none
Erforderliche Active Directory -Struktur wurde nicht erstellt SBS2003 to SB2008 Migration RRS feed

  • Frage

  • Hallo ZUusammen,

    wir haben folgendes Problem:

    wir möchten ein SBS2003 in SBS2008 migrieren. Alle Voraussetzungen für eine erfolgreiche Migration wurde auf dem Quellserver durchgeführt. Nach dem die Installation anhand der Antwortdatei durchgeführt wird, können wir leider nicht die Migration Wizard starten,da der Assistent ein Installationsfehler gefunden hat. Unter der SBS Console des SBS2008 kann man den Fehler anhand der Wizard nicht beheben.

    Folgende Meldung wird angezeigt, wenn man es beheben möchte:

    "Erforderliche Active Directory -Struktur wurde nicht erstellt"

    "Eine Remotedesktopdatei, die es dem Benutzer ermöglicht,über die Terminaldienste von Remotestandort auf dem Server zuzugreifen, konnte nicht erstellt werden"

     

    Ich werde für jeden Tipp sehr dankbar.

     

    Gruß

     

    Ahmet

     

    Montag, 26. Juli 2010 17:03

Alle Antworten

  • Hi Ahmet,
     
    > wir haben folgendes Problem:
    >
    > wir möchten ein SBS2003 in SBS2008 migrieren. Alle Voraussetzungen für
    > eine erfolgreiche
    > Migration wurde auf dem Quellserver durchgeführt. Nach dem die
    > Installation anhand der
    > Antwortdatei durchgeführt wird, können wir leider nicht die Migration
    > Wizard starten,da der
    > Assistent ein Installationsfehler gefunden hat. Unter der SBS Console des
    > SBS2008 kann
    > man den Fehler anhand der Wizard nicht beheben.
    >
    > Folgende Meldung wird angezeigt, wenn man es beheben möchte:
    >
    > "Erforderliche Active Directory -Struktur wurde nicht erstellt"
    > "Eine Remotedesktopdatei, die es dem Benutzer ermöglicht,über die
    > Terminaldienste von
    > Remotestandort auf dem Server zuzugreifen, konnte nicht erstellt werden"
     
    untersuche bitte einmal folgende Log-Dateien auf dem SBS 2008 nach Fehlern
    und poste uns die relevanten Ausschnitte:
     
    Pfad:
    C:\Program Files\Windows Small Business Server\Logs
     
    Dateien:
    SBSSetup.log - Logs all events that occurred during SBS setup
    ERRORLOG.TXT - Logs any errors that occurred during SBS setup
    ExtSchemaTask.log - Logs result of SBS AD schema additions
    GPOTask.log - Logs the creation of the SBS Group Policy objects
    FinishSetup.log - Logs the completion of the SBS 2008 install
     
    Source:
    http://blogs.technet.com/b/sbs/archive/2008/10/01/key-small-business-server-2008-log-files.aspx
     
     
    Tipp: Vor der Migration:
     
    + Vollständiges Backup (ggf. zusätzlich ein Offline Image) des SBS 2003 (für
    notwendiges Rollback nach fehlerhafter Migration) anlegen
    + Die bestehende Infrastruktur mittels "SBS 2003 BPA"* und "IT Health
    Scanner"* analysieren und sämtliche Fehler und Warnungen VOR der Migration
    bearbeiten
     
    S.a.:
    http://blogs.technet.com/b/sbs/archive/2009/02/19/sbs-2008-migrations-from-sbs-2003-keys-to-success.aspx
     
     
    * Tools:
     
    Microsoft Windows Small Business Server 2003 Best Practices Analyzer
    http://www.microsoft.com/downloads/details.aspx?FamilyId=3874527A-DE19-49BB-800F-352F3B6F2922
     
    Microsoft IT Environment Health Scanner
    http://www.microsoft.com/downloads/details.aspx?FamilyID=dd7a00df-1a5b-4fb6-a8a6-657a7968bd11
     
    --
    Tobias Redelberger
    StarNET Services (HomeOffice)
    Frankfurter Allee 193
    D-10365 Berlin
    Tel: +49 (30) 86 87 02 678
    Mobil: +49 (163) 84 74 421
    Email: T.Redelberger@starnet-services.net
    Web: http://www.starnet-services.net
     
     
     
    Dienstag, 27. Juli 2010 08:35
    Moderator
  • Hallo Tobias,

     

    erstmal vielen Dank für deine schnelle Antwort.

     

    Anbei die Logdaten:

     

    Errors.log

    TaskSetupAdminTemplates: Die erforderliche Active Directory-Struktur wurde nicht erstellt.


    ExtSchemaTask.log

    Verbindung mit "SRV-011.mvz-fdf.local" wird hergestellt.
    Anmelden als aktueller Benutzer unter Verwendung von SSPI
    Das Verzeichnis wird aus der Datei "C:\Program Files\Windows Small Business Server\Data\sbsuser.ldf" importiert.
    Die Eintr„ge werden geladen.20 Eintr„ge wurden erfolgreich ge„ndert.

    Der Befehl wurde einwandfrei durchgeführt.

