SYMPTOMS
When you try to view NTFS or share permissions on a Windows
2000 member server or a computer that runs Windows 2000 Professional or Windows
XP, the Security Identifiers (SIDs) are displayed, but the account or group to
which the SIDs correspond is not displayed.
Additionally, an error
message similar to one of the following may be displayed in the Application
Event log:
Source: Userenv
Category: None
Type:
Error
Event ID: 1000
Description: Windows cannot determine the
user or computer name. Return value (5).
-or-
Source: Userenv
Category: None
Type: Error
Event ID:
1053
Description: Windows cannot determine the user or computer name.
(Access is denied.). Group Policy processing aborted.
The Gpresult.exe
command-line tool from the resource kit may show information similar to the
following example:
The user is a member of the following security groups:
LookupAccountSid failed with 1789.
\Everyone
BUILTIN\Users
BUILTIN\Administrators
LookupAccountSid failed with 1789.
LookupAccountSid failed with 1789.
LookupAccountSid failed with 1789.
\LOCAL
NT AUTHORITY\INTERACTIVE
NT AUTHORITY\Authenticated Users
The 1789 error is listed for every global group in which the user
is a member.
RESOLUTION
In an appropriate Group Policy Object at the Domain
Controllers container (most likely the Default Domain Controllers Policy),
ensure that the appropriate groups are listed in the "Access this Computer from
the Network" permission. You can find this permission in the following folder:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
The following groups have the "Access this Computer from the
Network" permission on domain controllers by default:
Administrators
Authenticated Users
Everyone
NOTE: Include the Everyone group in the list of groups because certain
operations involve accounts that may not have been authenticated to the domain
yet. Examples of these operations include when a user changes an expired
password at logon, or when a user in a trusting domain needs to anonymously
enumerate users and groups to apply Access Control Lists (ACLs) in the trusting
domain (for Microsoft Windows NT 4.0 or inter-forest trusts).