Skip to Content
0
Former Member
Mar 31, 2011 at 03:08 PM

Load report failed only occurs when NETWORK SERVICE don't have access to C:

30 Views

Hi,

My configuration:

Windows Server 2003+SPs

CRRedist2008_x86

The reports works perfect, but after I run the commands bellow, the error: "Load report failed" occurs. To fix I need to give the NETWORK SERVICE read access to C:\ , It's possible to change this access to other diretory?

Tks.

cacls "%systemroot%" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%" /t /e /g administrators:f "CREATOR OWNER":f everyone:r SYSTEM:f

cacls "c:\autoexec.bat" /E /C /R "EVERYONE" "USERS" "POWER USERS"

cacls "c:\config.sys" /E /C /R "EVERYONE" "USERS" "POWER USERS"

cacls "c:\boot.ini" /E /C /R "EVERYONE" "USERS" "POWER USERS"

cacls "c:\ntldr" /E /C /R "EVERYONE" "USERS" "POWER USERS"

cacls "c:\ntdetect.com" /E /C /R "EVERYONE" "USERS" "POWER USERS"

cacls "c:\autoexec.bat" /T /E /C /G administrators:f

cacls "c:\boot.ini" /T /E /C /G administrators:f

cacls "c:\ntldr" /T /E /C /G administrators:f

cacls "c:\Ntdetect.com" /T /E /C /G administrators:f

copy W2k3.inf %Systemroot%\security\templates

copy hardn2003.sdb %Systemroot%\security\database

secedit /validate %Systemroot%\security\templates\W2k3.inf

%systemroot%\system32\secedit.exe /configure /DB %systemroot%\security\database\hardn2003.sdb /CFG %Systemroot%\security\templates\W2k3.inf /log %systemroot%\security\logs\hardening.log

gpupdate /target:computer /force

gpupdate /target:user /force

cacls "c:\config.sys" /T /E /C /G administrators:f

cacls "c:\autoexec.bat" /T /E /C /G system:f

cacls "c:\boot.ini" /T /E /C /G system:f

cacls "c:\ntldr" /T /E /C /G system:f

cacls "c:\Ntdetect.com" /T /E /C /G system:f

cacls "c:\config.sys" /T /E /C /G system:f

cacls "%systemroot%\system32\cmd.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\cmd.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\arp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\arp.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\cacls.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\cacls.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\debug.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\debug.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\edit.com" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\edit.com" /t /e /g administrators:f

cacls "%systemroot%\system32\edlin.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\edlin.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\finger.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\finger.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\ftp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\ftp.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\tftp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\tftp.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\net.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\net.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\nslookup.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\nslookup.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\regedit.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\regedit.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\regedt32.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\regedt32.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\rexec.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\rexec.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\rsh.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\rsh.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\telnet.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\telnet.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\nbtstat.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\nbtstat.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\netstat.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\netstat.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\net.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\net.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\ping.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\ping.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\regedt32.exe" /t /e /R "everyone"

cacls "%systemroot%\system32\regedt32.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\route.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\route.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\syskey.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\syskey.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\tracert.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\tracert.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\at.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\at.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\pathping.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\pathping.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\runonce.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\runonce.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\runas.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\runas.exe" /t /e /g administrators:f

cacls "%systemroot%\system32\secedit.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"

cacls "%systemroot%\system32\secedit.exe" /t /e /g administrators:f

sc config alerter start= disabled

sc config AppMgmt start= disabled

sc config BITS start= disabled

sc config Clipsrv start= disabled

sc config Browser start= disabled

sc config cisvc start= disabled

sc config SharedAccess start= disabled

sc config mnmsrvc start= disabled

sc config fax start= disabled

sc config RemoteRegistry start= disabled

sc config RemoteAccess start= disabled

sc config UPS start= disabled

sc config UtilMan start= disabled

sc config tlntSvr start= disabled

sc config RSVP start= disabled

sc config RasAuto start= disabled

sc config TapiSrv start= disabled

sc config WZCSVC start= disabled

sc config Wmi start= disabled

sc config Messenger start= disabled

sc config PolicyAgent start= disabled

sc config Schedule start= disabled

sc config seclogon start= disabled

sc config ImapiService start= disabled

sc config Dfs start= disabled

sc config PolicyAgent start= disabled

sc config Nla start= disabled