     

     

    FinishSetup.log

    [5128] 100726.162352.9059: Setup: Initializing...C:\Program Files\Windows Small Business Server\Bin\FinishSetup.exe
    [5128] 100726.162353.8125: Setup: *****************************************************
    [5128] 100726.162353.8125: Setup: Begin Finish Setup
    [5128] 100726.162355.4849: Setup: The current Setup state is: Fail
    [5128] 100726.162414.9443: Setup: User clicked button 1
    [5128] 100726.162414.9755: Setup: Launched the Setup Issues, will now exit....
    [5128] 100726.162415.0535: Setup: Preparing to change the Scheduled Tasks
    [5128] 100726.162415.1160: Setup: Creating elevated login task with source=Console, path=Microsoft\Windows\Windows Small Business Server 2008\Console, description=Task zum Starten der Windows SBS Console bei der Anmeldung., and targetpath=C:\Program Files\Windows Small Business Server\Bin\Console.exe
    [5128] 100726.162415.4594: Setup: Added the console as a scheduled task.
    [5128] 100726.162415.4906: Setup: Removed ourselves from the scheduled task.
    [5128] 100726.162415.4906: Setup: Exiting normally

     

    Log Daten folgen...

     

    Gruß

     

    Ahmet Mor

     

     

     

    Donnerstag, 29. Juli 2010 08:40
  • hier die restlichen Log's

    GPOTasks.log

    hier die restlichen Log's
    
    
    GPOTasks.log
    
    
    
    26.07.2010 16:16
    The config file is C:\Users\Administrator.MVZ-FDF\AppData\Local\Temp\tmp805F.tmp
    Enter GPOTask::LoadPolicyFromXML( C:\Users\Administrator.MVZ-FDF\AppData\Local\Temp\tmp805F.tmp )
    Enter GPOTask:GPOTask( (null) )
    CoCreateInstance
    Call GetDomainNamingContext()
    Enter GPOTask::GetDomainNamingContext()
    GetComputerNameEx
    DomainName is mvz-fdf.local
    Enter GetNamingContext(mvz-fdf.local,defaultNamingContext)
    the valus is DC=mvz-fdf,DC=local
    
