Metanis
Well-Known Member
- Reaction score
- 941
- Location
- Medford, WI, USA
While troubleshooting Windows 10 related Network Browsing issues (documented at https://www.technibble.com/forums/t...orking-smb-configuration-in-windows-10.68432/ ), I also discovered my new Windows 10 workstations were experiencing consistent problems applying domain group policies.
My primary Microsoft domain controller is a 2008R2 box. My Windows 10 workstations had been in-place upgraded from Windows 8.1 and I know that Group Policy was working fine at one point because I use WSUS and it is configured on the workstations via a domain-wide group policy.
My initial troubleshooting led me toward network authentication issues because of the 1058 error I would see in the event logs. The 1058 error points in 3 different directions. Since I was already having network browsing issues I initially tried to resolve the problems with SMB versions.
After fixing the SMB and network browsing issue, my group policy problems were still not resolved. So I endeavoured to confirm and verify my DNS environment. (I do a lot of experimentation with different Servers so there were some Active Directory metadata issues to resolve.) But eventually a "dcdiag /test
NS" on my domain controller displayed clean. But it still didn't fix my group policy issues.
The next logical step was obvious but I missed it at first. But eventually I removed the workstations from the domain and rebooted. Then I changed the machine's name and rebooted, finally I put it back in the domain and rebooted again. This cleaned up some old "stuck" policies, but I still wasn't getting the current domain policies. My error message when using the "gpresult /H gpreport.html" command-line option changed however. It no longer report authentication issues, it now reported "network path not found"! So I had moved the problem a bit farther down the line.
That was the clue which allowed me to find the issue with "hardened paths". It seems Microsoft had a security vulnerability with Group Policy being spoofed. They quietly fixed it in early 2015 with a feature called Hardened Paths which tries to ensure your group policies can only be provided by a properly authenticated domain controller.
At this point I don't know or even care why, but my 2008R2 server cannot properly handle "hardened paths". The temporary (maybe permanent) fix is to turn off the feature on each server and workstation. This is done by creating 2 registry keys and then restarting the boxes.
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths /v "\\*\SYSVOL" /d "RequireMutualAuthentication=0" /t REG_SZ /f
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths /v "\\*\NETLOGON" /d "RequireMutualAuthentication=0" /t REG_SZ /f
In conclusion, my network is back to 100% after enabling all 3 flavors of SMB, disabling the Hardened Path option, and (workstation only) removing, renaming, and rejoining the domain. I'm just throwing this out here in case it can help someone else.
My primary Microsoft domain controller is a 2008R2 box. My Windows 10 workstations had been in-place upgraded from Windows 8.1 and I know that Group Policy was working fine at one point because I use WSUS and it is configured on the workstations via a domain-wide group policy.
My initial troubleshooting led me toward network authentication issues because of the 1058 error I would see in the event logs. The 1058 error points in 3 different directions. Since I was already having network browsing issues I initially tried to resolve the problems with SMB versions.
After fixing the SMB and network browsing issue, my group policy problems were still not resolved. So I endeavoured to confirm and verify my DNS environment. (I do a lot of experimentation with different Servers so there were some Active Directory metadata issues to resolve.) But eventually a "dcdiag /test

The next logical step was obvious but I missed it at first. But eventually I removed the workstations from the domain and rebooted. Then I changed the machine's name and rebooted, finally I put it back in the domain and rebooted again. This cleaned up some old "stuck" policies, but I still wasn't getting the current domain policies. My error message when using the "gpresult /H gpreport.html" command-line option changed however. It no longer report authentication issues, it now reported "network path not found"! So I had moved the problem a bit farther down the line.
That was the clue which allowed me to find the issue with "hardened paths". It seems Microsoft had a security vulnerability with Group Policy being spoofed. They quietly fixed it in early 2015 with a feature called Hardened Paths which tries to ensure your group policies can only be provided by a properly authenticated domain controller.
At this point I don't know or even care why, but my 2008R2 server cannot properly handle "hardened paths". The temporary (maybe permanent) fix is to turn off the feature on each server and workstation. This is done by creating 2 registry keys and then restarting the boxes.
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths /v "\\*\SYSVOL" /d "RequireMutualAuthentication=0" /t REG_SZ /f
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths /v "\\*\NETLOGON" /d "RequireMutualAuthentication=0" /t REG_SZ /f
In conclusion, my network is back to 100% after enabling all 3 flavors of SMB, disabling the Hardened Path option, and (workstation only) removing, renaming, and rejoining the domain. I'm just throwing this out here in case it can help someone else.