Windows Server 2012 R2에 Teaming 구성이 되어 있을때 해당 오류가 발생될 수 있습니다.
아래 MS Support 문서를 참고하여 조치 가능합니다.
event ID 2 is logged when the MSFT_NetLbfoTeamNic class is called in Windows
Server 2012 R2
Applies to: Windows
Server 2012 R2 DatacenterWindows Server 2012 R2 Standard
When Windows Server 2012 R2 is used with the NIC Teaming
feature, and a third-party WMI provider is used to call
the MSFT_NetLbfoTeamNic WMI class, the following event is
Event ID: 2
Session "" failed to start with the following
This article addresses only this specific error that
occurs when NIC Teaming is being used. This error is not the fault of the
third-party WMI provider. Additionally, this event may be logged for reasons
that are not related to the NIC Teaming WMI provider.
This problem is not caused by the third-party WMI
provider. This problem is being tracked for consideration in a future version
of Windows Server.
The Windows Server 2012
R2 MSFT_NetLbfoTeamNic WMI class uses the iNetCfg interface. The
iNetCfg interface is associated with the NetCfgTrace kernel logging provider,
which is automatically enabled by Windows. Trace data is automatically saved to
the C:\Windows\inf\netcfgx.0.etl file. All WMI providers run under the context
of the WMIPRVSE process, which in turn runs under the NETWORK SERVICE account.
However, if a WMI provider calls the MSFT_NetLbfoTeamNic class, the
NETWORK SERVICE account does not have authority to write trace data to this
If the scenario that's described in the
"Symptoms" section triggers the kernel event ID 2 error, the error is
harmless and can be safely ignored.
If you want to prevent this error from being logged, open
an administrative command prompt, and then run the following commands:
c:\windows\inf /grant "NT AUTHORITY\NETWORK
c:\windows\inf\netcfgx.0.etl /grant "NT AUTHORITY\NETWORK SERVICE":F
c:\windows\inf\netcfgx.1.etl /grant "NT AUTHORITY\NETWORK SERVICE":F
These commands grant the necessary file permissions to
prevent the error logging in this scenario.
You may also want to reset the owner of C:\Windows\inf
back to the NT SERVICE\TrustedInstaller account (the default setting). To do
this, follow these steps:
- In Windows Explorer, navigate to
C:\Windows , right-click the C:\Windows\INF directory, and then
select Properties. On the Security tab,
- Next to Owner, click Change.
- Click Location, and then select the local computer
(you may have to scroll up if you’ve joined a domain).
- In the Object name, enter NT
SERVICE\TrustedInstaller, select Check Names, and then click OK.
Finally, run the icacls command to make sure
that the NETWORK SERVICE account is set for inheritance, as in the following
NT AUTHORITY\NETWORK SERVICE:(OI)(CI)(F)