Event Type: Error
Event Source: Userenv
Event Type: None
Event ID: 1500
Date: 2009-8-11
Event: 11:25:13
User: nt authority \ NETWORK SERVICE
COMPUTER: YFT
Description:
Windows does not allow you to log on, because you cannot load your configuration file. Check whether you are connected to the network or whether the network is working properly. If this problem persists, contact your network administrator.
Details-Access denied.
For more information, see Help and Support Center in http://go.microsoft.com/fwlink/events.asp.
____________________________________________________________________________
Today, I encountered a 7005 error, which was found during debugging.
Cause: "C: \ Documents ents and Settings \ NetworkService \" this folder does not have sufficient permissions.
Add network service full control permission for this folder. Restart the test.
If not, you can use the following solution: Restore the default permissions of the C: \ Documents and Settings Folder:
Ultimate solution:
Log on to the console:
Start running mmc-add security configuration and analysis-right-click to open the database (any name) and prompt to import the template (copy the following file. inf format) -- save the log-that is, configure the computer. it should be done.
------- The following
; Copyright (c) Microsoft Corporation. All rights reserved.
; Security Configuration Template for Security Configuration Manager
[Version]
Signature = "$ CHICAGO $"
DriverVer = 10/01/2002, 5.2.20.0.0
[Profile Description]
% SCEProfileDescription %
[File Security]
"C: \ Documents and Settings", 0, "D: AR (A; OICI; GA; BA) (A; OICI; GA; SY) (; OICIIO; GA; CO) (A; CIOI; GRGX; BU) (A; CI; 0x00000004; BU) (A; CIIO; 0x00000002; BU) (A; GRGX; WD )"
[Strings]
SCEProfileDescription = "apply the default root directory permission to OS disk partitions and spread this permission to sub-objects inherited from the root directory. The propagation time is determined by the number of unprotected sub-objects. For more information, see online help. "
Above -----------------
Security Configuration and analysis settings see: http://www.jb51.net/article/25900.htm