Microsoft Internet Explorer 7 Logo

Related Topics:

Posted on Nov 28, 2012

Your device does not comply to current client security policies.

Can not gain acces to my employee account gets error as follows Your device does not comply to current client security policies. Unsupported websire remote.qvc.com

1 Related Answer

Anonymous

  • 2004 Answers
  • Posted on Mar 17, 2009

SOURCE: My outlook express is no longer receiving mails.

Try Windows live mail. This will do the trick.

Ad

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
1answer

How do i write a policy?

Try these
http://www.immi.gov.au/skilled/_pdf/hi-template.rtf

https://www.priorityhealth.com/employer/~/media/documents/legal/sample-summary-plan-desc-template-word.doc

Jun 16, 2014 • Finance
tip

Fix Windows 7 Error ?Windows is Not Genuine? Error code 0×80070005

f63627f.png

Those users running genuine version of Windows 7 provided with their hardware platform reported that immediately after log on they were presented with following error message. “Windows is not genuine. Your computer might not be running a counterfeit copy of Windows. 0×80070005.”
Some other symptoms of associated with this issue are,
The computer desktop background is black, and you receive the following error message on the bottom right corner of the screen:
“This copy of Windows is not genuine”
You receive the following error message when you view the System Properties: (Control Panel / System and Security / System)
“You must activate today. Activate Windows now”
If you try to use slmgr.vbs /dlv to view the licensing status, you receive the following message:
Error: 0×80070005 Access denied: the requested action requires elevated privileges
Microsoft is fully aware of this issue and provided following explanation for the issue,
There is a lack of permissions in the registry key HKU\S-1-5-20. The Network Service account must have full control and read permissions over that registry key.
This situation may be the result of applying a Plug and Play Group Policy object (GPO).
To resolve this issue, you can either disable the policy setting (Method A), or edit the permissions to provide the Licensing Service the required permissions (Method B).
Method A: Disable the Plug and Play Policy

1. Determine the source of the policy . To do this, follow these steps:
a. On the client experiencing the Activation error, run the Resultant Set of Policy wizard by clicking Start, Run and entering rsop.msc as the command.
b. Visit the following location:
Computer Configuration / Policies / Windows Settings /Security Settings / System Services /
If the Plug and Play service is configured through a Group Policy setting, you see it here with settings other than Not Defined. Additionally, you can see which Group Policy is applying this setting.
2. Disable the Group Policy settings and force the Group Policy to be reapplied.
a. Edit the Group Policy that is identified in Step 1 and change the setting to “Not Defined.” Or, follow the section below to add the required permissions for the Network Service account.
b. Force the Group Policy setting to reapply: gpupdate /force (a restart of the client is sometimes required)
Method B: Edit the permissions of the Group Policy:

1. Open the Group Policy that is identified in Method A, Step 1 above, and open the corresponding Group Policy setting.
2. Click the Edit Security button, and then click the Advanced button.
3. In the Advanced Security Settings for Plug and Play window click Add and then add the SERVICE account. Then, click OK
4. Select the following permissions in the Allow section and then click OK:
Query template, Query status, Enumerate dependents, Interrogate, User-defined control, Read permissions
Note: The Previous rights are the minimum required permissions.
5. Run gpupdate /force after you apply the previous permissions to the Group Policy setting.
6. Verify that the appropriate permissions are applied with the following command:
sc sdshow plugplay
The following are the rights applied to the Plug and Play service in SDDL:
D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)
(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
(A;;CCLCSWLOCRRC;;;IU)
(A;;CCLCSWLOCRRC;;;SU)
S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
(A;;CC LC SW LO CR RC ;;;SU is an Access Control Entry (ACE) that allows the following rights to “SU” (SDDL_SERVICE – Service logon user)
A: Access Allowed
CC: Create Child
LC: List Children
SW: Self Write
LO: List Object
CR: Control Access
RC: Read Control
SU: Service Logon User
Note: If there are no GPO’s in place, then another activity may have changed the default registry permissions. To work around this issue, perform the following steps:
1. On the computer that is out of tolerance, start Registry Editor.
2. Right-click the registry key HKEY_USERS\S-1-5-20, and select Permissions…
3. If the NETWORK SERVICE is not present, click Add…
4. In Enter the object names to select type Network Service and then click Check Names and OK.
5. Select the NETWORK SERVICE and Grant Full Control and Read permissions.
6. Restart the computer.
7. After the restart, the system may require activation. Complete the activation.

