Below this image, it tells you that the client it was trying to update has failed with a error code (8007071a) and the description «The remote procedure call was cancelled». So, is there a way to solve this problem?
ΠΡΠ΅ ΠΎΡΠ²Π΅ΡΡ
More information about the port you need to open for GPO https://technet.microsoft.com/en-us/library/jj572986.aspx
Same if you have any product like Symantec SmartFirewall, you have to open the ports.
Tried that, but it doesn’t work. π
Any upcoming solutions anybody?
I am too lazy to read all of that from the article you’ve given me. But, I’ll try! π
Also, how would you open the ports? From the router?
This 2 policy rules you should enable:
— Remote Scheduled Tasks Management (RPC)
— Distributed Transaction Coordinator (RPC-EPMAP)
Thanks, I had the same issue.
I’m curious, the » Remote Scheduled Tasks Management (RPC)» rule was the one that solved my issue, so what does » Distributed Transaction Coordinator (RPC-EPMAP)» do?
Also, why would there be a Firewall Rule blocking GPO updates in a Domain in the 1st place? I would have guessed that the Domain Profile for Advanced Firewall would have the rule for GPupdate to be allowed by default. Now that I think about it, I have been able to run «GPudate /force» successfully before, so maybe that is different somehow than Group Policy update from them menu in Group Policy Management? Maybe because it is initiated from the client rather than the DC so the lack of an inbound rule doesn’t matter?
there is a technet blog article related to this—it doesn’t offer much insight in the way of what those specific firewall group rules do—but it does reinforce the argument that they are required. It simply connotes that the RPC-EPMAP rule is the management lane for RPC traffic, translation: a sort of out-of-band management for RPC, probably control message traffic that doesn’t congest an otherwise dedicated TCP connection and can use UDP. **Note** The latter details are my speculation—I am no authority and didn’t read that anywhere but that’s typically how those kinds of protocols work when it comes to discrete management ports.
Almost at the very bottom—and he actually addresses the specifically identified error that inspired this post originally.
I stumbled across this post and feel I need to clarify this because the answers given don’t really cut it.
Performing a Group Policy Update pushed from the domain controller in Group Polcy Management Console creates a scheduled task on the remote machine. That scheduled task then runs «gpupdate /force».
The Windows Firewall rules allowing this are «Remote Scheduled Tasks Management (RPC)», «Remote Scheduled Tasks Management (RPC-EPMAP)» and «Windows Management Instrumentation (WMI-In)». These are not enabled by default because they open you up as an obvious target for abuse by malicious actors.
This forum has migrated to Microsoft Q&A. Visit Microsoft Q&A to post new questions.
Asked by:
General discussion
Below this image, it tells you that the client it was trying to update has failed with a error code (8007071a) and the description «The remote procedure call was cancelled». So, is there a way to solve this problem?
All replies
More information about the port you need to open for GPO https://technet.microsoft.com/en-us/library/jj572986.aspx
Same if you have any product like Symantec SmartFirewall, you have to open the ports.
Tried that, but it doesn’t work. π
Any upcoming solutions anybody?
I am too lazy to read all of that from the article you’ve given me. But, I’ll try! π
Also, how would you open the ports? From the router?
This 2 policy rules you should enable:
— Remote Scheduled Tasks Management (RPC)
— Distributed Transaction Coordinator (RPC-EPMAP)
Thanks, I had the same issue.
I’m curious, the » Remote Scheduled Tasks Management (RPC)» rule was the one that solved my issue, so what does » Distributed Transaction Coordinator (RPC-EPMAP)» do?
Also, why would there be a Firewall Rule blocking GPO updates in a Domain in the 1st place? I would have guessed that the Domain Profile for Advanced Firewall would have the rule for GPupdate to be allowed by default. Now that I think about it, I have been able to run «GPudate /force» successfully before, so maybe that is different somehow than Group Policy update from them menu in Group Policy Management? Maybe because it is initiated from the client rather than the DC so the lack of an inbound rule doesn’t matter?
there is a technet blog article related to this—it doesn’t offer much insight in the way of what those specific firewall group rules do—but it does reinforce the argument that they are required. It simply connotes that the RPC-EPMAP rule is the management lane for RPC traffic, translation: a sort of out-of-band management for RPC, probably control message traffic that doesn’t congest an otherwise dedicated TCP connection and can use UDP. **Note** The latter details are my speculation—I am no authority and didn’t read that anywhere but that’s typically how those kinds of protocols work when it comes to discrete management ports.
Almost at the very bottom—and he actually addresses the specifically identified error that inspired this post originally.
I stumbled across this post and feel I need to clarify this because the answers given don’t really cut it.
Performing a Group Policy Update pushed from the domain controller in Group Polcy Management Console creates a scheduled task on the remote machine. That scheduled task then runs «gpupdate /force».
The Windows Firewall rules allowing this are «Remote Scheduled Tasks Management (RPC)», «Remote Scheduled Tasks Management (RPC-EPMAP)» and «Windows Management Instrumentation (WMI-In)». These are not enabled by default because they open you up as an obvious target for abuse by malicious actors.