none
UAG - DA Client "Corporate connectivity is not working correctly RRS feed

  • Question

  • hello ,

    im in the process of implementing UAG direct access in our netwrok , we have installed and implement publishing for many services thruogh UAG , we followed as well the steps for implementing direct access and did all , after installation and configuration with no errors we tried to test from client machine which have windows 7 ultimate but its not working :( i dont know from where to start the troubleshooting actuelly

    when we open the diagnostic erro from the client machine using the conectivity assistant it show the below :



    DirectAccess
    Connectivity Assistant Logs






    RED: Corporate connectivity is not working.

    Your computer cannot connect to some corporate resources. If the problem
    persists, contact your administrator.

    15/2/2012 11:50:19 (UTC)





    Probes List

    PASS - PING: 2002:d47d:e6c3::d47d:e6c3

    FAIL - FILE: \\Xdc25\TestFolderDrectAccess\test.txt



    DTE List

    PASS - PING: 2002:d47d:e6c3::d47d:e6c3

    PASS - PING: 2002:d47d:e6c2::d47d:e6c2



    ipconfig /all

    netsh int teredo show state

    netsh int httpstunnel show interfaces

    netsh dns show state

    netsh name show policy

    netsh name show effective

    netsh adv mon show mmsa

    netsh nap client show state

    wevtutil query-events
    Microsoft-Windows-NetworkAccessProtection/Operational /count:20 /format:text
    /rd:true


    netsh int ipv6 show int level=verbose

    netsh advf show currentprofile

    netsh advfirewall monitor show consec

    Certutil -store my

    Systeminfo

    whoami /groups



    ipconfig /all


    <textarea cols="100" rows="35">*************************************************************************** ipconfig /all *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>ipconfig /all Windows IP Configuration Host Name . . . . . . . . . . . . : TESTPC Primary Dns Suffix . . . . . . . : Domain.com Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : Domain.com lan System Quarantine State . . . . . : Not Restricted Wireless LAN adapter Wireless Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Domain.com Description . . . . . . . . . . . : Intel(R) Centrino(R) Ultimate-N 6300 AGN Physical Address. . . . . . . . . : 00-24-D7-B2-18-34 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : lan Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection Physical Address. . . . . . . . . : 5C-26-0A-57-66-5E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::7dbf:aae8:c13a:be8e%11(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.47(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : 15. februar 2012 11:59:37 Lease Expires . . . . . . . . . . : 16. februar 2012 11:59:37 Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 240920074 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-15-5A-85-67-5C-26-0A-57-66-5E DNS Servers . . . . . . . . . . . : 192.168.1.1 NetBIOS over Tcpip. . . . . . . . : Enabled Tunnel adapter Local Area Connection* 14: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft 6to4 Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.domain.com: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.lan: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : lan Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2001:0:d47d:e6c2:145d:3403:3e2b:999f(Preferred) Link-local IPv6 Address . . . . . : fe80::145d:3403:3e2b:999f%18(Preferred) Default Gateway . . . . . . . . . : :: NetBIOS over Tcpip. . . . . . . . : Disabled Tunnel adapter iphttpsinterface: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : iphttpsinterface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    Best Regards

    Wednesday, February 15, 2012 3:55 PM

All replies


  • netsh int teredo show state

    <textarea cols="100" rows="35">*************************************************************************** netsh int teredo show state *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh int teredo show state Teredo Parameters --------------------------------------------- Type : client Server Name : 212.125.230.194 (Group Policy) Client Refresh Interval : 30 seconds Client Port : unspecified State : qualified Client Type : teredo client Network : unmanaged NAT : symmetric (port) NAT Special Behaviour : UPNP: No, PortPreserving: No Local Mapping : 192.168.1.47:49726 External NAT Mapping : 193.212.102.96:52220 C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>









    netsh int httpstunnel show interfaces


    <textarea cols="100" rows="35">*************************************************************************** netsh int httpstunnel show interfaces *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh int httpstunnel show interfaces Interface IPHTTPSInterface (Group Policy) Parameters ------------------------------------------------------------ Role : client URL : https://publisher.domain.com:443/IPHTTPS Last Error Code : 0x8009030e Interface Status : failed to connect to the IPHTTPS server. Waiting to reconnect C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A></textarea>











    netsh dns show state


    <textarea cols="100" rows="35">*************************************************************************** netsh dns show state *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh dns show state Name Resolution Policy Table Options -------------------------------------------------------------------- Query Failure Behavior : Always fall back to LLMNR and NetBIOS if the name does not exist in DNS or if the DNS servers are unreachable when on a private network Query Resolution Behavior : Resolve only IPv6 addresses for names Network Location Behavior : Let Network ID determine when Direct Access settings are to be used Machine Location : Outside corporate network Direct Access Settings : Configured and Enabled DNSSEC Settings : Not Configured C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    netsh name show policy


