are NO changes to the GPO why should the CSE re-run the respective policy? Exactly,…there is no reason. This has always been the case, the code apparently didn't change since 2008 but the log just happens to be enabled by default. So, dude what do we have to do to get the Winlogon.log file back? There are a few methods available and I'm listing them in the preferred order of applicability:
In any case, please make sure you undo the changes you've done for troubleshooting! Winlogon.log is a debugging file which you should enable if needed to find and fix your issues but then disable it later again. Same for the NoListChanges, please make sure that you revert this change back! Hope you enjoyed the post and it saves you some time in finding the Winlogon.log file now. Regards, Michael
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.