How to resolve Veeam Backup & Replication agent installation issue?
The Veeam Backup & Replication Enterprise Plus 12.3.1.1139 installation fails with the error:
23.10.2025 6:26:35 Warning Failed to connect to 0.0.0.0 Details: This user can’t sign in because this account is currently disabled. Failed to connect to share ‘\0.0.0.0\ADMIN$’.
Attempts to use all available administrative accounts have been unsuccessful. The following configurations have also been implemented:
-
Opening ports for RPC:
netsh advfirewall firewall add rule name="Open TCP 135 for RPC" protocol=TCP dir=in localport=135 action=allow netsh advfirewall firewall add rule name="Open TCP dynamic RPC ports" protocol=TCP dir=in localport=49152-65535 action=allow -
Modifying security parameters in the registry:
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
These measures did not help resolve the issue. Has anyone encountered a similar situation and can provide a solution?
Veeam Backup & Replication agent installation errors with a disabled account message and ADMIN$ share connection issues typically indicate network security configuration or access management problems. This error often occurs due to incorrect security policy settings, firewall restrictions, or Windows administrative share access rights issues. The primary solution involves checking network settings, configuring accounts, and optimizing system security parameters.
Table of Contents
- Main Causes and Problem Diagnosis
- Network Access and Firewall Checking
- Account Configuration and Access Rights
- Additional Troubleshooting Methods
- Alternative Installation Approaches
Main Causes and Problem Diagnosis
Connection error to 0.0.0.0 with a disabled account message is typically caused by one of the following issues:
- Incorrect RPC (Remote Procedure Call) configuration - despite opening ports, additional settings may be required
- Restrictions on administrative share access - problems with access rights to ADMIN$ share
- Authentication issues - the account may actually be disabled or have restrictions
- Security policy conflicts - local or group policies blocking the installation
To diagnose the issue, perform the following checks:
-
Check account status:
powershellnet user | findstr "Active" -
Check ADMIN$ share availability:
powershellnet share ADMIN$ -
Test connection to administrative share:
cmdnet use \\localhost\ADMIN$ /user:your_user password
Network Access and Firewall Checking
Your current RPC port opening settings are correct, but may require additions:
-
Add rules for SMB and WMI:
cmdnetsh advfirewall firewall add rule name="Open SMB In" dir=in protocol=TCP localport=445 action=allow netsh advfirewall firewall add rule name="Open WMI (DCOM)" dir=in protocol=TCP localport=135 action=allow netsh advfirewall firewall add rule name="Open RPC Endpoint Mapper" dir=in protocol=UDP localport=135 action=allow -
Check and add rules for Veeam:
cmdnetsh advfirewall firewall add rule name="Veeam Backup" dir=in action=allow program="C:\Program Files\Veeam\Backup and Replication\Backup\Veeam.Backup.Service.exe" enable=yes -
Temporarily disable firewall for testing:
cmdnetsh advfirewall set allprofiles state off
Important: Disabling the firewall is for diagnosis only. After resolving the issue, be sure to re-enable it.
Account Configuration and Access Rights
The “disabled account” issue is often related to incorrect access rights configuration:
-
Check and activate accounts:
cmdnet user administrator /active:yes -
Assign necessary rights:
cmdnet localgroup administrators "your_user" /add net localgroup "Remote Desktop Users" "your_user" /add net localgroup "Performance Log Users" "your_user" /add -
Configure local account security policy:
cmdsecpol.msc
- Navigate: Local Policies → Security Options → Account Policies
- Set “Access: User account control behavior of the internal administrator account” to “Disabled”
-
Check and modify registry parameters (if not done previously):
cmdreg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
Additional Troubleshooting Methods
If standard methods don’t work, try the following approaches:
-
Using the system account:
cmdnet user "NT AUTHORITY\SYSTEM" /add net localgroup administrators "NT AUTHORITY\SYSTEM" /add -
Check RPC service:
cmdsc query rpcss sc config rpcss start= auto net start rpcss -
Reset security policies:
cmdsecedit /configure /cfg %windir%\inf\defltbase.inf /db defltbase.sdb /verbose -
Check registry for restrictions:
cmdreg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v LocalAccountTokenFilterPolicy reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA
-
Temporarily disable UAC:
- Via registry:cmd
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f - Or via command prompt:cmd
%windir%\System32\cmd.exe /k %windir%\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
- Via registry:
Alternative Installation Approaches
If the issue persists, consider alternative agent installation methods:
-
Installation via Veeam Management Console:
- Launch the Veeam console
- Go to “File” → “Add server” → “Windows as a guest OS”
- Follow the wizard instructions
-
Manual agent installation:
- Copy the agent files from the Veeam server
- Perform manual installation:cmd
msiexec /i "Veeam Agent for Windows.msi" /quiet /norestart
-
Installation using Windows Management Instrumentation (WMI):
- Ensure WMI service is running:cmd
winmgmt /verifyrepository winmgmt /salvagerepository
- Try installing via WMI:powershell
Invoke-WmiMethod -Path "Win32_Product" -Name "Install" -ArgumentList "C:\path\to\veeam.msi"
- Ensure WMI service is running:
-
Using a domain account:
- If the server is domain-joined, use a domain administrator account
- Ensure the account has “Full control” rights on the target server
-
Check version compatibility:
- Ensure the agent version matches the Veeam server version
- Verify Veeam agent 12.3.1 system requirements
Conclusion
The main solutions for the Veeam agent installation error with a disabled account message are:
- Complete network settings check - ensure all required ports (135, 445, 49152-65535) are open and accessible
- Proper account configuration - verify account activity and assign necessary rights
- Security parameter optimization - configure LocalAccountTokenFilterPolicy and temporarily disable UAC for testing
- Alternative installation methods - use the Veeam Management Console or manual installation if automatic installation doesn’t work
To prevent similar issues in the future, it’s recommended to:
- Regularly update Veeam to the latest version
- Use specialized Veeam accounts with minimal necessary rights
- Automate network configuration verification before installation
If the issue persists, contact Veeam technical support, providing installation logs and network diagnostic results.