    <textarea cols="100" rows="35">*************************************************************************** netsh name show policy *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh name show policy DNS Name Resolution Policy Table Settings Settings for portal.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled DNSSEC (IPsec) : disabled DirectAccess (DNS Servers) : DirectAccess (IPsec) : disabled DirectAccess (Proxy Settings) : Use default browser settings Settings for nls.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled DNSSEC (IPsec) : disabled DirectAccess (DNS Servers) : DirectAccess (IPsec) : disabled DirectAccess (Proxy Settings) : Use default browser settings Settings for publisher.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled DNSSEC (IPsec) : disabled DirectAccess (DNS Servers) : DirectAccess (IPsec) : disabled DirectAccess (Proxy Settings) : Use default browser settings Settings for .domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled DNSSEC (IPsec) : disabled DirectAccess (DNS Servers) : 2002:d47d:e6c3::d47d:e6c3 DirectAccess (IPsec) : disabled DirectAccess (Proxy Settings) : Bypass proxy C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A></textarea>











    netsh name show effective


    <textarea cols="100" rows="35">*************************************************************************** netsh name show effective *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh name show effective DNS Effective Name Resolution Policy Table Settings Settings for portal.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled IPsec settings : disabled DirectAccess (DNS Servers) : DirectAccess (Proxy Settings) : Use default browser settings Settings for nls.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled IPsec settings : disabled DirectAccess (DNS Servers) : DirectAccess (Proxy Settings) : Use default browser settings Settings for publisher.domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled IPsec settings : disabled DirectAccess (DNS Servers) : DirectAccess (Proxy Settings) : Use default browser settings Settings for .domain.com ---------------------------------------------------------------------- Certification authority : O=*.domain.com, OU=Domain Control Validated, CN=*.domain.com DNSSEC (Validation) : disabled IPsec settings : disabled DirectAccess (DNS Servers) : 2002:d47d:e6c3::d47d:e6c3 DirectAccess (Proxy Settings) : Bypass proxy C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A></textarea>











    netsh adv mon show mmsa


    <textarea cols="100" rows="35">*************************************************************************** netsh adv mon show mmsa *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh adv mon show mmsa No SAs match the specified criteria. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    netsh nap client show state


    <textarea cols="100" rows="35">*************************************************************************** netsh nap client show state *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh nap client show state Client state: ---------------------------------------------------- Name = Network Access Protection Client Description = Microsoft Network Access Protection Client Protocol version = 1.0 Status = Enabled Restriction state = Not restricted Troubleshooting URL = Restriction start time = Extended state = GroupPolicy = Not Configured Enforcement client state: ---------------------------------------------------- Id = 79617 Name = DHCP Quarantine Enforcement Client Description = Provides DHCP based enforcement for NAP Version = 1.0 Vendor name = Microsoft Corporation Registration date = Initialized = No Id = 79619 Name = IPsec Relying Party Description = Provides IPsec based enforcement for Network Access Protection Version = 1.0 Vendor name = Microsoft Corporation Registration date = Initialized = No Id = 79621 Name = RD Gateway Quarantine Enforcement Client Description = Provides RD Gateway enforcement for NAP Version = 1.0 Vendor name = Microsoft Corporation Registration date = Initialized = No Id = 79622 Name = Microsoft Forefront UAG Quarantine Enforcement Client Description = Reports client health status. Version = 4.0.1752.10000 Vendor name = Microsoft Corporation Registration date = 19.06.2011 13:09:19 Initialized = Yes Id = 79623 Name = EAP Quarantine Enforcement Client Description = Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies. Version = 1.0 Vendor name = Microsoft Corporation Registration date = Initialized = No System health agent (SHA) state: ---------------------------------------------------- Id = 79744 Name = Windows Security Health Agent Description = The Windows Security Health Agent monitors security settings on your computer. Version = 1.0 Vendor name = Microsoft Corporation Registration date = Initialized = Yes Failure category = None Remediation state = Success Remediation percentage = 0 Fixup Message = (3237937214) - The Windows Security Health Agent has finished updating the security state of this computer. Compliance results = Remediation results = Id = 79745 Name = Configuration Manager System Health Agent Description = Configuration Manager System Health Agent facilitates enforcement of software update compliance using Network Access Protection. Version = 2007 Vendor name = Microsoft Corporation Registration date = 31.05.2011 15:05:39 Initialized = Yes Failure category = None Remediation state = Success Remediation percentage = 100 Fixup Message = (90507) - Configuration Manager NAP Client Agent is not enabled, Client will be deemed compliant. Compliance results = Remediation results = (0x00000000) - (null) Id = 88048 Name = Intel(R) AMT SHA Description = Intel(R) AMT SHA Application Version = VER_PRODUCTVERSION_STR Vendor name = Intel(R) Registration date = 10.05.2011 04:47:21 Initialized = No Failure category = None Remediation state = Success Remediation percentage = 0 Fixup Message = (0) - Ok. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    wevtutil query-events Microsoft-Windows-NetworkAccessProtection/Operational
    /count:20 /format:text /rd:true


