I'm not familiar with what YATS32 is, but the omnipotent Google declares it as some type of time sync software. I don't know what events cause it to make a log entry, but if you want the real story I would suggest heating up Wireshark and watching traffic from the Nion directed to UDP port 123 on the timeserver. Also take into account what provides time for this host running YAT32. If it doesn't have a source to 'real' time, you haven't gained anything by syncing your Nion to just another unsynchronized time source.
I would not expect changing the timezone to have any effect on NTP; NTP distributes UTC(universal coordinated time), which is the same all over the world. This is why computer clocks should be set to UTC and not local time. The OS then interprets this time based on the selected timezone for presentation to the user.
What battle do you have with the corporate firewall? A typical Nion NTP application should only require outgoing access to a small set of hosts on a single UDP port; no inbound access is required. Depending on the size of the facility, an IT department worth its salt probably already has a time source on their internal network available for private hosts. If nothing of that sort exists and they have a truly draconian firewall policy, there are a couple of ways to get real time for your Nions(and other NTP needy devices). You can run ntpd connected to a radio clock:
http://www.eecis.udel.edu/~mills/ntp/html/refclock.html
There are also several stand alone GPS based time servers available:
http://www.veracityglobal.com/products/ … menet.aspx
http://www.timetools.co.uk/ntp-servers/ … server.htm