    unbind return 0
    
    Leave GetNamingContext
    The Computer Object DN is DC=mvz-fdf,DC=local
    Leave GetDomainNamingContext returned 0
    GetDomainNamingContext succeed
    Leave GPOTask::GPOTask()
    Enter GPOTask::LoadWMIFilterList(...)
    Name = Windows SBS Client
    ID = 3
    Rule = select * from Win32_OperatingSystem Where ProductType!=2
    pGPMWMIFilterCollection get_Count return 3
    GetWMIFilterGPOAttachString (null)
    GetWMIFilterGPOAttachString (null)
    Enter GPOTask::AddWMIFilter(Windows SBS Client,select * from Win32_OperatingSystem Where ProductType!=2)
    Leave GPOTask::AddWMIFilter
    Name = Windows SBS Client - Windows Vista
    ID = 2
    Rule = select * from Win32_OperatingSystem Where Version>='6.0.6000'
    pGPMWMIFilterCollection get_Count return 4
    GetWMIFilterGPOAttachString (null)
    GetWMIFilterGPOAttachString [mvz-fdf.local;{AFEAFABC-4376-4D2A-8C19-C931757AFB80};0]
    Enter GPOTask::AddWMIFilter(Windows SBS Client - Windows Vista,select * from Win32_OperatingSystem Where Version>='6.0.6000')
    Leave GPOTask::AddWMIFilter
    Name = Windows SBS Client - Windows XP
    ID = 1
    Rule = select * from Win32_OperatingSystem Where Version>='5.1.2600' and '6.0.6000'>Version and ServicePackMajorVersion>=2
    pGPMWMIFilterCollection get_Count return 5
    GetWMIFilterGPOAttachString (null)
    GetWMIFilterGPOAttachString [mvz-fdf.local;{AAE96B41-8077-416F-83F7-0DAD63520851};0]
    Enter GPOTask::AddWMIFilter(Windows SBS Client - Windows XP,select * from Win32_OperatingSystem Where Version>='5.1.2600' and '6.0.6000'>Version and ServicePackMajorVersion>=2)
    Leave GPOTask::AddWMIFilter
    Leave GPOTask::LoadWMIFilterList
    [mvz-fdf.local;{AFEAFABC-4376-4D2A-8C19-C931757AFB80};0]
    [mvz-fdf.local;{AAE96B41-8077-416F-83F7-0DAD63520851};0]
    [mvz-fdf.local;{584D0D43-0014-4D98-AF8B-5B60DC53573B};0]
    Name = Windows SBS CSE Policy
    Container =
    FilterID = 3
    Enable = 1
    Enforce = 1
    SaveREG = SBSCSE
    IEM = 0
    Enter GPOTask:InitGPO( Windows SBS CSE Policy )
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    DisplayName is Windows SBS CSE Policy
    New path is DC=mvz-fdf,DC=local
    GROUPPolicy Created Succeed using Windows SBS CSE Policy
    Get Path LDAP://CN={7924AD43-E511-4EA9-BBD5-F2F6CF4653DD},CN=Policies,CN=System,DC=mvz-fdf,DC=local
    Leave GPOTask::InitGPO()
    Enter GPOTask::LinkWMIFilterFromArray(...)
    Enter GPOTask::LinkWMIFilter( [mvz-fdf.local;{AFEAFABC-4376-4D2A-8C19-C931757AFB80};0] )
    Leave GPOTask::LinkWMIFilter()
    Leave GPOTask::LinkWMIFilterFromArray
    Name = Run_Startup_Script_Sync
    Path = Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System
    Key = RunStartupScriptSync
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Enter GPOTask::CreateGPOLink(,b)
    Enter GPOTask:;CreateGPOLinkWithEnforce( LDAP://DC=mvz-fdf,DC=local, b)
    ADsGetObject DSPath is LDAP://DC=mvz-fdf,DC=local
    Old link is [LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={1DDDAD85-7ED3-4B18-97AF-032DDA882B90},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={F20AE47A-345C-4860-BB2C-1460CBEB63BE},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={BCCA24EA-4ACF-466C-B487-C3C5729F6E88},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={C9EC74F7-359D-4E68-A230-AB9DC2195857},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={10752372-24C0-43D9-AD82-0C579E756E12},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={CE79C713-B5CC-4053-B14D-09B3252E4C74},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0][LDAP://CN={BD9E0AF0-F55B-4CF5-913A-59E13733DFD9},CN=Policies,CN=System,DC=mvz-fdf,DC=local;0]
    New Link is [LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={1DDDAD85-7ED3-4B18-97AF-032DDA882B90},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={F20AE47A-345C-4860-BB2C-1460CBEB63BE},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BCCA24EA-4ACF-466C-B487-C3C5729F6E88},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={C9EC74F7-359D-4E68-A230-AB9DC2195857},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={10752372-24C0-43D9-AD82-0C579E756E12},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={CE79C713-B5CC-4053-B14D-09B3252E4C74},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BD9E0AF0-F55B-4CF5-913A-59E13733DFD9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={7924AD43-E511-4EA9-BBD5-F2F6CF4653DD},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    Leave GPOTask::CreateGPOLinkWithEnforce
    Leave GPOTask::CreateGPOLink
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    Name = Windows SBS User Policy
    Container =
    FilterID = 3
    Enable = 1
    Enforce = 1
    SaveREG = ALLSBSUsers
    IEM = 1
    Enter GPOTask:InitGPO( Windows SBS User Policy )
    DisplayName is Windows SBS User Policy
    New path is DC=mvz-fdf,DC=local
    GROUPPolicy Created Succeed using Windows SBS User Policy
    Get Path LDAP://CN={7A81D3F8-8A40-4E76-9B65-7E55DA99BB19},CN=Policies,CN=System,DC=mvz-fdf,DC=local
    Leave GPOTask::InitGPO()
    Enter GPOTask::AddExt( [{A2E30F80-D7DE-11D2-BBDE-00C04F86AE3B}{FC715823-C5FB-11D1-9EEF-00A0C90347FF}] )
    GET gPCUserExtensionNames
    Leave GPOTask::AddExt()
    Enter GPOTask::LinkWMIFilterFromArray(...)
    Enter GPOTask::LinkWMIFilter( [mvz-fdf.local;{AFEAFABC-4376-4D2A-8C19-C931757AFB80};0] )
    Leave GPOTask::LinkWMIFilter()
    Leave GPOTask::LinkWMIFilterFromArray
    Name = Trun_Off_Phishing
    Path = Software\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter
    Key = Enabled
    ValueType = REG_DWORD
    Value = 2
    Location = User
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = IE_NoFirstRunCustomise
    Path = Software\\Policies\\Microsoft\\Internet Explorer\\Main
    Key = DisableFirstRunCustomize
    ValueType = REG_DWORD
    Value = 1
    Location = User
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Enter GPOTask::CreateGPOLink(,b)
    Enter GPOTask:;CreateGPOLinkWithEnforce( LDAP://DC=mvz-fdf,DC=local, b)
    ADsGetObject DSPath is LDAP://DC=mvz-fdf,DC=local
    Old link is [LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={1DDDAD85-7ED3-4B18-97AF-032DDA882B90},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={F20AE47A-345C-4860-BB2C-1460CBEB63BE},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BCCA24EA-4ACF-466C-B487-C3C5729F6E88},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={C9EC74F7-359D-4E68-A230-AB9DC2195857},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={10752372-24C0-43D9-AD82-0C579E756E12},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={CE79C713-B5CC-4053-B14D-09B3252E4C74},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BD9E0AF0-F55B-4CF5-913A-59E13733DFD9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={7924AD43-E511-4EA9-BBD5-F2F6CF4653DD},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    New Link is [LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={1DDDAD85-7ED3-4B18-97AF-032DDA882B90},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={F20AE47A-345C-4860-BB2C-1460CBEB63BE},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BCCA24EA-4ACF-466C-B487-C3C5729F6E88},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={C9EC74F7-359D-4E68-A230-AB9DC2195857},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={10752372-24C0-43D9-AD82-0C579E756E12},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={CE79C713-B5CC-4053-B14D-09B3252E4C74},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={BD9E0AF0-F55B-4CF5-913A-59E13733DFD9},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={7924AD43-E511-4EA9-BBD5-F2F6CF4653DD},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2][LDAP://CN={7A81D3F8-8A40-4E76-9B65-7E55DA99BB19},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    Leave GPOTask::CreateGPOLinkWithEnforce
    Leave GPOTask::CreateGPOLink
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    Name = Windows SBS Client Policy
    Container = OU=SBSComputers,OU=Computers,OU=MyBusiness
    FilterID = 0
    Enable = 1
    Enforce = 1
    SaveREG = ALLClients
    IEM = 0
    Enter GPOTask:InitGPO( Windows SBS Client Policy )
    DisplayName is Windows SBS Client Policy
    New path is DC=mvz-fdf,DC=local
    GROUPPolicy Created Succeed using Windows SBS Client Policy
    Get Path LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=Policies,CN=System,DC=mvz-fdf,DC=local
    Leave GPOTask::InitGPO()
    Enter GPOTask::LinkWMIFilterFromArray(...)
    Leave GPOTask::LinkWMIFilterFromArray
    Name = OutLook_recovery
    Path = SOFTWARE\\Microsoft\\Exchange\\Client\\Options
    Key = DumpsterAlwaysOn
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_EnableFirewall_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile
    Key = EnableFirewall
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = SecurityCenter
    Path = Software\\Policies\\Microsoft\\Windows NT\\Security Center
    Key = SecurityCenterInDomain
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = TS_Enabled
    Path = Software\\Policies\\Microsoft\\Windows NT\\Terminal Services
    Key = fDenyTSConnections
    ValueType = REG_DWORD
    Value = 0
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = RAUnSolicited_Enabled
    Path = Software\\Policies\\Microsoft\\Windows NT\\Terminal Services
    Key = fAllowUnsolicited
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = RAUnSolicitedFullCtrl_Enabled
    Path = Software\\Policies\\Microsoft\\Windows NT\\Terminal Services
    Key = fAllowUnsolicitedFullControl
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = NLA_Enabled
    Path = Software\\Policies\\Microsoft\\Windows NT\\Terminal Services
    Key = UserAuthentication
    ValueType = REG_DWORD
    Value = 0
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Enter GPOTask::CreateGPOLink(OU=SBSComputers,OU=Computers,OU=MyBusiness,b)
    Enter GPOTask:;CreateGPOLinkWithEnforce( LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local, b)
    ADsGetObject DSPath is LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local
    Old link is [LDAP://cn={3AD7533C-F462-455D-AD6A-8DE29752D9DB},cn=policies,cn=system,DC=mvz-fdf,DC=local;0][LDAP://cn={AF1428AC-CFDF-4539-9952-478988A6A6D7},cn=policies,cn=system,DC=mvz-fdf,DC=local;0][LDAP://cn={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},cn=policies,cn=system,DC=mvz-fdf,DC=local;0]
    New Link is [LDAP://CN={3AD7533C-F462-455D-AD6A-8DE29752D9DB},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={AF1428AC-CFDF-4539-9952-478988A6A6D7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    Leave GPOTask::CreateGPOLinkWithEnforce
    Leave GPOTask::CreateGPOLink
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    Name = Windows SBS Client - Windows XP Policy
    Container = OU=SBSComputers,OU=Computers,OU=MyBusiness
    FilterID = 1
    Enable = 1
    Enforce = 1
    SaveREG = (null)
    IEM = 0
    Enter GPOTask:InitGPO( Windows SBS Client - Windows XP Policy )
    DisplayName is Windows SBS Client - Windows XP Policy
    New path is DC=mvz-fdf,DC=local
    GROUPPolicy Created Succeed using Windows SBS Client - Windows XP Policy
    Get Path LDAP://CN={73130DA0-4EC6-4A5C-AA3A-053C9387AF1D},CN=Policies,CN=System,DC=mvz-fdf,DC=local
    Leave GPOTask::InitGPO()
    Enter GPOTask::LinkWMIFilterFromArray(...)
    Enter GPOTask::LinkWMIFilter( [mvz-fdf.local;{584D0D43-0014-4D98-AF8B-5B60DC53573B};0] )
    Leave GPOTask::LinkWMIFilter()
    Leave GPOTask::LinkWMIFilterFromArray
    Name = WF_AllowRemoteAdmin_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\RemoteAdminSettings
    Key = Enabled
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowRemoteAdminScope_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\RemoteAdminSettings
    Key = RemoteAddresses
    ValueType = REG_SZ
    Value = localsubnet
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedPrograms_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\AuthorizedApplications
    Key = Enabled
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedSessmgr_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\AuthorizedApplications\List
    Key = %windir%\system32\sessmgr.exe:*:Enabled:Remote Assistance
    ValueType = REG_SZ
    Value = %windir%\system32\sessmgr.exe:*:Enabled:Remote Assistance
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedHelpsvc_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\AuthorizedApplications\List
    Key = %windir%\PCHealth\HelpCtr\Binaries\Helpsvc.exe:*:Enabled::Offer Remote Assistance
    ValueType = REG_SZ
    Value = %windir%\PCHealth\HelpCtr\Binaries\Helpsvc.exe:*:Enabled:Offer Remote Assistance
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedHelpctr_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\AuthorizedApplications\List
    Key = %windir%\PCHealth\HelpCtr\Binaries\Helpctr.exe:*:Enabled:Remote Assistance - Windows Messenger and Voice
    ValueType = REG_SZ
    Value = %windir%\PCHealth\HelpCtr\Binaries\Helpctr.exe:*:Enabled:Remote Assistance - Windows Messenger and Voice
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedProgramsLocal_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\AuthorizedApplications
    Key = AllowUserPrefMerge
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedFilePrinter_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\Services\\FileAndPrint
    Key = Enabled
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedFilePrinterScope_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\Services\\FileAndPrint
    Key = RemoteAddresses
    ValueType = REG_SZ
    Value = localsubnet
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WS_RemoteDesktop_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\Services\\RemoteDesktop
    Key = Enabled
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WS_RemoteDesktopScope_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\Services\\RemoteDesktop
    Key = RemoteAddresses
    ValueType = REG_SZ
    Value = localsubnet
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_OpenPorts_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\GloballyOpenPorts
    Key = Enabled
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_OpenPortTCP_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\GloballyOpenPorts\\List
    Key = 135:TCP:*:Enabled:Offer Remote Assistance - Port
    ValueType = REG_SZ
    Value = 135:TCP:*:Enabled:Offer Remote Assistance - Port
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WS_OpenPortsLocal_Domain
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\DomainProfile\\GloballyOpenPorts
    Key = AllowUserPrefMerge
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_EnableFirewall_Name_Std
