Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Group Policy Drive Maps|
The user 'M:' preference item in the '<name/guid of policy>' Group Policy object did not apply because it failed with error code '0x80070002 The system cannot find the file specified.' This error was suppressed.
|English: Request a translation of the event description in plain English.|
From a support forum: "By default, the drive maps actually run in the context of SYSTEM and not the user that logging in. (The reason why the Event Log entry has "User: NT AUTHORITY\SYSTEM" as the user and not DOMAIN\username.) So, the %LogonUser% is actually resolving to "system." I've never tried this, but I would be willing to bet if you created a folder called system it would probably map.
Good news... there's an easy way to fix it! Open up one of your drive maps by double-clicking on it. On the Common tab, check "Run in logged-on user's security context (user policy option)." Update the Group Policy on one of your machines and it should map."
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated