C:\Users\Administrator>copy /Y con answers.txt [DCInstall] ReplicaOrNewDomain=ReadOnlyReplica ReplicaDomainDNSName=s4.howto.abartlet.net PasswordReplicationDenied="BUILTIN\Administrators" PasswordReplicationDenied="BUILTIN\Server Operators" PasswordReplicationDenied="BUILTIN\Backup Operators" PasswordReplicationDenied="BUILTIN\Account Operators" PasswordReplicationDenied="s4-howto\Denied RODC Password Replication Group" PasswordReplicationAllowed="s4-howto\Allowed RODC Password Replication Group" DelegatedAdmin="s4-howto\Administrator" SiteName=Default-First-Site-Name InstallDNS=No ConfirmGc=Yes CreateDNSDelegation=No UserDomain=s4.howto.abartlet.net UserName=s4.howto.abartlet.net\administrator Password=p@ssw0rd DatabasePath="C:\Windows\NTDS" LogPath="C:\Windows\NTDS" SYSVOLPath="C:\Windows\SYSVOL" SafeModeAdminPassword=p@ssw0rd RebootOnCompletion=No  copy /Y con answers.txt [DCInstall] ReplicaOrNewDomain=ReadOnlyReplica ReplicaDomainDNSName=s4.howto.abartlet.net PasswordReplicationDenied="BUILTIN\Administrators" PasswordReplicationDenied="BUILTIN\Server Operators" PasswordReplicationDenied="BUILTIN\Backup Operators" PasswordReplicationDenied="BUILTIN\Account Operators" PasswordReplicationDenied="s4-howto\Denied RODC Password Replication Group" PasswordReplicationAllowed="s4-howto\Allowed RODC Password Replication Group" DelegatedAdmin="s4-howto\Administrator" SiteName=Default-First-Site-Name InstallDNS=No ConfirmGc=Yes CreateDNSDelegation=No UserDomain=s4.howto.abartlet.net UserName=s4.howto.abartlet.net\administrator Password=p@ssw0rd DatabasePath="C:\Windows\NTDS" LogPath="C:\Windows\NTDS" SYSVOLPath="C:\Windows\SYSVOL" SafeModeAdminPassword=p@ssw0rd RebootOnCompletion=No  1 file(s) copied. C:\Users\Administrator>C:\Users\Administrator>dcpromo /answer:answers.txt dcpromo /answer:answers.txt Checking if Active Directory Domain Services binaries are installed... Active Directory Domain Services Setup Validating environment and parameters... ---------------------------------------- The following actions will be performed: Configure this server as an additional Active Directory domain controller for the domain "s4.howto.abartlet.net". Site: Default-First-Site-Name Additional Options: Read-only domain controller: "Yes" Global catalog: Yes DNS Server: No Source domain controller: any writable domain controller Password Replication Policy: Allow: s4-howto\Allowed RODC Password Replication Group Deny: BUILTIN\Administrators Deny: BUILTIN\Server Operators Deny: BUILTIN\Backup Operators Deny: BUILTIN\Account Operators Deny: s4-howto\Denied RODC Password Replication Group Delegation for RODC Installation and Administration: s4-howto\Administrator Database folder: C:\Windows\NTDS Log file folder: C:\Windows\NTDS SYSVOL folder: C:\Windows\SYSVOL ---------------------------------------- Starting... Checking if Group Policy Management Console needs to be installed... Changing domain membership of this computer... Press CTRL-C to: Cancel Located domain controller obed.s4.howto.abartlet.net for domain s4.howto.abartlet.net The attempted domain controller operation has completed This Active Directory Domain Services installation needs to verify that necessary domain configuration changes have occured, but it could not contact Active Directory Domain Controller obed.s4.howto.abartlet.net to determine whether these changes have been made. The installation process has quit. This error can occur if the infrastructure master role is assigned to a deleted object, if there are networking issues, or if you do not have sufficient permissions to read the required data in the directory. Extended error: DSID - 0x180f0605 NULL 0 . The operation failed because: This Active Directory Domain Services installation needs to verify that necessary domain configuration changes have occured, but it could not contact Active Directory Domain Controller obed.s4.howto.abartlet.net to determine whether these changes have been made. The installation process has quit. This error can occur if the infrastructure master role is assigned to a deleted object, if there are networking issues, or if you do not have sufficient permissions to read the required data in the directory. Extended error: DSID - 0x180f0605 NULL 0 . "The parameter is incorrect." This error can occur if you have not been granted necessary permissions to read data in the directory. For more information, please see article 936241 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=88420). Active Directory Domain Services was not installed. Active Directory Domain Services (AD DS) binaries will remain installed. To uninstall AD DS binaries, use Server Manager to remove the AD DS role. Windows Server 2008 and "Windows Server 2008 R2" domain controllers have a new more secure default for the security setting named "Allow cryptography algorithms compatible with Windows NT 4.0." This setting prevents Microsoft Windows and non-Microsoft SMB "clients" from using weaker NT 4.0 style cryptography algorithms when establishing security channel sessions against Windows Server 2008 or "Windows Server echo off echo START DCPROMO log more c:\windows\debug\dcpromoui.log echo END DCPROMO log 2008 R2" domain controllers. As a result of this new default, operations or applications that require a security channel serviced by Windows Server 2008 or "Windows Server 2008 R2" domain controllers might fail. Platforms impacted by this change include Windows NT 4.0, as