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\StandardProfile
    Key = EnableFirewall
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WF_AllowedProgramsLocal_Std
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\StandardProfile\\AuthorizedApplications
    Key = AllowUserPrefMerge
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = WS_OpenPortsLocal_std
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\StandardProfile\\GloballyOpenPorts
    Key = AllowUserPrefMerge
    ValueType = REG_DWORD
    Value = 1
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Enter GPOTask::CreateGPOLink(OU=SBSComputers,OU=Computers,OU=MyBusiness,b)
    Enter GPOTask:;CreateGPOLinkWithEnforce( LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local, b)
    ADsGetObject DSPath is LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local
    Old link is [LDAP://CN={3AD7533C-F462-455D-AD6A-8DE29752D9DB},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={AF1428AC-CFDF-4539-9952-478988A6A6D7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    New Link is [LDAP://CN={3AD7533C-F462-455D-AD6A-8DE29752D9DB},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={AF1428AC-CFDF-4539-9952-478988A6A6D7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2][LDAP://CN={73130DA0-4EC6-4A5C-AA3A-053C9387AF1D},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    Leave GPOTask::CreateGPOLinkWithEnforce
    Leave GPOTask::CreateGPOLink
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    Name = Windows SBS Client - Windows Vista Policy
    Container = OU=SBSComputers,OU=Computers,OU=MyBusiness
    FilterID = 2
    Enable = 1
    Enforce = 1
    SaveREG = VISTA
    IEM = 0
    Enter GPOTask:InitGPO( Windows SBS Client - Windows Vista Policy )
    DisplayName is Windows SBS Client - Windows Vista Policy
    New path is DC=mvz-fdf,DC=local
    GROUPPolicy Created Succeed using Windows SBS Client - Windows Vista Policy
    Get Path LDAP://CN={84A62A3F-E714-43C8-9AF7-72B109C91DE7},CN=Policies,CN=System,DC=mvz-fdf,DC=local
    Leave GPOTask::InitGPO()
    Enter GPOTask::LinkWMIFilterFromArray(...)
    Enter GPOTask::LinkWMIFilter( [mvz-fdf.local;{AAE96B41-8077-416F-83F7-0DAD63520851};0] )
    Leave GPOTask::LinkWMIFilter()
    Leave GPOTask::LinkWMIFilterFromArray
    Name = PolicyVersion
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall
    Key = PolicyVersion
    ValueType = REG_DWORD
    Value = 512
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Destination Unreachable (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-DU-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=1:*|App=System|Name=@FirewallAPI.dll,-25110|Desc=@FirewallAPI.dll,-25112|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP4-DUFRAG-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=1|Profile=Domain|ICMP4=3:4|App=System|Name=@FirewallAPI.dll,-25251|Desc=@FirewallAPI.dll,-25257|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Dynamic Host Configuration Protocol (DHCP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-DHCP-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|LPort=68|RPort=67|App=%SystemRoot%\system32\svchost.exe|Svc=dhcp|Name=@FirewallAPI.dll,-25301|Desc=@FirewallAPI.dll,-25303|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Internet Group Management Protocol (IGMP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-IGMP-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=2|Profile=Domain|App=System|Name=@FirewallAPI.dll,-25376|Desc=@FirewallAPI.dll,-25382|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - IPv6 (IPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-IPv6-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=41|Profile=Domain|App=System|Name=@FirewallAPI.dll,-25351|Desc=@FirewallAPI.dll,-25357|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Done (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LD-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=132:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25082|Desc=@FirewallAPI.dll,-25088|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Query (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LQ-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=130:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25061|Desc=@FirewallAPI.dll,-25067|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Report (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LR-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=131:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25068|Desc=@FirewallAPI.dll,-25074|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Report v2 (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LR2-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=143:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25075|Desc=@FirewallAPI.dll,-25081|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Neighbor Discovery Advertisement (ICMPv6-In
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-NDA-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=136:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25026|Desc=@FirewallAPI.dll,-25032|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Neighbor Discovery Solicitation (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-NDS-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=135:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25019|Desc=@FirewallAPI.dll,-25025|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Packet Too Big (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-PTB-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=2:*|App=System|Name=@FirewallAPI.dll,-25001|Desc=@FirewallAPI.dll,-25007|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Parameter Problem (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-PP-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=4:*|App=System|Name=@FirewallAPI.dll,-25116|Desc=@FirewallAPI.dll,-25118|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Router Advertisement (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-RA-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=134:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25012|Desc=@FirewallAPI.dll,-25018|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Teredo (UDP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-Teredo-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|LPort=Teredo|App=%SystemRoot%\system32\svchost.exe|Svc=iphlpsvc|Name=@FirewallAPI.dll,-25326|Desc=@FirewallAPI.dll,-25332|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Time Exceeded (ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-TE-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=3:*|App=System|Name=@FirewallAPI.dll,-25113|Desc=@FirewallAPI.dll,-25115|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Destination Unreachable (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-DU-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=1:*|App=System|Name=@FirewallAPI.dll,-25111|Desc=@FirewallAPI.dll,-25112|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP4-DUFRAG-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=1|Profile=Domain|ICMP4=3:4|App=System|Name=@FirewallAPI.dll,-25252|Desc=@FirewallAPI.dll,-25257|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Dynamic Host Configuration Protocol (DHCP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-DHCP-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|LPort=68|RPort=67|App=%SystemRoot%\system32\svchost.exe|Svc=dhcp|Name=@FirewallAPI.dll,-25302|Desc=@FirewallAPI.dll,-25303|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Internet Group Management Protocol (IGMP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-IGMP-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=2|Profile=Domain|App=System|Name=@FirewallAPI.dll,-25377|Desc=@FirewallAPI.dll,-25382|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - IPv6 (IPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-IPv6-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=41|Profile=Domain|App=System|Name=@FirewallAPI.dll,-25352|Desc=@FirewallAPI.dll,-25357|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Done (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LD-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=132:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25083|Desc=@FirewallAPI.dll,-25088|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Query (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LQ-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=130:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25062|Desc=@FirewallAPI.dll,-25067|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Report (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LR-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=131:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25069|Desc=@FirewallAPI.dll,-25074|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Multicast Listener Report v2 (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-LR2-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=143:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25076|Desc=@FirewallAPI.dll,-25081|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-NDA-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=136:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25027|Desc=@FirewallAPI.dll,-25032|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-NDS-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=135:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25020|Desc=@FirewallAPI.dll,-25025|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Packet Too Big (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-PTB-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=2:*|App=System|Name=@FirewallAPI.dll,-25002|Desc=@FirewallAPI.dll,-25007|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Parameter Problem (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-PP-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=4:*|App=System|Name=@FirewallAPI.dll,-25117|Desc=@FirewallAPI.dll,-25118|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Router Advertisement (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-RA-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=134:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25013|Desc=@FirewallAPI.dll,-25018|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Teredo (UDP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-Teredo-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|App=%SystemRoot%\system32\svchost.exe|Svc=iphlpsvc|Name=@FirewallAPI.dll,-25327|Desc=@FirewallAPI.dll,-25333|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Time Exceeded (ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-TE-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=3:*|App=System|Name=@FirewallAPI.dll,-25114|Desc=@FirewallAPI.dll,-25115|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = CoreNet Networking - Group Policy (LSASS-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-GP-LSASS-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\lsass.exe|Name=@FirewallAPI.dll,-25407|Desc=@FirewallAPI.dll,-25408|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = CoreNet Networking - Group Policy (TCP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-GP-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\svchost.exe|Name=@FirewallAPI.dll,-25403|Desc=@FirewallAPI.dll,-25404|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = CoreNet Networking - Group Policy (NB-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-GP-NP-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|Name=@FirewallAPI.dll,-25401|Desc=@FirewallAPI.dll,-25401|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - Router Solicitation (ICMP6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-ICMP6-RS-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=133:*|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-25008|Desc=@FirewallAPI.dll,-25011|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Core Networking - DNS (UDP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = CoreNet-DNS-Out-UDP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|RPort=53|App=%SystemRoot%\system32\svchost.exe|Svc=dnscache|Name=@FirewallAPI.dll,-25405|Desc=@FirewallAPI.dll,-25406|EmbedCtxt=@FirewallAPI.dll,-25000|Edge=FALSE|LSM=TRUE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Echo Request - ICMPv4-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-ICMP4-ERQ-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=1|Profile=Domain|ICMP4=8:*|Name=@FirewallAPI.dll,-28543|Desc=@FirewallAPI.dll,-28547|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Echo Request - ICMPv6-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-ICMP6-ERQ-In
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Domain|ICMP6=128:*|Name=@FirewallAPI.dll,-28545|Desc=@FirewallAPI.dll,-28547|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Datagram-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Datagram-In-UDP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|LPort=138|App=System|Name=@FirewallAPI.dll,-28527|Desc=@FirewallAPI.dll,-28530|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Name-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Name-In-UDP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|LPort=137|App=System|Name=@FirewallAPI.dll,-28519|Desc=@FirewallAPI.dll,-28522|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Session-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Session-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=139|App=System|Name=@FirewallAPI.dll,-28503|Desc=@FirewallAPI.dll,-28506|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (SMB-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-SMB-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|Name=@FirewallAPI.dll,-28511|Desc=@FirewallAPI.dll,-28514|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Spooler Service - RPC)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-SpoolSvc-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\system32\spoolsv.exe|Svc=Spooler|Name=@FirewallAPI.dll,-28535|Desc=@FirewallAPI.dll,-28538|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Spooler Service - RPC-EPMAP)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-RPCSS-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|Svc=Rpcss|Name=@FirewallAPI.dll,-28539|Desc=@FirewallAPI.dll,-28542|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Echo Request - ICMPv4-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-ICMP4-ERQ-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=1|Profile=Domain|ICMP4=8:*|Name=@FirewallAPI.dll,-28544|Desc=@FirewallAPI.dll,-28547|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (Echo Request - ICMPv6-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-ICMP6-ERQ-Out