on Jul 15, 2010 • Computers & Internet
tip

Fix Windows 7 Error ?Windows is Not Genuine? Error code 0×80070005

To resolve this issue, you can either disable the policy setting (Method A), or edit the permissions to provide the Licensing Service the required permissions (Method B).
Method A: Disable the Plug and Play Policy 1. Determine the source of the policy . To do this, follow these steps:

a. On the client experiencing the Activation error, run the Resultant Set of Policy wizard by clicking Start, Run and entering rsop.msc as the command.

b. Visit the following location:

Computer Configuration / Policies / Windows Settings /Security Settings / System Services /


If the Plug and Play service is configured through a Group Policy setting, you see it here with settings other than Not Defined. Additionally, you can see which Group Policy is applying this setting.

2. Disable the Group Policy settings and force the Group Policy to be reapplied.

a. Edit the Group Policy that is identified in Step 1 and change the setting to “Not Defined.” Or, follow the section below to add the required permissions for the Network Service account.

b. Force the Group Policy setting to reapply: gpupdate /force (a restart of the client is sometimes required)
Method B: Edit the permissions of the Group Policy: 1. Open the Group Policy that is identified in Method A, Step 1 above, and open the corresponding Group Policy setting.

2. Click the Edit Security button, and then click the Advanced button.

3. In the Advanced Security Settings for Plug and Play window click Add and then add the SERVICE account. Then, click OK

4. Select the following permissions in the Allow section and then click OK:
Query template, Query status, Enumerate dependents, Interrogate, User-defined control, Read permissions

Note: The Previous rights are the minimum required permissions.

5. Run gpupdate /force after you apply the previous permissions to the Group Policy setting.

6. Verify that the appropriate permissions are applied with the following command:

sc sdshow plugplay


The following are the rights applied to the Plug and Play service in SDDL:

D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)

(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)

(A;;CCLCSWLOCRRC;;;IU)

(A;;CCLCSWLOCRRC;;;SU)

S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

(A;;CC LC SW LO CR RC ;;;SU is an Access Control Entry (ACE) that allows the following rights to “SU” (SDDL_SERVICE – Service logon user)

A: Access Allowed

CC: Create Child

LC: List Children

SW: Self Write

LO: List Object

CR: Control Access

RC: Read Control

SU: Service Logon User

Note: If there are no GPO’s in place, then another activity may have changed the default registry permissions. To work around this issue, perform the following steps:

1. On the computer that is out of tolerance, start Registry Editor.

2. Right-click the registry key HKEY_USERS\S-1-5-20, and select Permissions…

3. If the NETWORK SERVICE is not present, click Add…

4. In Enter the object names to select type Network Service and then click Check Names and OK.

5. Select the NETWORK SERVICE and Grant Full Control and Read permissions.

6. Restart the computer.

7. After the restart, the system may require activation. Complete the activation.
on May 19, 2010 • Computers & Internet
0helpful
1answer

How do i disable my password when i logon

Someone set a policy on your machine to enforce certain rules about passwords. Best to ask this person to modify these rules for you. Alternatively you can run gpedit.msc, then follow this path to change them yourself: Local Computer Policy / Computer Configuration / Windows Settings / Security Settings / Account Policy / Password Policy.
Note also this:
- You cannot delete the inbuilt Administrator account.
- Having administrator accounts with a blank password is a big security risk.