well as non-Microsoft SMB "clients" and network-attached storage (NAS) devices that do not support stronger cryptography algorithms. Some operations on clients running versions of Windows earlier than Windows Vista with Service Pack 1 are also impacted, including domain join operations performed by the Active Directory Migration Tool or Windows Deployment Services. For more information about this setting, see Knowledge Base article 942564 (http://go.microsoft.com/fwlink/?LinkId=104751). You must restart this computer to complete the operation. C:\Users\Administrator>echo off echo START DCPROMO log START DCPROMO log more c:\windows\debug\dcpromoui.log dcpromoui 3C8.3B8 0000 11:52:56.364 opening log file C:\Windows\debug\dcpromoui.log dcpromoui 3C8.3B8 0001 11:52:56.364 C:\Windows\system32\dcpromo.exe dcpromoui 3C8.3B8 0002 11:52:56.364 file timestamp 07/14/2009 12:39:02.901 dcpromoui 3C8.3B8 0003 11:52:56.364 local time 02/21/2012 11:52:56.364 dcpromoui 3C8.3B8 0004 11:52:56.364 running Windows NT 6.1 build 7601 Service Pack 1 (BuildLab:7601.win7sp1_gdr.110622-1506) amd64 dcpromoui 3C8.3B8 0005 11:52:56.364 logging flags 0001007C dcpromoui 3C8.3B8 0006 11:52:56.364 Enter wmain dcpromoui 3C8.3B8 0007 11:52:56.364 Enter CheckArgs dcpromoui 3C8.3B8 0008 11:52:56.364 Enter CArgumentsSpec::ValidateArgument answer dcpromoui 3C8.3B8 0009 11:52:56.364 Detecting WOW64 dcpromoui 3C8.3B8 000A 11:52:56.364 Detecting OS product type dcpromoui 3C8.3B8 000B 11:52:56.364 Enter CheckIsServerCore dcpromoui 3C8.3B8 000C 11:52:56.364 It is not on server foundation dcpromoui 3C8.3B8 000D 11:52:56.364 HRESULT = 0x00000000 dcpromoui 3C8.3B8 000E 11:52:56.364 Enter IsSKUSupported dcpromoui 3C8.3B8 000F 11:52:56.364 GUI mode: false dcpromoui 3C8.3B8 0010 11:52:56.364 Create mutex returns 0x0 dcpromoui 3C8.3B8 0011 11:52:56.364 Console mode dcpromoui 3C8.3B8 0012 11:52:56.364 Enter CheckInstallStates dcpromoui 3C8.3B8 0013 11:52:56.364 Detecting NetFx3 component install state dcpromoui 3C8.7DC 0014 11:52:56.364 Enter CbsGetUpdateInstallState dcpromoui 3C8.7DC 0015 11:52:56.364 The category is 3 dcpromoui 3C8.7DC 0016 11:52:56.364 Enter FindRoleInfo dcpromoui 3C8.7DC 0017 11:52:56.364 Enter CheckIsServerCore dcpromoui 3C8.7DC 0018 11:52:56.364 It is not on server foundation dcpromoui 3C8.7DC 0019 11:52:56.364 HRESULT = 0x00000000 dcpromoui 3C8.7DC 001A 11:52:56.364 Enter GetUpdateName dcpromoui 3C8.7DC 001B 11:52:56.364 Enter GetPackageName dcpromoui 3C8.7DC 001C 11:52:57.565 Package name for Microsoft-Windows-Foundation-Package is Microsoft-Windows-Foundation-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 dcpromoui 3C8.7DC 001D 11:52:57.580 Enter CbsGetUpdateInstallState dcpromoui 3C8.7DC 001E 11:52:57.580 package name is Microsoft-Windows-Foundation-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 and update name is NetFx3 dcpromoui 3C8.7DC 001F 11:52:58.423 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0020 11:52:58.423 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0021 11:52:58.423 NetFx3 component install state is 7 dcpromoui 3C8.3B8 0022 11:52:58.423 Detecting DS component install state dcpromoui 3C8.2DC 0023 11:52:58.423 Enter CbsGetUpdateInstallState dcpromoui 3C8.2DC 0024 11:52:58.423 The category is 0 dcpromoui 3C8.2DC 0025 11:52:58.423 Enter FindRoleInfo dcpromoui 3C8.2DC 0026 11:52:58.423 Enter CheckIsServerCore dcpromoui 3C8.2DC 0027 11:52:58.423 It is not on server foundation dcpromoui 3C8.2DC 0028 11:52:58.423 HRESULT = 0x00000000 dcpromoui 3C8.2DC 0029 11:52:58.423 Enter GetUpdateName dcpromoui 3C8.2DC 002A 11:52:58.423 Enter GetPackageName dcpromoui 3C8.2DC 002B 11:52:59.218 Package name for Microsoft-Windows-Foundation-Package is Microsoft-Windows-Foundation-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 dcpromoui 3C8.2DC 002C 11:52:59.250 Enter CbsGetUpdateInstallState dcpromoui 3C8.2DC 002D 11:52:59.250 package name is Microsoft-Windows-Foundation-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 and update name is DirectoryServices-DomainController dcpromoui 3C8.2DC 002E 11:53:00.092 HRESULT = 0x00000000 dcpromoui 3C8.3B8 002F 11:53:00.092 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0030 11:53:00.092 DS component install state is 7 dcpromoui 3C8.3B8 0000 11:53:00.108 appending to log file C:\Windows\debug\dcpromoui.log dcpromoui 3C8.3B8 0001 11:53:00.108 C:\Windows\system32\dcpromo.exe dcpromoui 3C8.3B8 0002 11:53:00.108 file timestamp 07/14/2009 12:39:02.901 dcpromoui 3C8.3B8 0003 11:53:00.108 C:\Windows\system32\dcpromocmd.dll dcpromoui 3C8.3B8 0004 11:53:00.108 file timestamp 11/21/2010 00:26:03.122 dcpromoui 3C8.3B8 0005 11:53:00.108 local time 02/21/2012 11:53:00.108 dcpromoui 3C8.3B8 0006 11:53:00.108 running Windows NT 6.1 build 7601 Service Pack 1 (BuildLab:7601.win7sp1_gdr.110622-1506) amd64 dcpromoui 3C8.3B8 0007 11:53:00.108 logging flags 0011007C dcpromoui 3C8.3B8 0008 11:53:00.108 Enter DCPromoEntryW dcpromoui 3C8.3B8 0009 11:53:00.108 Enter Computer::RemoveLeadingBackslashes dcpromoui 3C8.3B8 000A 11:53:00.108 Enter Computer::Refresh dcpromoui 3C8.3B8 000B 11:53:00.108 Enter IsLocalComputer dcpromoui 3C8.3B8 000C 11:53:00.108 Enter RefreshLocalInformation dcpromoui 3C8.3B8 000D 11:53:00.108 Enter GetProductTypeFromRegistry dcpromoui 3C8.3B8 000E 11:53:00.108 Enter RegistryKey::Open System\CurrentControlSet\Control\ProductOptions dcpromoui 3C8.3B8 000F 11:53:00.108 Enter RegistryKey::GetValue-String ProductType