How to Troubleshooting Group Policy by Using Log Files

Client Log Files for Troubleshooting Group Policy

Output from: Is located in this file: Enable verbose logging by adding this key or value… …to this registry key
Group Policy core (UserEnv) and registry CSE %windir%\debug\usermode
\UserEnv.log
UserEnvDebugLevel = REG_DWORD 30002 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Winlogon
Security CSE %windir%\security\logs
\winlogon.log
ExtensionDebugLevel = REG_DWORD 0x2 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Winlogon
\GpExtensions
\{827d319e-6eac-11d2-a4ea-00c04f79f83a}\
Folder Redirection CSE windir%\debug\usermode
\fdeploy.log
FdeployDebugLevel = Reg_DWORD 0x0f HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Diagnostics
Software Installation CSE %windir%\debug\usermode
\appmgmt.log
Appmgmtdebuglevel=dword:0000009b HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Diagnostics
Windows Installer
(deployment-related actions)
%windir%\temp
\MSI*.log
Logging = voicewarmup

Debug = DWORD: 00000003

HKEY_LOCAL_MACHINE
\Software
\Policies
\Microsoft
\Windows
\Installer
Windows Installer
(user-initiated actions)
%temp%
\MSI*.log
Logging = voicewarmup

Debug = DWORD: 00000003

HKEY_LOCAL_MACHINE
\Software
\Policies
\Microsoft
\Windows
\Installer

Server Log Files for Troubleshooting Group Policy

Output from: Is located in this file: Enable verbose logging by adding this keyword… …to this registry key
GPMC:
error logging only
%temp%\gpmgmt.log gpmgmttracelevel=1 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Diagnostics
GPMC:
error and verbose logging
%temp%\gpmgmt.log gpmgmttracelevel=2 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Diagnostics
GPMC:
Output only to log file (not to debugger)
%temp%\gpmgmt.log gpmgmtlogfileonly=1 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Diagnostics
Group Policy Object Editor:
Core-specific entries
%windir%\debug\usermode
\gpedit.log
GPEditDebugLevel = REG_DWORD 0x10002 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Winlogon
Group Policy Object Editor:
CSE-specific entries
%windir%\debug\usermode

\gptext.log

GPTextDebugLevel = REG_DWORD 0x10002 HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows NT
\CurrentVersion
\Winlogon

Via: http://technet.microsoft.com/en-us/library/cc775423(WS.10).aspx

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s