Windows does not allow you to log on, because you cannot load your configuration file details-Access Denied

Source: Internet
Author: User

Event Type: Error
Event Source: Userenv
Event Type: None
Event ID: 1500
Date: 2009-8-11
Event: 11:25:13
User: nt authority \ NETWORK SERVICE
COMPUTER: YFT
Description:
Windows does not allow you to log on, because you cannot load your configuration file. Check whether you are connected to the network or whether the network is working properly. If this problem persists, contact your network administrator.
Details-Access denied.
For more information, see Help and Support Center in http://go.microsoft.com/fwlink/events.asp.
____________________________________________________________________________
Today, I encountered a 7005 error, which was found during debugging.
Cause: "C: \ Documents ents and Settings \ NetworkService \" this folder does not have sufficient permissions.
Add network service full control permission for this folder. Restart the test.

If not, you can use the following solution: Restore the default permissions of the C: \ Documents and Settings Folder:
Ultimate solution:
Log on to the console:
Start running mmc-add security configuration and analysis-right-click to open the database (any name) and prompt to import the template (copy the following file. inf format) -- save the log-that is, configure the computer. it should be done.

------- The following
; Copyright (c) Microsoft Corporation. All rights reserved.

; Security Configuration Template for Security Configuration Manager
[Version]
Signature = "$ CHICAGO $"
DriverVer = 10/01/2002, 5.2.20.0.0
[Profile Description]
% SCEProfileDescription %
[File Security]
"C: \ Documents and Settings", 0, "D: AR (A; OICI; GA; BA) (A; OICI; GA; SY) (; OICIIO; GA; CO) (A; CIOI; GRGX; BU) (A; CI; 0x00000004; BU) (A; CIIO; 0x00000002; BU) (A; GRGX; WD )"

[Strings]
SCEProfileDescription = "apply the default root directory permission to OS disk partitions and spread this permission to sub-objects inherited from the root directory. The propagation time is determined by the number of unprotected sub-objects. For more information, see online help. "
Above -----------------

Security Configuration and analysis settings see: http://www.jb51.net/article/25900.htm

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.