dcpromoui 3C8.3B8 0010 11:53:00.108 ServerNT dcpromoui 3C8.3B8 0011 11:53:00.108 prodtype : 0x3 dcpromoui 3C8.3B8 0012 11:53:00.108 Enter GetSafebootOption dcpromoui 3C8.3B8 0013 11:53:00.108 Enter RegistryKey::Open System\CurrentControlSet\Control\SafeBoot\Option dcpromoui 3C8.3B8 0014 11:53:00.108 HRESULT = 0x80070002 dcpromoui 3C8.3B8 0015 11:53:00.108 returning : 0x0 dcpromoui 3C8.3B8 0016 11:53:00.108 Enter DetermineRoleAndMembership dcpromoui 3C8.3B8 0017 11:53:00.108 Enter MyDsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 0018 11:53:00.108 Enter MyDsRoleGetPrimaryDomainInformationHelper dcpromoui 3C8.3B8 0019 11:53:00.108 Calling DsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 001A 11:53:00.108 lpServer : (null) dcpromoui 3C8.3B8 001B 11:53:00.108 InfoLevel : 0x1 (DsRolePrimaryDomainInfoBasic) dcpromoui 3C8.3B8 001C 11:53:00.108 HRESULT = 0x00000000 dcpromoui 3C8.3B8 001D 11:53:00.108 MachineRole : 0x2 dcpromoui 3C8.3B8 001E 11:53:00.108 Flags : 0x0 dcpromoui 3C8.3B8 001F 11:53:00.108 DomainNameFlat : WORKGROUP dcpromoui 3C8.3B8 0020 11:53:00.108 DomainNameDns : (null) dcpromoui 3C8.3B8 0021 11:53:00.108 DomainForestName : (null) dcpromoui 3C8.3B8 0022 11:53:00.108 Enter IsDcInRepairMode dcpromoui 3C8.3B8 0023 11:53:00.108 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0024 11:53:00.108 Enter State::DetermineRunContext dcpromoui 3C8.3B8 0025 11:53:00.108 Enter DS::GetPriorServerRole dcpromoui 3C8.3B8 0026 11:53:00.108 Enter MyDsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 0027 11:53:00.108 Enter MyDsRoleGetPrimaryDomainInformationHelper dcpromoui 3C8.3B8 0028 11:53:00.108 Calling DsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 0029 11:53:00.108 lpServer : (null) dcpromoui 3C8.3B8 002A 11:53:00.108 InfoLevel : 0x2 (DsRoleUpgradeStatus) dcpromoui 3C8.3B8 002B 11:53:00.108 HRESULT = 0x00000000 dcpromoui 3C8.3B8 002C 11:53:00.108 OperationState : 0 dcpromoui 3C8.3B8 002D 11:53:00.108 PreviousServerState : 0 dcpromoui 3C8.3B8 002E 11:53:00.108 Enter Computer::GetNetbiosName dcpromoui 3C8.3B8 002F 11:53:00.108 WIN2008R2-6 dcpromoui 3C8.3B8 0030 11:53:00.108 Enter Computer::GetRole WIN2008R2-6 dcpromoui 3C8.3B8 0031 11:53:00.108 role: 2 dcpromoui 3C8.3B8 0032 11:53:00.108 NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0033 11:53:00.108 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0034 11:53:00.108 Enter State::ProcessCmdLineOnlyArgs dcpromoui 3C8.3B8 0035 11:53:00.108 Enter CArgumentsSpec::ValidateArgument answer dcpromoui 3C8.3B8 0036 11:53:00.108 Enter State::DetermineArgumentSpec dcpromoui 3C8.3B8 0037 11:53:00.108 Enter State::GetMode NORMAL dcpromoui 3C8.3B8 0038 11:53:00.108 Enter State::GetOperation NONE dcpromoui 3C8.3B8 0039 11:53:00.108 Enter ValidateArgs dcpromoui 3C8.3B8 003A 11:53:00.108 found no additional commandline options dcpromoui 3C8.3B8 003B 11:53:00.108 Enter State::SetupAnswerFile answers.txt dcpromoui 3C8.3B8 003C 11:53:00.108 Enter FS::NormalizePath answers.txt dcpromoui 3C8.3B8 003D 11:53:00.108 answerfile resolved to: C:\Users\Administrator\answers.txt dcpromoui 3C8.3B8 003E 11:53:00.108 Enter FS::GetPathSyntax C:\Users\Administrator\answers.txt dcpromoui 3C8.3B8 003F 11:53:00.108 true dcpromoui 3C8.3B8 0040 11:53:00.108 answerfile found dcpromoui 3C8.3B8 0041 11:53:00.108 answerfile will be considered for unattend settings dcpromoui 3C8.3B8 0042 11:53:00.108 Enter GetAllKeys dcpromoui 3C8.3B8 0043 11:53:00.108 Key: ReplicaOrNewDomain dcpromoui 3C8.3B8 0044 11:53:00.108 Key: ReplicaDomainDNSName dcpromoui 3C8.3B8 0045 11:53:00.108 Key: PasswordReplicationDenied dcpromoui 3C8.3B8 0046 11:53:00.108 Key: PasswordReplicationDenied dcpromoui 3C8.3B8 0047 11:53:00.108 Key: PasswordReplicationDenied dcpromoui 3C8.3B8 0048 11:53:00.108 Key: PasswordReplicationDenied dcpromoui 3C8.3B8 0049 11:53:00.108 Key: PasswordReplicationDenied dcpromoui 3C8.3B8 004A 11:53:00.108 Key: PasswordReplicationAllowed dcpromoui 3C8.3B8 004B 11:53:00.108 Key: DelegatedAdmin dcpromoui 3C8.3B8 004C 11:53:00.108 Key: SiteName dcpromoui 3C8.3B8 004D 11:53:00.108 Key: InstallDNS dcpromoui 3C8.3B8 004E 11:53:00.108 Key: ConfirmGc dcpromoui 3C8.3B8 004F 11:53:00.108 Key: CreateDNSDelegation dcpromoui 3C8.3B8 0050 11:53:00.108 Key: UserDomain dcpromoui 3C8.3B8 0051 11:53:00.108 Key: UserName dcpromoui 3C8.3B8 0052 11:53:00.108 Key: Password dcpromoui 3C8.3B8 0053 11:53:00.108 Key: DatabasePath dcpromoui 3C8.3B8 0054 11:53:00.108 Key: LogPath dcpromoui 3C8.3B8 0055 11:53:00.108 Key: SYSVOLPath dcpromoui 3C8.3B8 0056 11:53:00.108 Key: SafeModeAdminPassword dcpromoui 3C8.3B8 0057 11:53:00.108 Key: RebootOnCompletion dcpromoui 3C8.3B8 0058 11:53:00.108 Enter AnswerFile::IsKeyPresent SafeModeAdminPassword dcpromoui 3C8.3B8 0059 11:53:00.108 Enter AnswerFile::IsKeyPresentInFile SafeModeAdminPassword dcpromoui 3C8.3B8 005A 11:53:00.108 result = true dcpromoui 3C8.3B8 005B 11:53:00.108 result = true dcpromoui 3C8.3B8 005C 11:53:00.108 Enter AnswerFile::IsKeyPresentInFile AdministratorPassword dcpromoui 3C8.3B8 005D 11:53:00.108 result = false dcpromoui 3C8.3B8 005E 11:53:00.108 Enter AnswerFile::IsKeyPresentInFile DNSDelegationPassword dcpromoui 3C8.3B8 005F 11:53:00.108 result = false dcpromoui 3C8.3B8 0060 11:53:00.108 Enter AnswerFile::IsKeyPresentInFile Password dcpromoui 3C8.3B8 0061 11:53:00.123 result = true dcpromoui 3C8.3B8 0062 11:53:00.123 Enter AnswerFile::EncodedReadKey Password dcpromoui 3C8.3B8 0063 11:53:00.123 Enter