    <textarea cols="100" rows="35">*************************************************************************** wevtutil query-events Microsoft-Windows-NetworkAccessProtection/Operational /count:20 /format:text /rd:true *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>wevtutil query-events Microsoft-Windows-NetworkAccessProtection/Operational /count:20 /format:text /rd:true Event[0]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T11:40:10.024 Event ID: 1007 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent completed an offline scan. Event[1]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:38:11.526 Event ID: 4 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The System Health Agent 79745 successfully initialized. Event[2]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.620 Event ID: 28 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: A Statement of Health with correlation ID {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 10:37:21.610Z was sent to the enforcment client 79622. Event[3]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.620 Event ID: 27 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: A Statement of Health with correlation ID {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 10:37:21.610Z was received from the System Health Agent 79744. The duration to check the client's health was 10 ms. Event[4]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T11:37:21.620 Event ID: 1025 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent specified a new security health state for the computer. The correlation id for this transaction is {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 10:37:21.610Z Event[5]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.610 Event ID: 9 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The enforcement client 79622 successfully initialized. Event[6]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T11:37:21.525 Event ID: 1002 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent was initialized successfully. Scan Interval: 1320 minutes. Time delay before first scan: 45 seconds. Time interval between manual remediation state change: 15 seconds. Manual remediation timeout interval: 150 seconds. Event[7]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.525 Event ID: 4 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The System Health Agent 79744 successfully initialized. Event[8]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.498 Event ID: 9 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The enforcement client 79871 successfully initialized. Event[9]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:37:21.463 Event ID: 26 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The NAP service has started. NAP has the following information for this computer: Computer name is STU7.domain.com. Domain status is: Domain Joined. The build number is: 7600. The OS SKU is: CLIENT. The service pack version is: 0.0. The processor type is: x64 (AMD or Intel). Event[10]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T11:36:52.653 Event ID: 1004 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent was uninitialized successfully. Event[11]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:36:52.653 Event ID: 5 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The System Health Agent 79744 successfully uninitialized. Event[12]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T11:36:52.653 Event ID: 10 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The enforcement client 79871 successfully uninitialized. Event[13]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T11:36:51.654 Event ID: 1023 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Center detected a system health state change. The change in state was also successfully detected by the Windows Security Health Agent. Event[14]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T10:39:36.232 Event ID: 1007 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent completed an offline scan. Event[15]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T10:38:27.534 Event ID: 4 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The System Health Agent 79745 successfully initialized. Event[16]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T10:36:47.345 Event ID: 28 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: A Statement of Health with correlation ID {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 09:36:47.332Z was sent to the enforcment client 79622. Event[17]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T10:36:47.343 Event ID: 27 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: A Statement of Health with correlation ID {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 09:36:47.332Z was received from the System Health Agent 79744. The duration to check the client's health was 7 ms. Event[18]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-SystemHealthAgent Date: 2012-02-15T10:36:47.343 Event ID: 1025 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The Windows Security Health Agent specified a new security health state for the computer. The correlation id for this transaction is {4E9B005E-4B3F-4C85-BC0A-7FD0F2D0ED72} - 2012-02-15 09:36:47.332Z Event[19]: Log Name: Microsoft-Windows-NetworkAccessProtection/Operational Source: Microsoft-Windows-NetworkAccessProtection Date: 2012-02-15T10:36:47.330 Event ID: 9 Task: N/A Level: Information Opcode: Info Keyword: N/A User: S-1-5-20 User Name: NT AUTHORITY\NETWORK SERVICE Computer: STU7.domain.com Description: The enforcement client 79622 successfully initialized. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A></textarea>











    netsh int ipv6 show int level=verbose


    <textarea cols="100" rows="35">*************************************************************************** netsh int ipv6 show int level=verbose *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh int ipv6 show int level=verbose Interface Loopback Pseudo-Interface 1 Parameters ---------------------------------------------- IfLuid : loopback_0 IfIndex : 1 State : connected Metric : 50 Link MTU : 4294967295 bytes Reachable Time : 38000 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 0 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : disabled Neighbor Unreachability Detection : disabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface Wireless Network Connection Parameters ---------------------------------------------- IfLuid : wireless_0 IfIndex : 17 State : disconnected Metric : 50 Link MTU : 1500 bytes Reachable Time : 25500 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 1 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : enabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface Local Area Connection* 14 Parameters ---------------------------------------------- IfLuid : tunnel_5 IfIndex : 12 State : disconnected Metric : 50 Link MTU : 1280 bytes Reachable Time : 35000 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 0 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : disabled Neighbor Unreachability Detection : disabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface Local Area Connection Parameters ---------------------------------------------- IfLuid : ethernet_6 IfIndex : 11 State : connected Metric : 20 Link MTU : 1500 bytes Reachable Time : 39000 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 1 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : enabled Router Discovery : enabled Managed Address Configuration : enabled Other Stateful Configuration : enabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface isatap.domain.com Parameters ---------------------------------------------- IfLuid : tunnel_6 IfIndex : 15 State : disconnected Metric : 50 Link MTU : 1280 bytes Reachable Time : 37500 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 0 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : disabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface isatap.lan Parameters ---------------------------------------------- IfLuid : tunnel_7 IfIndex : 16 State : disconnected Metric : 50 Link MTU : 1280 bytes Reachable Time : 15500 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 0 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : disabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface Teredo Tunneling Pseudo-Interface Parameters ---------------------------------------------- IfLuid : tunnel_9 IfIndex : 18 State : connected Metric : 50 Link MTU : 1280 bytes Reachable Time : 17000 ms Base Reachable Time : 15000 ms Retransmission Interval : 2000 ms DAD Transmits : 0 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : enabled Router Discovery : enabled Managed Address Configuration : disabled Other Stateful Configuration : disabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled Interface iphttpsinterface Parameters ---------------------------------------------- IfLuid : tunnel_10 IfIndex : 21 State : disconnected Metric : 50 Link MTU : 1280 bytes Reachable Time : 31500 ms Base Reachable Time : 30000 ms Retransmission Interval : 1000 ms DAD Transmits : 1 Site Prefix Length : 64 Site Id : 1 Forwarding : disabled Advertising : disabled Neighbor Discovery : enabled Neighbor Unreachability Detection : enabled Router Discovery : enabled Managed Address Configuration : enabled Other Stateful Configuration : enabled Weak Host Sends : disabled Weak Host Receives : disabled Use Automatic Metric : enabled Ignore Default Routes : disabled Advertised Router Lifetime : 1800 seconds Advertise Default Route : disabled Current Hop Limit : 0 Force ARPND Wake up patterns : disabled Directed MAC Wake up patterns : disabled C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A></textarea>











    netsh advf show currentprofile


    <textarea cols="100" rows="35">*************************************************************************** netsh advf show currentprofile *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh advf show currentprofile Public Profile Settings: ---------------------------------------------------------------------- State ON Firewall Policy BlockInbound,AllowOutbound LocalFirewallRules N/A (GPO-store only) LocalConSecRules N/A (GPO-store only) InboundUserNotification Enable RemoteManagement Enable UnicastResponseToMulticast Enable Logging: LogAllowedConnections Disable LogDroppedConnections Disable FileName %systemroot%\system32\LogFiles\Firewall\pfirewall.log MaxFileSize 4096 Ok. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    netsh advfirewall monitor show consec