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=128:*|Name=@FirewallAPI.dll,-28546|Desc=@FirewallAPI.dll,-28547|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Datagram-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Datagram-Out-UDP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|RPort=138|App=System|Name=@FirewallAPI.dll,-28531|Desc=@FirewallAPI.dll,-28534|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Name-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Name-Out-UDP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|RPort=137|App=System|Name=@FirewallAPI.dll,-28523|Desc=@FirewallAPI.dll,-28526|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (NB-Session-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-NB_Session-Out-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RPort=139|App=System|Name=@FirewallAPI.dll,-28507|Desc=@FirewallAPI.dll,-28510|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = File and Printer Sharing (SMB-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = FPS-SMB-Out-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|Name=@FirewallAPI.dll,-28515|Desc=@FirewallAPI.dll,-28518|EmbedCtxt=@FirewallAPI.dll,-28502|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (DCOM-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-DCOM-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\system32\svchost.exe|Svc=rpcss|Name=@FirewallAPI.dll,-33035|Desc=@FirewallAPI.dll,-33036|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (UPnPHost-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-UPnPHost-In-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-33027|Desc=@FirewallAPI.dll,-33030|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (SSDP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-SSDPSrv-In-UDP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\system32\svchost.exe|Svc=Ssdpsrv|Name=@FirewallAPI.dll,-33019|Desc=@FirewallAPI.dll,-33022|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (TCP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-In-TCP-EdgeScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\msra.exe|Name=@FirewallAPI.dll,-33003|Desc=@FirewallAPI.dll,-33006|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (RA Server TCP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-RAServer-In-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\raserver.exe|Name=@FirewallAPI.dll,-33011|Desc=@FirewallAPI.dll,-33014|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (UPnPHost-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-UPnPHost-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RA4=LocalSubnet|RA6=LocalSubnet|App=System|Name=@FirewallAPI.dll,-33031|Desc=@FirewallAPI.dll,-33034|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (UPnP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-UPnP-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\system32\svchost.exe|Svc=upnphost|Name=@FirewallAPI.dll,-33037|Desc=@FirewallAPI.dll,-33038|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (SSDP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-SSDPSrv-Out-UDP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\system32\svchost.exe|Svc=Ssdpsrv|Name=@FirewallAPI.dll,-33023|Desc=@FirewallAPI.dll,-33026|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (TCP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-Out-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\msra.exe|Name=@FirewallAPI.dll,-33007|Desc=@FirewallAPI.dll,-33010|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Remote Assistance (RA Server TCP-Out)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteAssistance-RAServer-Out-TCP-NoScope
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\raserver.exe|Name=@FirewallAPI.dll,-33015|Desc=@FirewallAPI.dll,-33018|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = RemoteDesktop (TCP-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = RemoteDesktop-In-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=3389|App=System|Name=@FirewallAPI.dll,-28753|Desc=@FirewallAPI.dll,-28756|EmbedCtxt=@FirewallAPI.dll,-28752|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Windows Management Instrumentation (ASync-In)
    Path = SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules
    Key = WMI-ASYNC-In-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%systemroot%\system32\wbem\unsecapp.exe|Name=@FirewallAPI.dll,-34256|Desc=@FirewallAPI.dll,-34257|EmbedCtxt=@FirewallAPI.dll,-34251|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Windows Management Instrumentation (DCOM-In)
    Path = SOFTWARE\\Policies\Microsoft\\WindowsFirewall\\FirewallRules
    Key = WMI-RPCSS-In-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%SystemRoot%\system32\svchost.exe|Svc=rpcss|Name=@FirewallAPI.dll,-34252|Desc=@FirewallAPI.dll,-34253|EmbedCtxt=@FirewallAPI.dll,-34251|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = Windows Management Instrumentation (DCOM-In)
    Path = SOFTWARE\\Policies\Microsoft\\WindowsFirewall\\FirewallRules
    Key = WMI-WINMGMT-In-TCP
    ValueType = REG_SZ
    Value = v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\system32\svchost.exe|Svc=winmgmt|Name=@FirewallAPI.dll,-34254|Desc=@FirewallAPI.dll,-34255|EmbedCtxt=@FirewallAPI.dll,-34251|Edge=FALSE|
    Location = Machine
    Enter GetRegType(REG_SZ)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Name = AcSystemSleep
    Path = SOFTWARE\\Policies\\Microsoft\\Power\\PowerSettings\\29F6C1DB-86DA-48C5-9FDB-F2B67B1F44DA
    Key = ACSettingIndex
    ValueType = REG_DWORD
    Value = 0
    Location = Machine
    Enter GetRegType(REG_DWORD)
    Leave GetRegType
    Enter GPOTask::SetPolicy(...)
    RegCreateKeyEx(..)
    Leave GPOTask::SetPolicy
    Enter GPOTask::CreateGPOLink(OU=SBSComputers,OU=Computers,OU=MyBusiness,b)
    Enter GPOTask:;CreateGPOLinkWithEnforce( LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local, b)
    ADsGetObject DSPath is LDAP://OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=mvz-fdf,DC=local
    Old link is [LDAP://CN={3AD7533C-F462-455D-AD6A-8DE29752D9DB},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={AF1428AC-CFDF-4539-9952-478988A6A6D7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2][LDAP://CN={73130DA0-4EC6-4A5C-AA3A-053C9387AF1D},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    New Link is [LDAP://CN={3AD7533C-F462-455D-AD6A-8DE29752D9DB},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={AF1428AC-CFDF-4539-9952-478988A6A6D7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={8FB8ACC3-AFCF-41CF-B2A9-4CD3F86887D0},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;0][LDAP://CN={24E789D1-220E-4635-839A-4D18D2D28213},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2][LDAP://CN={73130DA0-4EC6-4A5C-AA3A-053C9387AF1D},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2][LDAP://CN={84A62A3F-E714-43C8-9AF7-72B109C91DE7},CN=POLICIES,CN=SYSTEM,DC=MVZ-FDF,DC=LOCAL;2]
    Leave GPOTask::CreateGPOLinkWithEnforce
    Leave GPOTask::CreateGPOLink
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    ~GPOTask
    Enter GPOTask::RelaseGPO()
    Leave GPOTask::ReleaseGPO()
    Leave GPOTask::LoadPolicyFromXML
    main return 0
    