AnswerFile::WriteKey Password dcpromoui 3C8.3B8 0064 11:53:00.123 Enter AnswerFile::IsKeyPresentInFile SafeModeAdminPassword dcpromoui 3C8.3B8 0065 11:53:00.123 result = true dcpromoui 3C8.3B8 0066 11:53:00.123 Enter AnswerFile::EncodedReadKey SafeModeAdminPassword dcpromoui 3C8.3B8 0067 11:53:00.123 Enter AnswerFile::WriteKey SafeModeAdminPassword dcpromoui 3C8.3B8 0068 11:53:00.123 Enter AnswerFile::IsKeyPresentInFile Syskey dcpromoui 3C8.3B8 0069 11:53:00.123 result = false dcpromoui 3C8.3B8 006A 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey ConfirmGc dcpromoui 3C8.3B8 006B 11:53:00.123 dwBufferSize 4, dwRequired 4, pszBuffer Yes dcpromoui 3C8.3B8 006C 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey CreateDNSDelegation dcpromoui 3C8.3B8 006D 11:53:00.123 dwBufferSize 3, dwRequired 3, pszBuffer No dcpromoui 3C8.3B8 006E 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey DatabasePath dcpromoui 3C8.3B8 006F 11:53:00.123 dwBufferSize 16, dwRequired 16, pszBuffer C:\Windows\NTDS dcpromoui 3C8.3B8 0070 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey DelegatedAdmin dcpromoui 3C8.3B8 0071 11:53:00.123 dwBufferSize 23, dwRequired 23, pszBuffer s4-howto\Administrator dcpromoui 3C8.3B8 0072 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey InstallDNS dcpromoui 3C8.3B8 0073 11:53:00.123 dwBufferSize 3, dwRequired 3, pszBuffer No dcpromoui 3C8.3B8 0074 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey LogPath dcpromoui 3C8.3B8 0075 11:53:00.123 dwBufferSize 16, dwRequired 16, pszBuffer C:\Windows\NTDS dcpromoui 3C8.3B8 0076 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey PasswordReplicationAllowed dcpromoui 3C8.3B8 0077 11:53:00.123 dwBufferSize 49, dwRequired 49, pszBuffer s4-howto\Allowed RODC Password Replication Group dcpromoui 3C8.3B8 0078 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey PasswordReplicationDenied dcpromoui 3C8.3B8 0079 11:53:00.123 dwBufferSize 23, dwRequired 23, pszBuffer BUILTIN\Administrators dcpromoui 3C8.3B8 007A 11:53:00.123 dwBufferSize 25, dwRequired 25, pszBuffer BUILTIN\Server Operators dcpromoui 3C8.3B8 007B 11:53:00.123 dwBufferSize 25, dwRequired 25, pszBuffer BUILTIN\Backup Operators dcpromoui 3C8.3B8 007C 11:53:00.123 dwBufferSize 26, dwRequired 26, pszBuffer BUILTIN\Account Operators dcpromoui 3C8.3B8 007D 11:53:00.123 dwBufferSize 48, dwRequired 48, pszBuffer s4-howto\Denied RODC Password Replication Group dcpromoui 3C8.3B8 007E 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey RebootOnCompletion dcpromoui 3C8.3B8 007F 11:53:00.123 dwBufferSize 3, dwRequired 3, pszBuffer No dcpromoui 3C8.3B8 0080 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey ReplicaDomainDNSName dcpromoui 3C8.3B8 0081 11:53:00.123 dwBufferSize 22, dwRequired 22, pszBuffer s4.howto.abartlet.net dcpromoui 3C8.3B8 0082 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey ReplicaOrNewDomain dcpromoui 3C8.3B8 0083 11:53:00.123 dwBufferSize 16, dwRequired 16, pszBuffer ReadOnlyReplica dcpromoui 3C8.3B8 0084 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey SiteName dcpromoui 3C8.3B8 0085 11:53:00.123 dwBufferSize 24, dwRequired 24, pszBuffer Default-First-Site-Name dcpromoui 3C8.3B8 0086 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey SYSVOLPath dcpromoui 3C8.3B8 0087 11:53:00.123 dwBufferSize 18, dwRequired 18, pszBuffer C:\Windows\SYSVOL dcpromoui 3C8.3B8 0088 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey UserDomain dcpromoui 3C8.3B8 0089 11:53:00.123 dwBufferSize 22, dwRequired 22, pszBuffer s4.howto.abartlet.net dcpromoui 3C8.3B8 008A 11:53:00.123 Enter AnswerFile::ReadMultiValuedKey UserName dcpromoui 3C8.3B8 008B 11:53:00.123 dwBufferSize 36, dwRequired 36, pszBuffer s4.howto.abartlet.net\administrator dcpromoui 3C8.3B8 008C 11:53:00.123 Enter ValidateArgs dcpromoui 3C8.3B8 008D 11:53:00.123 Enter CArgumentsSpec::ValidateArgument ConfirmGc dcpromoui 3C8.3B8 008E 11:53:00.123 Enter CArgumentsSpec::ValidateArgument CreateDNSDelegation dcpromoui 3C8.3B8 008F 11:53:00.123 Enter CArgumentsSpec::ValidateArgument DatabasePath dcpromoui 3C8.3B8 0090 11:53:00.123 Enter CArgumentsSpec::ValidateArgument DelegatedAdmin dcpromoui 3C8.3B8 0091 11:53:00.123 Enter CArgumentsSpec::ValidateArgument InstallDNS dcpromoui 3C8.3B8 0092 11:53:00.123 Enter CArgumentsSpec::ValidateArgument LogPath dcpromoui 3C8.3B8 0093 11:53:00.123 Enter CArgumentsSpec::ValidateArgument PasswordReplicationAllowed dcpromoui 3C8.3B8 0094 11:53:00.123 Enter CArgumentsSpec::ValidateArgument PasswordReplicationDenied dcpromoui 3C8.3B8 0095 11:53:00.123 Enter CArgumentsSpec::ValidateArgument RebootOnCompletion dcpromoui 3C8.3B8 0096 11:53:00.123 Enter CArgumentsSpec::ValidateArgument ReplicaDomainDNSName dcpromoui 3C8.3B8 0097 11:53:00.123 Enter CArgumentsSpec::ValidateArgument ReplicaOrNewDomain dcpromoui 3C8.3B8 0098 11:53:00.123 Enter CArgumentsSpec::ValidateArgument SiteName dcpromoui 3C8.3B8 0099 11:53:00.123 Enter CArgumentsSpec::ValidateArgument SYSVOLPath dcpromoui 3C8.3B8 009A 11:53:00.123 Enter CArgumentsSpec::ValidateArgument UserDomain dcpromoui 3C8.3B8 009B 11:53:00.123 Enter CArgumentsSpec::ValidateArgument UserName dcpromoui 3C8.3B8 009C 11:53:00.123 all options valid dcpromoui 3C8.3B8 009D 11:53:00.123 Enter ValidateArgs dcpromoui 3C8.3B8 009E 11:53:00.123 Enter CArgumentsSpec::ValidateArgument Password dcpromoui 3C8.3B8 009F 11:53:00.123 Enter CArgumentsSpec::ValidateArgument SafeModeAdminPassword dcpromoui 3C8.3B8 00A0 11:53:00.123 all options valid dcpromoui 3C8.3B8 00A1 11:53:00.123 Enter State::GetOperation NONE dcpromoui 3C8.3B8 00A2 11:53:00.123 Enter IsAnswerFileKeyPresent2 SkipAutoConfigDns dcpromoui 3C8.3B8 00A3 11:53:00.123 Enter AnswerFile::IsKeyPresent SkipAutoConfigDns dcpromoui 3C8.3B8 00A4 11:53:00.123 Enter AnswerFile::IsKeyPresentInFile SkipAutoConfigDns dcpromoui 3C8.3B8 00A5 11:53:00.123 result = false dcpromoui 3C8.3B8 00A6 11:53:00.123 result = false dcpromoui 3C8.3B8 00A7 11:53:00.123 Enter GetAnswerFileOption RebootOnSuccess dcpromoui 3C8.3B8 00A8 11:53:00.123 Enter AnswerFile::GetOption RebootOnSuccess dcpromoui 3C8.3B8 00A9 11:53:00.123 trying value from answerfile dcpromoui 3C8.3B8 00AA 11:53:00.123 dcpromoui 3C8.3B8 00AB 11:53:00.123 Enter GetAnswerFileOption RebootOnCompletion dcpromoui 3C8.3B8 00AC 11:53:00.123 Enter AnswerFile::GetOption RebootOnCompletion dcpromoui 3C8.3B8 00AD 11:53:00.123 trying value from answerfile dcpromoui 3C8.3B8 00AE 11:53:00.123 using value from answer file dcpromoui 3C8.3B8 00AF 11:53:00.123 No dcpromoui 3C8.3B8 00B0 11:53:00.123 Enter GetAnswerFileOption TransferIMRoleIfNecessary dcpromoui 3C8.3B8 00B1 11:53:00.123 Enter AnswerFile::GetOption TransferIMRoleIfNecessary dcpromoui 3C8.3B8 00B2 11:53:00.123 trying value from answerfile dcpromoui 3C8.3B8 00B3 11:53:00.123 dcpromoui 3C8.3B8 00B4 11:53:00.123 Enter FS::GetPathSyntax C:\Users\Administrator dcpromoui 3C8.3B8 00B5 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 00B6 11:53:00.123 Enter InitDnsClientConfigFlag dcpromoui 3C8.3B8 00B7 11:53:00.123 Enter GetConfigFlag ConfigureDnsClient dcpromoui 3C8.3B8 00B8 11:53:00.123 Enter RegistryKey::Open Software\Microsoft\Windows\CurrentVersion\AdminDebug\dcpromoui dcpromoui 3C8.3B8 00B9 11:53:00.123 Enter RegistryKey::GetValue-DWORD ConfigureDnsClient dcpromoui 3C8.3B8 00BA 11:53:00.123 HRESULT = 0x80070002 dcpromoui 3C8.3B8 00BB 11:53:00.123 result = true dcpromoui 3C8.3B8 00BC 11:53:00.123 result = true dcpromoui 3C8.3B8 00BD 11:53:00.123 Enter ReadGlobalCatalogByDefaultFlag dcpromoui 3C8.3B8 00BE 11:53:00.123 Enter GetConfigFlag GCByDefault dcpromoui 3C8.3B8 00BF 11:53:00.123 Enter RegistryKey::Open Software\Microsoft\Windows\CurrentVersion\AdminDebug\dcpromoui dcpromoui 3C8.3B8 00C0 11:53:00.123 Enter RegistryKey::GetValue-DWORD GCByDefault dcpromoui 3C8.3B8 00C1 11:53:00.123 HRESULT = 0x80070002 dcpromoui 3C8.3B8 00C2 11:53:00.123 result = true dcpromoui 3C8.3B8 00C3 11:53:00.123 result = true dcpromoui 3C8.3B8 00C4 11:53:00.123 Enter ReadAllowIscsiFlag dcpromoui 3C8.3B8 00C5 11:53:00.123 Enter GetConfigFlag AllowIscsi dcpromoui 3C8.3B8 00C6 11:53:00.123 Enter RegistryKey::Open Software\Microsoft\Windows\CurrentVersion\AdminDebug\dcpromoui dcpromoui 3C8.3B8 00C7 11:53:00.123 Enter RegistryKey::GetValue-DWORD AllowIscsi dcpromoui 3C8.3B8 00C8 11:53:00.123 HRESULT = 0x80070002 dcpromoui 3C8.3B8 00C9 11:53:00.123 result = true dcpromoui 3C8.3B8 00CA 11:53:00.123 result = false dcpromoui 3C8.3B8 00CB 11:53:00.123 Enter ValidateAnswerFile dcpromoui 3C8.3B8 00CC 11:53:00.123 Enter AnswerFile::Validate dcpromoui 3C8.3B8 00CD 11:53:00.123 Enter State::GetUnclearedAnswerFilePasswords dcpromoui 3C8.3B8 00CE 11:53:00.123 Enter State::GetUnclearedAnswerFilePasswordReaons dcpromoui 3C8.3B8 00CF 11:53:00.123 Enter State::GetValidationWarnings dcpromoui 3C8.3B8 00D0 11:53:00.123 Enter Start dcpromoui 3C8.3B8 00D1 11:53:00.123 Enter InitFunct dcpromoui 3C8.3B8 00D2 11:53:00.123 Enter State::GetMode NORMAL dcpromoui 3C8.3B8 00D3 11:53:00.123 Enter IsCurrentUserAdministrator dcpromoui 3C8.3B8 00D4 11:53:00.123 Current user is an admin dcpromoui 3C8.3B8 00D5 11:53:00.123 Enter CheckCertService dcpromoui 3C8.3B8 00D6 11:53:00.123 Enter NTService::IsInstalled CertSvc dcpromoui 3C8.3B8 00D7 11:53:00.123 Enter MyOpenService dcpromoui 3C8.3B8 00D8 11:53:00.123 Enter Win::OpenSCManager dcpromoui 3C8.3B8 00D9 11:53:00.123 Enter Win::OpenService CertSvc dcpromoui 3C8.3B8 00DA 11:53:00.123 HRESULT = 0x80070424 dcpromoui 3C8.3B8 00DB 11:53:00.123 Enter CheckSafeBootMode dcpromoui 3C8.3B8 00DC 11:53:00.123 Enter RegistryKey::Open System\CurrentControlSet\Control\Safeboot\Option dcpromoui 3C8.3B8 00DD 11:53:00.123 HRESULT = 0x80070002 dcpromoui 3C8.3B8 00DE 11:53:00.123 Enter CheckRoleChangeState dcpromoui 3C8.3B8 00DF 11:53:00.123 Enter MyDsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 00E0 11:53:00.123 Enter MyDsRoleGetPrimaryDomainInformationHelper dcpromoui 3C8.3B8 00E1 11:53:00.123 Calling DsRoleGetPrimaryDomainInformation dcpromoui 3C8.3B8 00E2 11:53:00.123 lpServer : (null) dcpromoui 3C8.3B8 00E3 11:53:00.123 InfoLevel : 0x3 (DsRoleOperationState) dcpromoui 3C8.3B8 00E4 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 00E5 11:53:00.123 OperationState : 0x0 dcpromoui 3C8.3B8 00E6 11:53:00.123 Enter CheckPlatform dcpromoui 3C8.3B8 00E7 11:53:00.123 Enter Computer::GetNetbiosName dcpromoui 3C8.3B8 00E8 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 00E9 11:53:00.123 Enter Computer::GetRole WIN2008R2-6 dcpromoui 3C8.3B8 00EA 11:53:00.123 role: 2 dcpromoui 3C8.3B8 00EB 11:53:00.123 Enter CheckForNtfs5 dcpromoui 3C8.3B8 00EC 11:53:00.123 Enter GetFirstNtfs5HardDrive dcpromoui 3C8.3B8 00ED 11:53:00.123 C:\ dcpromoui 3C8.3B8 00EE 11:53:00.123 Enter FS::GetFileSystemType dcpromoui 3C8.3B8 00EF 11:53:00.123 Enter FS::GetRootFolder C:\ dcpromoui 3C8.3B8 00F0 11:53:00.123 Enter FS::GetPathSyntax C:\ dcpromoui 3C8.3B8 00F1 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 00F2 11:53:00.123 Enter IsSupportedDriveType dcpromoui 3C8.3B8 00F3 11:53:00.123 C:\ is NTFS5 dcpromoui 3C8.3B8 00F4 11:53:00.123 C:\ dcpromoui 3C8.3B8 00F5 11:53:00.123 Enter CheckWindirSpace dcpromoui 3C8.3B8 00F6 11:53:00.123 Enter checkDiskSpace dcpromoui 3C8.3B8 00F7 11:53:00.123 Enter FS::GetRootFolder C:\Windows dcpromoui 3C8.3B8 00F8 11:53:00.123 Enter FS::GetPathSyntax C:\Windows dcpromoui 3C8.3B8 00F9 11:53:00.123 Enter FS::GetAvailableSpace C:\ dcpromoui 3C8.3B8 00FA 11:53:00.123 Enter CheckComputerWasRenamedAndNeedsReboot dcpromoui 3C8.3B8 00FB 11:53:00.123 Enter ComputerWasRenamedAndNeedsReboot dcpromoui 3C8.3B8 00FC 11:53:00.123 Enter Computer::GetActivePhysicalNetbiosName dcpromoui 3C8.3B8 00FD 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 00FE 11:53:00.123 Enter Computer::GetFuturePhysicalNetbiosName dcpromoui 3C8.3B8 00FF 11:53:00.123 Enter RegistryKey::Open System\CurrentControlSet\Control\ComputerName\ComputerName dcpromoui 3C8.3B8 0100 11:53:00.123 Enter RegistryKey::GetValue-String ComputerName dcpromoui 3C8.3B8 0101 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0102 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 0103 11:53:00.123 Enter IsTcpIpInstalled dcpromoui 3C8.3B8 0104 11:53:00.123 TCP/IP is detected dcpromoui 3C8.3B8 0105 11:53:00.123 Enter Computer::GetActivePhysicalFullDnsName dcpromoui 3C8.3B8 0106 11:53:00.123 Enter Computer::ComposeFullDnsComputerName hostname: WIN2008R2-6 suffix: dcpromoui 3C8.3B8 0107 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 0108 11:53:00.123 Enter Computer::GetFuturePhysicalFullDnsName dcpromoui 3C8.3B8 0109 11:53:00.123 Enter Computer::GetActivePhysicalFullDnsName dcpromoui 3C8.3B8 010A 11:53:00.123 Enter Computer::ComposeFullDnsComputerName hostname: WIN2008R2-6 suffix: dcpromoui 3C8.3B8 010B 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 010C 11:53:00.123 Enter RegistryKey::Open System\CurrentControlSet\Services\Tcpip\Parameters dcpromoui 3C8.3B8 010D 11:53:00.123 Enter RegistryKey::GetValue-String NV Hostname dcpromoui 3C8.3B8 010E 11:53:00.123 Enter RegistryKey::GetValue-String NV Domain dcpromoui 3C8.3B8 010F 11:53:00.123 Enter Computer::IsDnsSuffixPolicyInEffect dcpromoui 3C8.3B8 0110 11:53:00.123 Enter RegistryKey::Open Software\Policies\Microsoft\System\DNSclient dcpromoui 3C8.3B8 0111 11:53:00.123 false dcpromoui 3C8.3B8 0112 11:53:00.123 dcpromoui 3C8.3B8 0113 11:53:00.123 Enter Computer::ComposeFullDnsComputerName hostname: WIN2008R2-6 suffix: dcpromoui 3C8.3B8 0114 11:53:00.123 HRESULT = 0x80070002 dcpromoui 3C8.3B8 0115 11:53:00.123 WIN2008R2-6 dcpromoui 3C8.3B8 0116 11:53:00.123 Enter Dns::CompareNames WIN2008R2-6 vs WIN2008R2-6 dcpromoui 3C8.3B8 0117 11:53:00.123 Calling DnsNameCompareEx_W dcpromoui 3C8.3B8 0118 11:53:00.123 pszLeftName : WIN2008R2-6 dcpromoui 3C8.3B8 0119 11:53:00.123 pszRightName : WIN2008R2-6 dcpromoui 3C8.3B8 011A 11:53:00.123 dwReserved : 0 dcpromoui 3C8.3B8 011B 11:53:00.123 Result 0x1 dcpromoui 3C8.3B8 011C 11:53:00.123 relation: DnsNameCompareEqual dcpromoui 3C8.3B8 011D 11:53:00.123 No pending computer name change dcpromoui 3C8.3B8 011E 11:53:00.123 result = false dcpromoui 3C8.3B8 011F 11:53:00.123 Enter CheckDCServiceForDemotion dcpromoui 3C8.3B8 0120 11:53:00.123 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0121 11:53:00.123 Enter IsComputerNameOk dcpromoui 3C8.3B8 0122 11:53:00.123 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0123 11:53:00.123 Enter IsTcpIpInstalled dcpromoui 3C8.3B8 0124 11:53:00.123 TCP/IP is detected dcpromoui 3C8.3B8 0125 11:53:00.123 Enter MyDnsValidateName WIN2008R2-6 dcpromoui 3C8.3B8 0126 11:53:00.123 Calling DnsValidateName dcpromoui 3C8.3B8 0127 11:53:00.123 pszName : WIN2008R2-6 dcpromoui 3C8.3B8 0128 11:53:00.123 Format : 3 dcpromoui 3C8.3B8 0129 11:53:00.123 status 0x0 dcpromoui 3C8.3B8 012A 11:53:00.123 ERROR_SUCCESS dcpromoui 3C8.3B8 012B 11:53:00.123 status = 0 dcpromoui 3C8.3B8 012C 11:53:00.123 Enter ForceRemovalFSMOsSafelyOffMachineCheck dcpromoui 3C8.3B8 012D 11:53:00.123 Enter State::IsForcedDemotion false dcpromoui 3C8.3B8 012E 11:53:00.123 Non forced demotion, FSMOs will be taken care of somewhere else. dcpromoui 3C8.3B8 012F 11:53:00.123 FSMOs found: 0x00000000 dcpromoui 3C8.3B8 0130 11:53:00.123 Enter AreRequiredPortsAvailable dcpromoui 3C8.3B8 0131 11:53:00.123 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0132 11:53:00.123 Enter EnumerateRequiredPortsInUse dcpromoui 3C8.3B8 0133 11:53:00.123 Enter CheckPortAvailability 88 dcpromoui 3C8.3B8 0134 11:53:00.123 Enter CheckPortAvailabilityEx 88 dcpromoui 3C8.3B8 0135 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0136 11:53:00.123 Enter CheckPortAvailability 389 dcpromoui 3C8.3B8 0137 11:53:00.123 Enter CheckPortAvailabilityEx 389 dcpromoui 3C8.3B8 0138 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0139 11:53:00.123 Enter CheckPortAvailability 636 dcpromoui 3C8.3B8 013A 11:53:00.123 Enter CheckPortAvailabilityEx 636 dcpromoui 3C8.3B8 013B 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 013C 11:53:00.123 Enter CheckPortAvailability 3268 dcpromoui 3C8.3B8 013D 11:53:00.123 Enter CheckPortAvailabilityEx 3268 dcpromoui 3C8.3B8 013E 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 013F 11:53:00.123 Enter CheckPortAvailability 3269 dcpromoui 3C8.3B8 0140 11:53:00.123 Enter CheckPortAvailabilityEx 3269 dcpromoui 3C8.3B8 0141 11:53:00.123 