Answer from: http://answers.microsoft.com/en-us/windows/forum/windows_7-security/error-message-windows-cannot-remove-the-password/3eb2c867-e6fb-4216-9040-4e9913a29c30
0helpful
1answer

Data Breach SCDOR123

Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>
0helpful
1answer

I cant install service pack3 for win xp because error 0x800a0046

Try this method

* Remove the user account that is experiencing difficulty from the Guests
or Limited account groups

Click Start, click Run, type control admintools, and then click OK.
Click Computer Management.
Expand Local Users and Groups.
Select Users.
Open the account that is used to access Windows Update.
Click the Member Of tab.
Select the user account that you want to remove, and then click Remove.;

* Add the Local Administrator and Service accounts to the Impersonate a
client after authentication policy
Click Start, point to All Programs, point to Administrative Tools, and
then click Local Security Policy.
Expand Local Policies.
Click User Rights Assignment.
Double-click to open the Impersonate a client after authentication
policy
On the Local Security Settings tab, click Add User or Group, and then
add the Administrator and Service to the list of Users and Groups.
Click OK, and then restart the computer.


good luck
0helpful
1answer

I have genuine windows 7 but computer says that it is not genuine

To resolve this issue, you can either disable the policy setting (Method A), or edit the permissions to provide the Licensing Service the required permissions (Method B). Method A: Disable the Plug and Play Policy
1. Determine the source of the policy. To do this, follow these steps:
a. On the client experiencing the Activation error, run the Resultant Set of Policy wizard by clicking Start, Run and entering rsop.msc as the command.
b. Visit the following location:
Computer Configuration / Policies / Windows Settings /Security Settings / System Services /
If the Plug and Play service is configured through a Group Policy setting, you see it here with settings other than Not Defined. Additionally, you can see which Group Policy is applying this setting.

2. Disable the Group Policy settings and force the Group Policy to be reapplied.
a. Edit the Group Policy that is identified in Step 1 and change the setting to "Not Defined." Or, follow the section below to add the required permissions for the Network Service account.
b. Force the Group Policy setting to reapply: gpupdate /force (a restart of the client is sometimes required)
Method B: Edit the permissions of the Group Policy:
1. Open the Group Policy that is identified in Method A, Step 1 above, and open the corresponding Group Policy setting.
2. Click the Edit Security button, and then click the Advanced button.
3. In the Advanced Security Settings for Plug and Play window click Add and then add the SERVICE account. Then, click OK
4. Select the following permissions in the Allow section and then click OK:
Query template
Query status
Enumerate dependents
Interrogate
User-defined control
Read permissions
Note: The Previous rights are the minimum required permissions.
5. Run gpupdate /force after you apply the previous permissions to the Group Policy setting.
6. Verify that the appropriate permissions are applied with the following command:
sc sdshow plugplay
The following are the rights applied to the Plug and Play service in SDDL:

D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)
(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
(A;;CCLCSWLOCRRC;;;IU)
(A;;CCLCSWLOCRRC;;;SU)
S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
(A;;CC LC SW LO CR RC ;;;SU is an Access Control Entry (ACE) that allows the following rights to "SU" (SDDL_SERVICE - Service logon user)
A: Access Allowed
CC: Create Child
LC: List Children
SW: Self Write
LO: List Object
CR: Control Access
RC: Read Control
SU: Service Logon User
Note: If there are no GPO's in place, then another activity may have changed the default registry permissions. To work around this issue, perform the following steps:
  1. On the computer that is out of tolerance, start Registry Editor.
  2. Right-click the registry key HKEY_USERS\S-1-5-20, and select Permissions...
  3. If the NETWORK SERVICE is not present, click Add...
  4. In Enter the object names to select type Network Service and then click Check Names and OK.
  5. Select the NETWORK SERVICE and Grant Full Control and Read permissions.
  6. Restart the computer.
  7. After the restart, the system may require activation. Complete the activation.
If you think this solution helps you then your token of appreciation in the form of Rating and a testimonial will be esteemed.
Thank you and Keep Visiting FixYa!
0helpful
7answers

What is nap server?

Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008.
With Network Access Protection, system administrators of an organization's computer network can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled. Connecting or communicating computers have their health status evaluated. Computers that comply with system health requirements have full access to the network. Administrators can configure health policies that make it possible to ensure that computers not in compliance with system health requirements have restricted access to the network.

for more info. please visit the links below

http://en.wikipedia.org/wiki/Network_Access_Protection
http://msdn.microsoft.com/en-us/library/cc895519%28v=vs.85%29.aspx
http://technet.microsoft.com/en-us/network/bb545879
Not finding what you are looking for?

576 views

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

k24674

Level 3 Expert

8093 Answers

Brad Brown

Level 3 Expert

19187 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...