    <textarea cols="100" rows="35">*************************************************************************** netsh advfirewall monitor show consec *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>netsh advfirewall monitor show consec Global Settings: ---------------------------------------------------------------------- IPsec: StrongCRLCheck 1:Check SAIdleTimeMin 5min DefaultExemptions ICMP IPsecThroughNAT Never AuthzUserGrp None AuthzComputerGrp None StatefulFTP Enable StatefulPPTP Enable Main Mode: KeyLifetime 60min,0sess SecMethods DHGroup2-AES128-SHA256,DHGroup2-AES128-SHA1,DHGroup2-3DES-SHA1 ForceDH No Categories: BootTimeRuleCategory Windows Firewall FirewallRuleCategory Windows Firewall StealthRuleCategory Windows Firewall ConSecRuleRuleCategory Windows Firewall Quick Mode: QuickModeSecMethods ESP:SHA1-None+60min+100000kb,ESP:SHA1-AES128+60min+100000kb,ESP:SHA1-3DES+60min+100000kb,AH:SHA1+60min+100000kb QuickModePFS None Security Associations: No SAs match the specified criteria. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>











    Certutil -store my


    <textarea cols="100" rows="35">*************************************************************************** Certutil -store my *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>Certutil -store my my ================ Certificate 0 ================ Serial Number: 1cfdc5dc000100000eb3 Issuer: CN=domain DC45, DC=domain, DC=com NotBefore: 31.05.2011 13:37 NotAfter: 30.05.2013 13:37 Subject: CN=STU7.domain.com Certificate Template Name (Certificate Type): IPSECIntermediateOnline Non-root Certificate Template: IPSECIntermediateOnline Cert Hash(sha1): ec ec d3 a4 00 c5 c8 1e 13 0d c0 c0 4a db c6 9c 3b 9c 45 7c Key Container = b1dc5481700fa6cef166a8bf8d3243af_f225c1ef-288a-4b9f-96fb-800f9c5aa9aa Simple container name: le-IPSECIntermediateOnline-b0eb9f40-d598-452f-91c2-3a2fe05dd198 Provider = Microsoft RSA SChannel Cryptographic Provider Private key is NOT exportable Encryption test passed ================ Certificate 1 ================ Serial Number: 1cfdba52000100000eb2 Issuer: CN=domain DC45, DC=domain, DC=com NotBefore: 31.05.2011 13:37 NotAfter: 30.05.2012 13:37 Subject: CN=STU7.domain.com Certificate Template Name (Certificate Type): Machine Non-root Certificate Template: Machine Cert Hash(sha1): d5 1b 32 c4 52 a7 25 a2 e4 21 1c 13 aa 94 3f 82 cb fb 84 3f Key Container = 8f80053a827acd914d74809a1efb6e44_f225c1ef-288a-4b9f-96fb-800f9c5aa9aa Simple container name: le-Machine-7d6c9e02-8165-4877-a67a-7b9b48aca2a4 Provider = Microsoft RSA SChannel Cryptographic Provider Private key is NOT exportable Encryption test passed ================ Certificate 2 ================ Serial Number: 00 Issuer: OU=Starfield Class 2 Certification Authority, O=Starfield Technologies, Inc., C=US NotBefore: 29.06.2004 18:39 NotAfter: 29.06.2034 18:39 Subject: OU=Starfield Class 2 Certification Authority, O=Starfield Technologies, Inc., C=US Signature matches Public Key Root Certificate: Subject matches Issuer Template: Cert Hash(sha1): ad 7e 1c 28 b0 64 ef 8f 60 03 40 20 14 c3 d0 e3 37 0e b5 8a No key provider information Cannot find the certificate and private key for decryption. ================ Certificate 3 ================ Serial Number: 1cfdc697000100000eb4 Issuer: CN=domain DC45, DC=domain, DC=com NotBefore: 31.05.2011 13:37 NotAfter: 31.05.2013 13:47 Subject: EMPTY (DNS Name=STU7.domain.com) Non-root Certificate Template: 1.3.6.1.4.1.311.21.8.13224813.6873182.1459850.15979029.5402139.135.5183070.12869032 Cert Hash(sha1): 99 6b 9a 42 07 88 81 15 03 ed a7 ea f5 db a0 98 3c e0 dc 7a Key Container = e32aa9ccd5ea52d7af6d1b687892dc14_f225c1ef-288a-4b9f-96fb-800f9c5aa9aa Simple container name: le-WirelessUserAccess-50032dcb-0fa4-40f3-aa82-9e4ed182e14f Provider = Microsoft RSA SChannel Cryptographic Provider Private key is NOT exportable Encryption test passed ================ Certificate 4 ================ Serial Number: 1a373546000100001241 Issuer: CN=domain DC45, DC=domain, DC=com NotBefore: 31.01.2012 16:04 NotAfter: 30.01.2013 16:04 Subject: CN=PUBLISHER.domain.com Certificate Template Name (Certificate Type): Machine Non-root Certificate Template: Machine Cert Hash(sha1): 89 1b 0a 66 f2 38 0c d0 75 2a b2 1b 4c 2d 23 15 87 e0 13 3d No key provider information Cannot find the certificate and private key for decryption. ================ Certificate 5 ================ Serial Number: 0201 Issuer: OU=Starfield Class 2 Certification Authority, O=Starfield Technologies, Inc., C=US NotBefore: 16.11.2006 02:15 NotAfter: 16.11.2026 02:15 Subject: SERIALNUMBER=10688435, CN=Starfield Secure Certification Authority, OU=http://certificates.starfieldtech.com/repository, O=Starfield Technologies, Inc., L=Scottsdale, S=Arizona, C=US Non-root Certificate Template: Cert Hash(sha1): 7e 18 74 a9 8f aa 5d 6d 2f 50 6a 89 20 ff 22 fb d1 66 52 d9 No key provider information Cannot find the certificate and private key for decryption. ================ Certificate 6 ================ Serial Number: 010c Issuer: E=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 2 Policy Validation Authority, O=ValiCert, Inc., L=ValiCert Validation Network NotBefore: 29.06.2004 18:39 NotAfter: 29.06.2024 18:39 Subject: OU=Starfield Class 2 Certification Authority, O=Starfield Technologies, Inc., C=US Non-root Certificate Template: Cert Hash(sha1): 36 3e 47 34 f7 57 bd eb 89 86 8e fe 94 90 77 74 a3 27 69 5e No key provider information Cannot find the certificate and private key for decryption. ================ Certificate 7 ================ Serial Number: 281013ce360e3d Issuer: SERIALNUMBER=10688435, CN=Starfield Secure Certification Authority, OU=http://certificates.starfieldtech.com/repository, O=Starfield Technologies, Inc., L=Scottsdale, S=Arizona, C=US NotBefore: 30.01.2012 09:58 NotAfter: 30.01.2017 09:58 Subject: CN=*.domain.com, OU=Domain Control Validated, O=*.domain.com Non-root Certificate Template: Cert Hash(sha1): 1c 60 cb c7 17 89 c7 33 16 63 fe 45 67 28 bb 33 2d 63 0a ac Key Container = {29EE6BB8-3ED3-403B-9F34-2DC874BF047C} Unique container name: 64733030a19808b165f88dc700efabee_f225c1ef-288a-4b9f-96fb-800f9c5aa9aa Provider = Microsoft RSA SChannel Cryptographic Provider Private key is NOT exportable Encryption test passed CertUtil: -store command completed successfully. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A><A></A></textarea>