    

     

    Donnerstag, 29. Juli 2010 08:48
  • Hi Ahmet,
     
    > Anbei die Logdaten:
     
    Du hast das wichtigste Protokoll vergessen:
     
    "SBSSetup.log - Logs all events that occurred during SBS setup"
     
    Dort sollte die eigentliche Ursache dokumentiert sein.
     
    Die restlichen sind zu arg gekürzt, als dass man etwas daraus schliessen
    könnte.
     
     
    Trotzdem die Frage: Kann es sein, dass ihr in der alten SBS 2003 AD-Struktur
    die OU "MyBusiness" umbenannt, geändert oder gelöscht habt?
     
    Ein Backup zum Restore des ursprünglichen SBS 2003 VOR der
    Migrationsschritte auf SBS 2008 liegt vor und kann zurückgesichert werden?
     
    Wurde VOR der Migration der "SBS 2003 BPA"* und "IT Health Scanner"*
    ausgeführt und sämtliche Fehler und Warnungen abgearbeitet?
     
    S.a.:
    http://blogs.technet.com/b/sbs/archive/2009/02/19/sbs-2008-migrations-from-sbs-2003-keys-to-success.aspx
     
     
    * Tools:
     
    Microsoft Windows Small Business Server 2003 Best Practices Analyzer
    http://www.microsoft.com/downloads/details.aspx?FamilyId=3874527A-DE19-49BB-800F-352F3B6F2922
     
    Microsoft IT Environment Health Scanner
    http://www.microsoft.com/downloads/details.aspx?FamilyID=dd7a00df-1a5b-4fb6-a8a6-657a7968bd11
     
    --
    Tobias Redelberger
    StarNET Services (HomeOffice)
    Frankfurter Allee 193
    D-10365 Berlin
    Tel: +49 (30) 86 87 02 678
    Mobil: +49 (163) 84 74 421
    Email: T.Redelberger@starnet-services.net
    Web: http://www.starnet-services.net
     
     
     
    Donnerstag, 29. Juli 2010 09:13
    Moderator
  • Hallo Tobias,

     

    die SBSSetup.log würde ich gerne hier auflisten,nur es ist anscheinend zu lang. Kann es leider nicht hochladen bzw. hier reinkopieren,ansonsten könnte ich es die per Mail zu schicken.

    Die einzelnen Log dateien habe ich auch nicht gekürzt, es sind die Original beschriebenen Log daten.

    In der AD ist My Business weiterhin vorhanden bzw. auch nicht umbenannt.

    Ja,ich habe ein Snapshot. Habe das Original Image von der SBS2003 auf der Hyper-V Ebene aufgespielt, den neuen SBS 2008 ebenfalls. Ich könnte praktisch alles wieder zurücksetzen.

     

    Was noch dann zu machen ist, dass ich die einzelnen Tools mal starten muss,diese hatte ich vorher nicht durchlaufen lassen.

     

    Gruß

     

    Ahmet

    Donnerstag, 29. Juli 2010 09:21
  • Hallo Tobias,

     

    habe anhand des Snapshots alles zurückgesetzt und von Neu angefangen. Habe auch die Tools durchlaufen lassen,ausser einige Warnung wie z.B. dass der SBS Server 2003 auf Hyper-V Umgebung läuft.eS  war kein Fehler festzustellen. Die Schritte,die für die Migration erforderlich sind ebenfalls durchgeführt. Die Installation des SBS2008 anhand der Antwortdatei ist ausgeführt und am ende ,bevor man die Migrationassistenten startet,habe ich das oben beschrieben Problem wieder bekommen.

    Was ich auch festgestellt habe, ist, dass ich über die SBS Console von 2008 die Migration Task nicht starten kann, da der Fehlerhinweis auftaucht,worin steht, dass "Der Migrationsassistent kann mit Anmeldeinformation des intergrierten Administratotorenkontos nicht ausgeführt werden.Melden Sie sich mit einem anderen Benutzerkonto an,das über die Rechte eine Netzwerkadministrators verfügt. Wenn Sie nicht über ein Netzwerkadministratorkonto verfügen, klicken Sie auf der Registerkarte "Benutzer" der Windows SBS Console auf "Neues Benutzerkonto hinzufügen", um ein neues  Benutzerkonto zu erstellen. "

    Und wenn ich anhand dieses Hinweises den Schritt durchführen möchte, bekomme ich dort beim Hinzuzufügen eines neuen Bentzers die Fehlermeldung " Das Feature  Windows SBS Console wurde nicht ordnungsgemäß eingerichtet "

    PS:

    Ich habe es nun hinbekommen, dass ich ein anderen Benutzer auf dem Quellserver angelegt habe mit Adminrechten. Nun kann ich auch den Assistenten für die Migration starten. Hoffe, dass nach dem die Migrationsasstisten durch ist,dass auch der Fehlermeldung bzgl. Active Directory auch weg ist.

     

     

    Gruß

     

    Ahmet

    Sonntag, 1. August 2010 17:07
  • Hi Ahmet,
     
    > Ich habe es nun hinbekommen, dass ich ein anderen Benutzer auf dem
    > Quellserver angelegt
    > habe mit Adminrechten. Nun kann ich auch den Assistenten für die Migration
    > starten. Hoffe,
    > dass nach dem die Migrationsasstisten durch ist,dass auch der
    > Fehlermeldung bzgl. Active
    > Directory auch weg ist.
     
    die originale Migrationsanleitung von Microsoft hast Du als Ganzes(!)
    gelesen?
     
    Create a migration answer file for Windows SBS 2008 migration
    http://technet.microsoft.com/en-us/library/cc527566(WS.10).aspx
    [..]
    It is recommended that you create a new administrator account on the Source
    Server for migration instead of using the built-in Administrator account.
    [..]
     
    --
    Tobias Redelberger
    StarNET Services (HomeOffice)
    Frankfurter Allee 193
    D-10365 Berlin
    Tel: +49 (30) 86 87 02 678
    Mobil: +49 (163) 84 74 421
    Email: T.Redelberger@starnet-services.net
    Web: http://www.starnet-services.net
     
     
     
    Montag, 2. August 2010 15:38
    Moderator