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0142 11:53:00.139 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0143 11:53:00.139 No required ports already in use dcpromoui 3C8.3B8 0144 11:53:00.139 true dcpromoui 3C8.3B8 0145 11:53:00.139 performed state 1, next state 2 dcpromoui 3C8.3B8 0146 11:53:00.139 Enter WelcomeFunct dcpromoui 3C8.3B8 0147 11:53:00.139 Enter State::GetMode NORMAL dcpromoui 3C8.3B8 0148 11:53:00.139 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0149 11:53:00.139 performed state 2, next state 6 dcpromoui 3C8.3B8 014A 11:53:00.139 Enter CompatibilityFunct dcpromoui 3C8.3B8 014B 11:53:00.139 Enter State::GetMode NORMAL dcpromoui 3C8.3B8 014C 11:53:00.139 Enter State::AddFinishMessage Windows Server 2008 and "Windows Server 2008 R2" domain controllers have a new more secure default for the security setting named "Allow cryptography algorithms compatible with Windows NT 4.0." This setting prevents Microsoft Windows and non-Microsoft SMB "clients" from using weaker NT 4.0 style cryptography algorithms when establishing security channel sessions against Windows Server 2008 or "Windows Server 2008 R2" domain controllers. As a result of this new default, operations or applications that require a security channel serviced by Windows Server 2008 or "Windows Server 2008 R2" domain controllers might fail. Platforms impacted by this change include Windows NT 4.0, as well as non-Microsoft SMB "clients" and network-attached storage (NAS) devices that do not support stronger cryptography algorithms. Some operations on clients running versions of Windows earlier than Windows Vista with Service Pack 1 are also impacted, including domain join operations performed by the Active Directory Migration Tool or Windows Deployment Services. For more information about this setting, see Knowledge Base article 942564 (http://go.microsoft.com/fwlink/?LinkId=104751). dcpromoui 3C8.3B8 014D 11:53:00.139 performed state 6, next state 3 dcpromoui 3C8.3B8 014E 11:53:00.139 Enter InstallTcpipFunct dcpromoui 3C8.3B8 014F 11:53:00.139 Enter IsTcpIpInstalled dcpromoui 3C8.3B8 0150 11:53:00.139 TCP/IP is detected dcpromoui 3C8.3B8 0151 11:53:00.139 Enter IsTcpIpFunctioning dcpromoui 3C8.3B8 0152 11:53:00.139 is a valid IP address dcpromoui 3C8.3B8 0153 11:53:00.139 TCP/IP is functioning dcpromoui 3C8.3B8 0154 11:53:00.139 Enter State::GetRunContext NT5_STANDALONE_SERVER dcpromoui 3C8.3B8 0155 11:53:00.139 performed state 3, next state 5 dcpromoui 3C8.3B8 0156 11:53:00.139 Enter ConfigDnsClientFunct dcpromoui 3C8.3B8 0157 11:53:00.139 Enter GetAnswerFileOption DNSOnNetwork dcpromoui 3C8.3B8 0158 11:53:00.139 Enter AnswerFile::GetOption DNSOnNetwork dcpromoui 3C8.3B8 0159 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 015A 11:53:00.139 dcpromoui 3C8.3B8 015B 11:53:00.139 Enter State::SetDNSOnNetwork true dcpromoui 3C8.3B8 015C 11:53:00.139 Enter Dns::IsClientConfigured dcpromoui 3C8.3B8 015D 11:53:00.139 Calling DnsQueryConfig(DnsConfigDnsServers, 0, NULL, 0, &buf, &dwBufLen) dcpromoui 3C8.3B8 015E 11:53:00.139 Result 0xEA dcpromoui 3C8.3B8 015F 11:53:00.139 ERROR_MORE_DATA dcpromoui 3C8.3B8 0160 11:53:00.139 DNS client is configured dcpromoui 3C8.3B8 0161 11:53:00.139 Enter State::GetMode NORMAL dcpromoui 3C8.3B8 0162 11:53:00.139 performed state 5, next state 21 dcpromoui 3C8.3B8 0163 11:53:00.139 Enter NewOrExistingForestFunct dcpromoui 3C8.3B8 0164 11:53:00.139 Enter CheckForForestDomainOptions dcpromoui 3C8.3B8 0165 11:53:00.139 Enter GetAnswerFileOption ReplicaOrNewDomain dcpromoui 3C8.3B8 0166 11:53:00.139 Enter AnswerFile::GetOption ReplicaOrNewDomain dcpromoui 3C8.3B8 0167 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 0168 11:53:00.139 using value from answer file dcpromoui 3C8.3B8 0169 11:53:00.139 ReadOnlyReplica dcpromoui 3C8.3B8 016A 11:53:00.139 Enter GetAnswerFileOption NewDomain dcpromoui 3C8.3B8 016B 11:53:00.139 Enter AnswerFile::GetOption NewDomain dcpromoui 3C8.3B8 016C 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 016D 11:53:00.139 dcpromoui 3C8.3B8 016E 11:53:00.139 Creating replica dcpromoui 3C8.3B8 016F 11:53:00.139 Enter State::SetOperation REPLICA dcpromoui 3C8.3B8 0170 11:53:00.139 performed state 21, next state 7 dcpromoui 3C8.3B8 0171 11:53:00.139 Enter GetCredentialsFunct dcpromoui 3C8.3B8 0172 11:53:00.139 Enter ShouldSkipCredentialsPage dcpromoui 3C8.3B8 0173 11:53:00.139 Enter State::GetOperation REPLICA dcpromoui 3C8.3B8 0174 11:53:00.139 Enter GetAnswerFileOption UserName dcpromoui 3C8.3B8 0175 11:53:00.139 Enter AnswerFile::GetOption UserName dcpromoui 3C8.3B8 0176 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 0177 11:53:00.139 using value from answer file dcpromoui 3C8.3B8 0178 11:53:00.139 s4.howto.abartlet.net\administrator dcpromoui 3C8.3B8 0179 11:53:00.139 Enter GetEncryptedAnswerFileOption Password dcpromoui 3C8.3B8 017A 11:53:00.139 Enter AnswerFile::GetEncryptedOption Password dcpromoui 3C8.3B8 017B 11:53:00.139 Enter GetAnswerFileOption UserDomain dcpromoui 3C8.3B8 017C 11:53:00.139 Enter AnswerFile::GetOption UserDomain dcpromoui 3C8.3B8 017D 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 017E 11:53:00.139 using value from answer file dcpromoui 3C8.3B8 017F 11:53:00.139 s4.howto.abartlet.net dcpromoui 3C8.3B8 0180 11:53:00.139 Enter GetAnswerFileOption2 ReplicaDomainDNSName dcpromoui 3C8.3B8 0181 11:53:00.139 Enter GetAnswerFileOption ReplicaDomainDNSName dcpromoui 3C8.3B8 0182 