    Systeminfo


    <textarea cols="100" rows="35">*************************************************************************** Systeminfo *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>Systeminfo Host Name: STU7 OS Name: Microsoft Windows 7 Ultimate OS Version: 6.1.7600 N/A Build 7600 OS Manufacturer: Microsoft Corporation OS Configuration: Member Workstation OS Build Type: Multiprocessor Free Registered Owner: admin Registered Organization: Microsoft Product ID: 00426-OEM-8992662-00400 Original Install Date: 31.05.2011, 14:35:32 System Boot Time: 15.02.2012, 11:37:11 System Manufacturer: Dell Inc. System Model: Latitude E6420 System Type: x64-based PC Processor(s): 1 Processor(s) Installed. [01]: Intel64 Family 6 Model 42 Stepping 7 GenuineIntel ~2501 Mhz BIOS Version: Dell Inc. A02, 13.04.2011 Windows Directory: C:\Windows System Directory: C:\Windows\system32 Boot Device: \Device\HarddiskVolume2 System Locale: no;Norwegian (Bokmal) Input Locale: no;Norwegian (Bokmal) Time Zone: (UTC+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna Total Physical Memory: 8Â 073 MB Available Physical Memory: 6Â 313 MB Virtual Memory: Max Size: 16Â 144 MB Virtual Memory: Available: 14Â 260 MB Virtual Memory: In Use: 1Â 884 MB Page File Location(s): C:\pagefile.sys Domain: domain.com Logon Server: N/A Hotfix(s): 92 Hotfix(s) Installed. [01]: KB2079403 [02]: KB2155311 [03]: KB2207566 [04]: KB2249857 [05]: KB2281679 [06]: KB2284742 [07]: KB2286198 [08]: KB2296011 [09]: KB2305420 [10]: KB2345886 [11]: KB2347290 [12]: KB2378111 [13]: KB2385678 [14]: KB2387149 [15]: KB2388210 [16]: KB2393802 [17]: KB2416471 [18]: KB2419640 [19]: KB2423089 [20]: KB2425227 [21]: KB2442962 [22]: KB2443685 [23]: KB2447568 [24]: KB2454826 [25]: KB2467023 [26]: KB2467659 [27]: KB2475792 [28]: KB2479628 [29]: KB2482017 [30]: KB2482122 [31]: KB2485376 [32]: KB2487426 [33]: KB958488 [34]: KB971468 [35]: KB972270 [36]: KB973525 [37]: KB973874 [38]: KB974204 [39]: KB974410 [40]: KB974431 [41]: KB974560 [42]: KB974571 [43]: KB975364 [44]: KB975467 [45]: KB975500 [46]: KB975538 [47]: KB975560 [48]: KB975599 [49]: KB975617 [50]: KB975741 [51]: KB975806 [52]: KB976325 [53]: KB976422 [54]: KB976781 [55]: KB976902 [56]: KB976972 [57]: KB977074 [58]: KB977178 [59]: KB977609 [60]: KB978205 [61]: KB978206 [62]: KB978258 [63]: KB978535 [64]: KB978542 [65]: KB978601 [66]: KB978637 [67]: KB978886 [68]: KB978977 [69]: KB979099 [70]: KB979309 [71]: KB979482 [72]: KB979538 [73]: KB979687 [74]: KB979688 [75]: KB979900 [76]: KB979903 [77]: KB979916 [78]: KB980195 [79]: KB980232 [80]: KB980302 [81]: KB980408 [82]: KB980846 [83]: KB981842 [84]: KB981889 [85]: KB982018 [86]: KB982110 [87]: KB982132 [88]: KB982214 [89]: KB982300 [90]: KB982665 [91]: KB982799 [92]: KB983590 Network Card(s): 2 NIC(s) Installed. [01]: Intel(R) 82579LM Gigabit Network Connection Connection Name: Local Area Connection DHCP Enabled: Yes DHCP Server: 192.168.1.1 IP address(es) [01]: 192.168.1.47 [02]: fe80::7dbf:aae8:c13a:be8e [02]: Intel(R) Centrino(R) Ultimate-N 6300 AGN Connection Name: Wireless Network Connection Status: Media disconnected C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}><A></A><A></A></textarea>











    whoami /groups


    <textarea cols="100" rows="35">*************************************************************************** whoami /groups *************************************************************************** Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}>whoami /groups GROUP INFORMATION ----------------- Group Name Type SID Attributes ====================================== ================ ============ ================================================== BUILTIN\Administrators Alias S-1-5-32-544 Enabled by default, Enabled group, Group owner Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group Mandatory Label\System Mandatory Level Label S-1-16-16384 C:\Windows\system32\LogSpace\{B40CC899-D236-4D97-8036-BB2E55E43894}></textarea>












    Best Regards

    Wednesday, February 15, 2012 3:56 PM
  • We're experiencing similar issues.

    We have had DirectAccess working for a while now, but finding issues that look related to the hardware model.  We're having issues on all E6420 models, looks like the same model OP is having issues on:

    System Manufacturer: Dell Inc. System Model: Latitude E6420 System Type: x64-based

    Thursday, July 19, 2012 8:25 PM
  • has microsoft confirmed this issue ? because we have the same hardware model !


    Best Regards

    Thursday, July 19, 2012 8:36 PM
  • Weird. we are having the same issue on the Dell E6420.  Could it be a wifi adapter issue?

    we dont see the same issue when upgrading to windows 8.

    Saturday, January 5, 2013 12:56 AM