KB2664446

Assume that you use the Security Configuration Wizard (SCW) to configure services on a computer that is running one of the following operating systems:

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2

However, if the SCW encounters an “Access denied” error when it configures a service, the SCW does not configure the remaining services.

When this issue occurs, the services are left in an inconsistent state.

KB2617058

Consider the following scenario:

  • You have a computer that is running one of the following operating systems:
    • Windows Vista
    • Windows Server 2008
    • Windows 7
    • Windows Server 2008 R2
  • You configure the value of the MoveSecurityAttributes registry subkey to 0 on the computer.
    Note: You can configure the MoveSecurityAttributes registry subkey in the following location:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MoveSecurityAttributes

  • You move a folder from one location into a folder in another location on the same NTFS volume.

In this scenario, the folder and all files in it may contain some Access Control Entries (ACEs) associated with the previous location. After you perform the previous steps, the expected result is that the folder and all files in it only contain the ACEs associated with the new location. This behavior is known as “Copy File Semantics” and is enabled in Windows Server 2003 by using the previously mentioned registry subkey.

KB2673320

Consider the following scenario:

  • You install hotfix 980382 on a computer that is running Windows Vista Service Pack 2 (SP2) or Windows Server 2008 SP2.
  • You have a file in a directory, and the file’s short name comes before the file’s long name.
  • You try to perform a file operation on the directory.

In this scenario, the computer stops responding. For example, you have a directory that contains a file. The file’s long name is “aaaaaaaaaaa”, and the file’s short name is “aaaaaa~1”. In this scenario, when you perform a file operation on the directory, such as copy the directory to another location, the computer stops responding.

Note: This issue causes an infinite loop in Ntfs!NtfsGetNextScb.

KB2673371

Consider the following scenario:

  • You enable the following Group Policy settings on a computer that is running Windows Vista Service Pack 2 (SP2) or Windows Server 2008 SP2:

    Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Security\Backup log automatically when full
    Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Audit: Shut down system immediately if unable to log

  • You enable the Archive the log when full, do not overwrite events option in the Security log.
  • The Security log reaches its maximum log size.

In this scenario, the computer crashes. Additionally, you receive the following Stop error message:

0xc0000244 – {Audit Failed}
An attempt to generate a security audit failed.

Note: The expected behavior is that the computer backs up the Security log when the log reaches its maximum size, and the computer does not crash.

KB2644882

Consider the following scenario:

  • You set a permission on a parent directory on a computer that is running Windows Vista or Windows Server 2008.
  • You configure a subdirectory to inherit permissions from the parent directory.
  • You copy the subdirectory to a target directory by using the Robocopy command together with the /Mir /SEC switch.

In this scenario, the subdirectory unexpectedly inherits permissions from the target directory. You expect the subdirectory to still inherit permissions from the parent directory.

KB2675625

A hotfix is available for the following two issues.

Issue 1
Assume Assume that you try to use a Universal Naming Convention (UNC) path to access a network file system (NFS) share from a computer that is running one of the following operating systems:

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2

The NFS share is hosted on a UNIX-based NFS server. In this situation, you cannot access the NFS share. Additionally, you receive the following error message:

Network error

Issue 2
Assume that you use a UNC path to access an NFS share from a computer that is running one of the following operating systems:

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2.

The NFS share is hosted on a UNIX-based NFS server. However, when you try to save some files to the NFS share by using an application such as Notepad or Wordpad, you receive the following error message:

Filename not valid

KB2664408

Consider the following scenario:

  • You have a forest that contains several domains. For example, the forest contains contoso.com, child1.contoso.com, and child2.contoso.com.
  • You set up a terminal server in one of the domains. For example, you set up a terminal server in contoso.com.
  • You configure the terminal server to set a variable %userdomain% roaming profile path for users who try to log on the terminal server. For example, you configure the server to set \\server\share\%userdomain% as the roaming profile path.

In this scenario, the variable %userdomain% roaming profile path is not resolved correctly. For example, when users from child1.contoso.com or child2.contoso.com try to log on the terminal server, the roaming profile path is set to \\server\share\contoso.

This issue occurs when a user tries to log on the terminal server from a computer that is running one of the following operating systems:

  • Windows 7
  • Windows Server 2008 R2
  • Windows Server 2008
  • Windows Vista

Note: The expected roaming profile path is \\server\share\child1 when users from child1.contoso.com try to log on the terminal server and \\server\share\child2 when users from child2.contoso.com try to log on the terminal server.

KB2553549

On a computer that is running Windows Vista, Windows 7, Windows Server 2008 or Windows Server 2008 R2, all the TCP/IP ports that are in a TIME_WAIT status are not closed after 497 days from system startup. Therefore, TCP/IP ports may be exhausted, and new TCP/IP sessions may not be created.

Note: Some network-related operations to this computer may be affected by this issue. For example, you try to use some remote administration tools to manage a Windows Server 2008-based domain controller that has been running for more than 497 days. In this example, the remote administration tools cannot connect to the domain controller.

KB2647169

Considering the following scenario:

  • A Windows Server 2008 R2-based fax server is deployed in a network environment.
  • You install Windows Internet Explorer 9 on a client computer that is running one of the following operating systems:
    • Windows Vista
    • Windows Server 2008
    • Windows 7
    • Windows Server 2008 R2
  • The client computer uses the fax server to send faxes.
  • You open Windows Fax and San (WFS.exe) and try to send a fax.

In this scenario, you receive a script error message that resembles the following:

res://ieframe.dll/preview.js

KB2639793

Consider the following scenario:

  • You join a computer to a network. The computer is running one of the following operating systems:
    • Windows Vista
    • Windows Server 2008
    • Windows 7
    • Windows Server 2008 R2
  • The network is configured to use Internet Protocol security (IPsec) network address translation traversal (NAT-T) security.
  • You use IPsec to communicate with another computer in the network.

In this scenario, you randomly receive a Stop error message that resembles the following, and then the computer restarts:

STOP 0x000000C2 (parameter1, parameter2, parameter3, parameter4)

Notes:

  • This Stop error describes a BAD_POOL_CALLER issue.
  • The four parameters in this error message vary, depending on the configuration of the computer.
  • Not all “0x000000C2” Stop errors are caused by this issue.