11:53:00.139 Enter AnswerFile::GetOption ReplicaDomainDNSName dcpromoui 3C8.3B8 0183 11:53:00.139 trying value from answerfile dcpromoui 3C8.3B8 0184 11:53:00.139 using value from answer file dcpromoui 3C8.3B8 0185 11:53:00.139 s4.howto.abartlet.net dcpromoui 3C8.3B8 0186 11:53:00.139 Enter State::GetOperation REPLICA dcpromoui 3C8.3B8 0187 11:53:00.139 Enter GetForestName s4.howto.abartlet.net dcpromoui 3C8.3B8 0188 11:53:00.139 Enter MyDsGetDcName dcpromoui 3C8.3B8 0189 11:53:00.139 Enter MyDsGetDcName2 dcpromoui 3C8.3B8 018A 11:53:00.139 Calling DsGetDcName dcpromoui 3C8.3B8 018B 11:53:00.139 ComputerName : (null) dcpromoui 3C8.3B8 018C 11:53:00.139 DomainName : s4.howto.abartlet.net dcpromoui 3C8.3B8 018D 11:53:00.139 DomainGuid : (null) dcpromoui 3C8.3B8 018E 11:53:00.139 SiteName : (null) dcpromoui 3C8.3B8 018F 11:53:00.139 Flags : 0x40000000 dcpromoui 3C8.3B8 0190 11:53:00.264 HRESULT = 0x00000000 dcpromoui 3C8.3B8 0191 11:53:00.264 DomainControllerName : \\obed.s4.howto.abartlet.net dcpromoui 3C8.3B8 0192 11:53:00.264 DomainControllerAddress : \\192.168.122.3 dcpromoui 3C8.3B8 0193 11:53:00.264 DomainGuid : {5B45A2C8-503A-41EC-821E-49770A04878B} dcpromoui 3C8.3B8 0194 11:53:00.264 DomainName : s4.howto.abartlet.net dcpromoui 3C8.3B8 0195 11:53:00.264 DnsForestName : s4.howto.abartlet.net dcpromoui 3C8.3B8 0196 11:53:00.264 Flags : 0xE00013FD: dcpromoui 3C8.3B8 0197 11:53:00.264 DcSiteName : Default-First-Site-Name dcpromoui 3C8.3B8 0198 11:53:00.264 ClientSiteName : Default-First-Site-Name dcpromoui 3C8.3B8 0199 11:53:00.264 using forest name s4.howto.abartlet.net dcpromoui 3C8.3B8 019A 11:53:00.264 Enter State::GetOperation REPLICA dcpromoui 3C8.3B8 019B 11:53:00.264 Enter State::SetForestName s4.howto.abartlet.net dcpromoui 3C8.3B8 019C 11:53:00.264 Enter State::SetTargetDomainName s4.howto.abartlet.net dcpromoui 3C8.3B8 019D 11:53:00.264 Enter MyCredUIParseUserName dcpromoui 3C8.3B8 019E 11:53:00.264 userName: s4.howto.abartlet.net\administrator defaultDomainName: s4.howto.abartlet.net dcpromoui 3C8.3B8 019F 11:53:00.264 pszParsedUserName: administrator pszParsedDomainName: s4.howto.abartlet.net dwRc: 0 dcpromoui 3C8.3B8 01A0 11:53:00.264 user: administrator domain: s4.howto.abartlet.net fullUserName: s4.howto.abartlet.net\administrator dwRc: 0 dcpromoui 3C8.3B8 01A1 11:53:00.264 Enter CheckUserIsLocal dcpromoui 3C8.3B8 01A2 11:53:00.264 Enter State::ReadDomains dcpromoui 3C8.3B8 01A3 11:53:00.264 Enter State::GetOperation REPLICA dcpromoui 3C8.3B8 01A4 11:53:00.264 Enter State::GetTargetDomainName s4.howto.abartlet.net dcpromoui 3C8.3B8 01A5 11:53:00.264 Enter ReadDomains dcpromoui 3C8.3B8 01A6 11:53:00.264 Enter MyDsEnumerateDomainTrusts dcpromoui 3C8.3B8 01A7 11:53:00.264 Enter GetDcName dcpromoui 3C8.3B8 01A8 11:53:00.264 Enter GetDcName2 dcpromoui 3C8.3B8 01A9 11:53:00.264 Enter MyDsGetDcName2 dcpromoui 3C8.3B8 01AA 11:53:00.264 Calling DsGetDcName dcpromoui 3C8.3B8 01AB 11:53:00.264 ComputerName : (null) dcpromoui 3C8.3B8 01AC 11:53:00.264 DomainName : s4.howto.abartlet.net dcpromoui 3C8.3B8 01AD 11:53:00.264 DomainGuid : (null) dcpromoui 3C8.3B8 01AE 11:53:00.264 SiteName : (null) dcpromoui 3C8.3B8 01AF 11:53:00.264 Flags : 0x40000011 dcpromoui 3C8.3B8 01B0 11:53:00.373 HRESULT = 0x00000000 dcpromoui 3C8.3B8 01B1 11:53:00.373 DomainControllerName : \\obed.s4.howto.abartlet.net dcpromoui 3C8.3B8 01B2 11:53:00.373 DomainControllerAddress : \\192.168.122.3 dcpromoui 3C8.3B8 01B3 11:53:00.373 DomainGuid : {5B45A2C8-503A-41EC-821E-49770A04878B} dcpromoui 3C8.3B8 01B4 11:53:00.373 DomainName : s4.howto.abartlet.net dcpromoui 3C8.3B8 01B5 11:53:00.373 DnsForestName : s4.howto.abartlet.net dcpromoui 3C8.3B8 01B6 11:53:00.373 Flags : 0xE00013FD: dcpromoui 3C8.3B8 01B7 11:53:00.373 DcSiteName : Default-First-Site-Name dcpromoui 3C8.3B8 01B8 11:53:00.373 ClientSiteName : Default-First-Site-Name dcpromoui 3C8.3B8 01B9 11:53:00.373 Enter Computer::RemoveLeadingBackslashes \\obed.s4.howto.abartlet.net dcpromoui 3C8.3B8 01BA 11:53:00.373 obed.s4.howto.abartlet.net dcpromoui 3C8.3B8 01BB 11:53:00.373 Enter AutoWNetConnection::Init dcpromoui 3C8.3B8 01BC 11:53:00.373 Enter AutoWNetConnection::CloseExistingConnection dcpromoui 3C8.3B8 01BD 11:53:00.373 pszComputerName : obed.s4.howto.abartlet.net dcpromoui 3C8.3B8 01BE 11:53:00.373 pszUserName : s4.howto.abartlet.net\administrator dcpromoui 3C8.3B8 01BF 11:53:00.576 WNetAddConnection2W returned 0. dcpromoui 3C8.3B8 01C0 11:53:00.576 HRESULT = 0x00000000 dcpromoui 3C8.3B8 01C1 11:53:00.576 NetStatus = 0 dcpromoui 3C8.3B8 01C2 11:53:00.576 Enter AutoWNetConnection::CloseExistingConnection dcpromoui 3C8.3B8 01C3 11:53:00.576 WNetCancelConnection2W returned 0. dcpromoui 3C8.3B8 01C4 11:53:00.576 HRESULT = 0x00000000 echo END DCPROMO logC5 11:53:00.576 domain found: s4.howto.abartlet.net dcpromoui 3C8.3B8 01C6 11:53:00.576 HRESULT = 0x00000000 dcpromoui 3C8.3B8 01C7 11:53:00.576 Enter GetCredentialsFunct_DetermineNextState dcpromoui 3C8.3B8 01C8 11:53:00.576 Enter State::GetOperation REPLICA dcpromoui 3C8.3B8 01C9 11:53:00.576 Enter State::GetMCleaning up ... restoring /etc/resolv.conf $ mv -f /etc/resolv.conf.wintest-bak /etc/resolv.conf Traceback (most recent call last): File "./wintest/test-s4-howto.py", line 734, in test_howto(t) File "./wintest/test-s4-howto.py", line 654, in test_howto run_dcpromo_rodc(t, "W2K8R2C") File "./wintest/test-s4-howto.py", line 356, in run_dcpromo_rodc raise Exception("dcpromo failed")